Physical layer assisted security for mobile OFDM networks

Secure wireless communication is a challenging problem due to the shared nature of the wireless medium and the dynamic channel. Most of the existing security mechanisms focus on traditional cryptographic schemes. In recent years, features of multi-path channels, such as randomness, coherence and reciprocity, have driven researchers to exploit their potential to enhance the security of mobile wireless networks. As OFDM occupies wide bandwidth, it will experience a prolific source of multi-path components. In this paper, we comprehensively exploit the inherent physical features of the multi-path fading channel to achieve continuous two way authentication between mobile terminals. In our scheme, the coherence of the time-variant channel for the continuous symbols is exploited to achieve authentication of the OFDM communication networks. Unlike other channel-based approaches, the coherence of both amplitude and phase of the channel signature in the continuous symbol is utilized to enhance the security of the OFDM communication network. More specifically, the receiver will detect the channel response continuously according to the inserted pilots and identify the legal user based on the statistical channel signature information. Simulation results indicate the high efficiency of our proposed method.

[1]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[2]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[3]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[4]  William H. Press,et al.  Numerical recipes , 1990 .

[5]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[6]  David R. Cheriton,et al.  Scalable location-based security in wireless networks , 2006 .

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Sinem Coleri Ergen,et al.  Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..

[9]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[10]  John Terry,et al.  OFDM Wireless LANs: A Theoretical and Practical Guide , 2001 .

[11]  Andrew B. Johnson Simulation of digital transmission over mobile channels at 300 kb/s , 1991, IEEE Trans. Commun..

[12]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[13]  Vinko Erceg,et al.  Channel Models for Fixed Wireless Applications , 2001 .

[14]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Santhanakrishnan Anand,et al.  On the Secrecy Capacity of Fading Cognitive Wireless Networks , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[16]  E. Ratazzi,et al.  COOPERATIVE COMMUNICATIONS FOR WIRELESS INFORMATION ASSURANCE: SECURE COOPERATIVE COMMUNICATIONS AND TESTBED DEVELOPMENT , 2007 .

[17]  Xiaohua Li,et al.  Cooperative Communications for Wireless Information Assurance , 2005 .

[18]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[19]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[20]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[21]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[22]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[23]  Didem Kivanc-Tureli,et al.  EPSON: Enhanced Physical Security in OFDM Networks , 2009, 2009 IEEE International Conference on Communications.