Advanced Search
Volume 40 Issue 5
May  2018
Turn off MathJax
Article Contents
SONG Huawei, JIN Liang, ZHANG Shengjun. Physical Layer Authentication Based on Tag Signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672
Citation: SONG Huawei, JIN Liang, ZHANG Shengjun. Physical Layer Authentication Based on Tag Signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672

Physical Layer Authentication Based on Tag Signal

doi: 10.11999/JEIT170672
Funds:

National 863 Program of China (2015AA01A708)

  • Received Date: 2017-07-07
  • Rev Recd Date: 2017-12-21
  • Publish Date: 2018-05-19
  • This paper proposes a new method of authentication based on piling up tag signal. Using the advantage of legality sides sharing a private key and having coherent channel state information in short time, the sender produces a tag signal from spread frequency code and measures channel state information, then overlaps the tag signal on the communicational signal, the receiver can detect the correct tag signal and demodulate the communicational signal. This method avoids using complex cryptographic algorithm, reduces the amount of calculation, and prevents passive eavesdropping and active attack effectively. Simulation results show that this method has high use value.
  • loading
  • 李中献, 詹榜华, 杨义先. 认证理论与技术的发展[J]. 电子学报, 1999, 27(1): 98-102.
    LI Zhongxian, ZHAN Banghua, and YANG Yixian. A survey of identification and authentication[J]. Acta Electronica Sinica, 1999, 27(1): 98-102.
    SIMMONS G J. Authentication theory/coding theory[C]. Proceedings of CRYPTO 84 on Advances in Cryptology, New York, USA, 1985: 411-431.
    MAURER U. Authentication theory and hypothesis testing [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1350-1356. doi: 10.1109/18.850674.
    WANG Xianbin, HAO Peng, and HANZO Lajos. Physical- layer authentication for wireless security enhancement: current challenges and future developments[J]. IEEE Communications Magazine, 2016, 54(6): 152-158. doi: 10.1109/MCOM.2016.7498103.
    PAUL L Y, BARAS J S, and SADLER B M. Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 38-51. doi: 10.1109/ TIFS.2007.916273.
    PAUL L Y, BARAS J S, and SADLER B M. Multicarrier authentication at the physical layer[C]. Proceedings of the 2008 International Symposium on a World of Wireless Mobile and Multimedia Networks, Newport Beach, CA, USA, 2008: 1-6. doi: 10.1109/WOWMOM.2008.4594926.
    LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi: 10.1109/TWC.2016.2535442.
    WANG Ning, JIANG Ting, L Shichao, et al. Physical- layer authentication based on extreme learning machine [J]. IEEE Communications Letters, 2017, 21(7): 1557-1560. doi: 10.1109/LCOMM.2017.2690437.
    DAI Chuping, YANG Jianxi, QIN Yongning, et al. Physical layer authentication algorithm based on SVM[C]. Proceedings of 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 2016: 1597-1601.
    RAHMAN M M U, ABBASI Q H, CHOPRA N, et al. Physical layer authentication in nano networks at terahertz frequencies for biomedical applications[J]. IEEE Access, 2017, 5: 7808-7815. doi: 10.1109/ACCESS.2017.2700330.
    ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62.
    BARACCA P, LAURENTI N, and TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. doi: 10.1109/TWC.2012.051512.111481.
    KUMAR V, PARK J M, CLANCY T C, et al. PHY-layer authentication by introducing controlled inter symbol interference[C]. Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, USA, 2013: 10-18. doi: 10.1109/CNS.2013. 6682687.
    XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. A physical-layer technique to enhance authentication for mobile terminals[C]. Proceedings of IEEE International Conference on Communications, Beijing, 2008: 1520-1524. doi: 10.1109/ICC.2008.294.
    XIAO Liang, GREENSTEIN L, MANDAYAM N, et al. Fingerprints in the ether: Using the physical layer for wireless authentication[C]. Proceedings of IEEE International Conference on Communications, Glasgow, UK, 2007: 4646-4651. doi: 10.1109/ICC.2007.767.
    TUGNAIT J K and KIM H. A channel-based hypothesis testing approach to enhance user authentication in wireless networks[C]. Proceedings of Second International Conference on Communication Systems and Networks, Bangalore, India, 2010: 1-9. doi: 10.1109/COMSNETS. 2010.5432018.
    SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY- CRAM: Physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC.2013.130914.
    DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE INFOCOM, Toronto, Canada, 2014: 1276-1284. doi: 10.1109/INFOCOM.2014.6848060.
    MOLIRE R, DELAVEAU F, NGASSA C L K, et al. Tag signals for early authentication and secret key generation in wireless public networks[C]. European Conference on Networks and Communications, Paris, 2015: 108-112. doi: 10.1109/EuCNC.2015.7194050.
    张余, 许金勇, 柳永祥, 等. 基于相关标识符的频谱水印嵌入与提取方法[J]. 电波科学学报, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
    ZHANG Yu, XU Jinyong, LIU Yongxiang, et al. Spectrum watermark embedding and extracting methodbased on correlation identifier[J]. Chinese Journal of Radio Science, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
    ZHANG Jinling, WEN Hong, SONG Huanhuan, et al. Using basis expansion model for physical layer authentication in time-variant system[C]. IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 2016: 348-349. doi: 10.1109/CNS.2016.7860505.
    曾璐, 谢晓尧. 基于MATLAB扩谱通信系统误码率的研究[J]. 通信技术, 2011, 44(11): 25-26.
    ZENG Lu and XIE Xiaoyao. Study on bit error rate of spread spectrum communication system based on MATLAB [J]. Communications Technology, 2011, 44(11): 25-26.
    JAKES W C and COX D C. Microwave Mobile Communications[M]. Wiley-IEEE Press, 1994, Ch 1.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1525) PDF downloads(143) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return