高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于哈希方法的物理层认证机制

季新生 杨静 黄开枝 易鸣

季新生, 杨静, 黄开枝, 易鸣. 基于哈希方法的物理层认证机制[J]. 电子与信息学报, 2016, 38(11): 2900-2907. doi: 10.11999/JEIT160007
引用本文: 季新生, 杨静, 黄开枝, 易鸣. 基于哈希方法的物理层认证机制[J]. 电子与信息学报, 2016, 38(11): 2900-2907. doi: 10.11999/JEIT160007
JI Xinsheng, YANG Jing, HUANG Kaizhi, YI Ming. Physical Layer Authentication Scheme Based on Hash Method[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2900-2907. doi: 10.11999/JEIT160007
Citation: JI Xinsheng, YANG Jing, HUANG Kaizhi, YI Ming. Physical Layer Authentication Scheme Based on Hash Method[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2900-2907. doi: 10.11999/JEIT160007

基于哈希方法的物理层认证机制

doi: 10.11999/JEIT160007
基金项目: 

国家863计划项目(2015AA01A708),国家自然科学基金(61379006),国家青年科学基金(61501516)

Physical Layer Authentication Scheme Based on Hash Method

Funds: 

The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61379006), The National Science Fund for Excellent Young Scholars (61501516)

  • 摘要: 现有物理层挑战-响应认证机制使用无线信道信息掩藏密钥生成认证响应,一旦攻击方获得合法信道信息,则可直接破解密钥。针对上述问题,该文借鉴曲线匹配原理,提出一种基于哈希方法的物理层认证机制。首先,认证双方提取无线信道特征,并和认证密钥组合得到初始认证向量,该向量被等效为一条曲线;随后,采用具有容错性的单向哈希函数将该曲线映射为低维的哈希矢量,用作认证响应;最后,认证方根据需求设置认证门限,并根据响应的匹配结果进行判决。性能分析表明,所采用的哈希方法实质为欠定方程组,攻击方无法根据低维哈希矢量还原曲线信息,从而无法破解密钥;仿真结果表明,在攻击方窃取了合法信道信息的条件下,在4 dB时,现有挑战-响应机制攻击率约为0.5,该文所提机制可实现攻击率小于10-5 。
  • JIN Cao, MA Maode, LI Hui, et al. A survey on security aspects for LTE and LTE-A networks[J]. IEEE Communications Surveys Tutorials, 2014, 16(1): 283-302. doi: 10.1109/SURV.2013.041513.00174.
    PATWARI N and KASERA S K. Temporal link signature measurements for location distinction[J]. IEEE Transactions on Mobile Computing, 2011, 10(3): 449-462. doi: 10.1109/ TMC.2010.189.
    JORSWIECK E, TOMASIN S, and SEZGIN A. Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing[J]. Proceedings of the IEEE, 2015, 103(10): 1702-1724. doi: 10.1109/JPROC. 2015.2469602.
    ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62. doi: 10.1109/MWC.2010.5601959.
    DEMIRBAS M and SONG Y. An RSSI-based scheme for Sybil attack detection in wireless sensor networks[C]. Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, 2006: 564-570. doi: 10.1109/WOWMOM.2006.27.
    XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. Using the physical layer for wireless authentication in time- variant channels[J]. IEEE Transactions on Wireless Communications, 2008, 7(7): 2571-2579. doi: 10.1109/TWC. 2008.070194.
    LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi: 10.1109/TWC.2016.2535442.
    SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY-CRAM: physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC. 2013.130914.
    张继明. 无线网络中物理层身份认证研究[D]. [硕士论文]. 华中科技大学, 2013.
    ZHANG Jiming. Research on physical-layer identity authentication in wireless networks[D]. [Master dissertation], Huazhong University of Science and Technology, 2013.
    DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE International Conference on Computer Communications, Orlando, 2014: 1276-1284. doi: 10.1109/ INFOCOM. 2014.6848060.
    WU Xiaofu and ZHEN Yan. Physical-layer authentication for multi-carrier transmission[J]. IEEE Communications Letters, 2015, 19(1): 74-77. doi: 10.1109/LCOMM.2014.2375191.
    JAKES W C and COX D C. Microwave Mobile Communications[M]. New Jersey, Wiley-IEEE Press, 1994: 13-39.
    TRAPPE W. The challenges facing physical layer security[J]. IEEE Communications Magazine, 2015, 53(6): 16-20. doi: 10.1109/MCOM.2015.7120011
    吕科, 耿国华, 周明全. 基于哈希方法的空间曲线匹配[J]. 电子学报, 2003, 31(2): 294-296. doi: 10.3321/j.issn:0372-2112. 2003.02.037.
    L Ke, GENG Guohua, and ZHOU Mingquan. Matching of 3D curve based on the hash method[J]. Acta Electronica Sinica, 2003, 31(2): 294-296. doi: 10.3321/j.issn:0372-2112. 2003.02. 037.
    PATZOLD M. Mobile Radio Channels[M]. New York, John Wiley Sons, 2012: 55-147.
    SWAMINATHAN A, MAO Yinian, and WU Min. Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230. doi: 10.1109/TIFS.2006.873601.
    GOERGEN N, CLANCY T C, and NEWMAN T R. Physical layer authentication watermarks through synthetic channel emulation[C]. 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, Singapore, 2010: 1-7. doi: 10.1109/ DYSPAN.2010.5457897.
    GOERGEN N, LIN W S, LIU K J, et al. Authenticating MIMO transmissions using channel-like fingerprinting[C]. Global Telecommunications Conference, Miami, 2010: 1-6. doi: 10.1109/GLOCOM.2010.5684218.
    FONTAN F P and ESPIEIRA P M. Modeling the Wireless Propagation Channel: A Simulation Approach with Matlab[M]. New Jersey, John Wiley Sons, 2008: 105-111.
  • 加载中
计量
  • 文章访问数:  1531
  • HTML全文浏览量:  126
  • PDF下载量:  459
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-01-04
  • 修回日期:  2016-05-23
  • 刊出日期:  2016-11-19

目录

    /

    返回文章
    返回