Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission

In this paper, we propose a novel Artificial-Noise-Aided PHYsical layer Phase Challenge-Response Authentication Scheme (ANA-PHY-PCRAS) for practical orthogonal frequency division multiplexing (OFDM) transmission. In this new scheme, Tikhonov-distributed artificial noise is introduced to interfere with the phase-modulated key for resisting potential key-recovery attacks. Then, we address various practical issues for ANA-PHY-PCRAS with OFDM transmission, including correlation among subchannels, imperfect carrier, and timing recoveries. Among them, we show that the effect of sampling offset is significant and a search procedure in the frequency domain should be incorporated for verification. With practical OFDM transmission, the number of uncorrelated subchannels is often insufficient. Hence, we employ a time-separated approach for allocating enough subchannels, and a modified ANA-PHY-PCRAS is proposed to alleviate the discontinuity of channel phase at far-separated time slots. Finally, the key equivocation is derived for the worst case scenario. We conclude that the enhanced security of ANA-PHY-PCRAS comes from the uncertainties of both the wireless channel and introduced artificial noise, compared with the traditional challenge-response authentication scheme implemented at the upper layer.

[1]  Zhen Yang,et al.  Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.

[2]  Nicola Laurenti,et al.  On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[4]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[5]  Yan Dong,et al.  PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[7]  Brian M. Sadler,et al.  Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.

[8]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Per Ola Börjesson,et al.  OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.

[10]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  S. R. Jammalamadaka,et al.  Topics in Circular Statistics , 2001 .

[12]  B MandayamNarayan,et al.  Information-theoretically secret key generation for fading wireless channels , 2010 .

[13]  Wei-Pang Yang,et al.  Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.

[14]  C. B. Sankaran,et al.  Network access security in next- generation 3GPP systems: A tutorial , 2009, IEEE Communications Magazine.

[15]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[16]  T. T. Soong,et al.  The joint estimation of signal and noise from the sum envelope , 1967, IEEE Trans. Inf. Theory.

[17]  Heinrich Meyr,et al.  Optimum receiver design for wireless broad-band systems using OFDM. I , 1999, IEEE Trans. Commun..

[18]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[20]  Nicola Laurenti,et al.  Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.

[21]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[22]  William A. Arbaugh,et al.  Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.

[23]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[24]  Mohamed-Slim Alouini,et al.  Noncoherent Capacity of Secret-Key Agreement With Public Discussion , 2011, IEEE Transactions on Information Forensics and Security.

[25]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[26]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[27]  Sandeep Chennakeshu,et al.  Secure information transmission for mobile radio , 2000, IEEE Communications Letters.

[28]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[29]  Shlomo Shamai,et al.  On the capacity of the blockwise incoherent MPSK channel , 1998, IEEE Trans. Commun..

[30]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[31]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.