Physical Layer Authentication With High Compatibility Using an Encoding Approach

This paper concerns the problem of improving compatibility in the tag-based Physical-Layer Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA schemes for improving compatibility often sacrifice robustness or introduce extra communication overhead and security vulnerabilities. The main objective of our approach is to reduce the modification ratio of the source message given the tag length via an encoding approach. Based on a tag-encoding function, we propose two encoded tag-based schemes for the scenario of a single block and the scenario of multiple blocks, respectively, which are named as the Encoded Tag-based PLA scheme for Single Block (ET-SB) and the Encoded Tag-based PLA scheme for Multiple Blocks (ET-MB), respectively. We theoretically analyze the performance of the proposed schemes over fading channels and derive the closed-form expressions of the performance analyses. We implement the proposed schemes and conduct extensive performance comparisons through simulations. Our simulation results show that the closed-form expressions of the theoretical results of the proposed schemes perfectly match the corresponding simulation results. When the SNR is 10 dB, the compatibility of the ET-SB and ET-MB schemes improves to 15.63% and 23.45%, respectively, compared to the prior scheme.

[1]  Jaewoo So,et al.  Adaptive Lightweight CNN-Based CSI Feedback for Massive MIMO Systems , 2021, IEEE Wireless Communications Letters.

[2]  Zhong Ming,et al.  Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels , 2021, IEEE Transactions on Dependable and Secure Computing.

[3]  Debashis Ghosh,et al.  Channel Assignment with Power Allocation for Sum Rate Maximization in NOMA Cellular Networks , 2020, 2020 5th International Conference on Computing, Communication and Security (ICCCS).

[4]  Jinho Choi,et al.  Physical layer authentication in wireless communication networks: A survey , 2020, Journal of Communications and Information Networks.

[5]  Xiaohong Jiang,et al.  Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities , 2020, IEEE Internet of Things Journal.

[6]  Alex X. Liu,et al.  Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems , 2020, IEEE/ACM Transactions on Networking.

[7]  Andrei Gurtov,et al.  Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.

[8]  Martin Johnston,et al.  Physical layer authentication scheme with channel based tag padding sequence , 2019, IET Commun..

[9]  Ning Xie,et al.  Slope Authentication at the Physical Layer , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Shengli Zhang,et al.  Blind Authentication at the Physical Layer Under Time-Varying Fading Channels , 2018, IEEE Journal on Selected Areas in Communications.

[11]  Rick S. Blum,et al.  Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.

[12]  Li Sun,et al.  ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack , 2017, 2017 IEEE International Conference on Communications (ICC).

[13]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[14]  Xianbin Wang,et al.  Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.

[15]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[16]  Brian M. Sadler,et al.  Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.

[17]  Kaigui Bian,et al.  Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.

[18]  Vincent K. N. Lau,et al.  Interference Alignment With Partial CSI Feedback in MIMO Cellular Networks , 2014, IEEE Transactions on Signal Processing.

[19]  K. J. Ray Liu,et al.  Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.

[20]  Brian M. Sadler,et al.  MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Xianbin Wang,et al.  Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System , 2011, 2011 IEEE International Conference on Communications (ICC).

[22]  K. J. Ray Liu,et al.  Authenticating MIMO Transmissions Using Channel-Like Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[23]  T. Charles Clancy,et al.  Physical Layer Authentication Watermarks through Synthetic Channel Emulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[24]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[25]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[26]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[27]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[28]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[29]  Mandy Eberhart,et al.  Digital Communication Over Fading Channels , 2016 .