A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication

We propose a physical-layer challenge-response authentication approach in this paper based on combined shared secret key and channel state information between two legitimate nodes in an orthogonal frequency division multiplexing system. The proposed approach can be used even if the correlation of channel coefficients exists, which can be exploited to extract the shared secret key in conventional approaches. Furthermore, channel coding is employed to mitigate the difference between the two estimated channels as well as channel fading and background noise. As a result, in the proposed physical-layer authentication approach, the decoder’s output can be used for authentication and provide a reliable decision under active attack.

[1]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[2]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[3]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[4]  Chung G. Kang,et al.  MIMO-OFDM Wireless Communications with MATLAB , 2010 .

[5]  Jinho Choi,et al.  Secure Transmissions via Compressive Sensing in Multicarrier Systems , 2016, IEEE Signal Processing Letters.

[6]  Xianbin Wang,et al.  Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.

[7]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[8]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[9]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[10]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[11]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[12]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[13]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[14]  Jinho Choi Channel estimation for coherent multi-carrier CDMA systems over fast fading channels , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[15]  Willie K. Harrison,et al.  Quantifying equivocation for finite blocklength wiretap codes , 2017, 2017 IEEE International Conference on Communications (ICC).

[16]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Rudolf Ahlswede,et al.  Hiding Data - Selected Topics , 2016 .

[18]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[19]  Zhen Yang,et al.  Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.

[20]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[21]  Jinho Choi Adaptive and Iterative Signal Processing in Communications , 2006 .

[22]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[23]  Yan Dong,et al.  PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[24]  Jinho Choi,et al.  Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[26]  Sinem Coleri Ergen,et al.  Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..

[27]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[28]  Shu Lin,et al.  Soft-decision decoding of linear block codes based on ordered statistics , 1994, IEEE Trans. Inf. Theory.

[29]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.