scispace - formally typeset
Proceedings ArticleDOI

A Physical-Layer Technique to Enhance Authentication for Mobile Terminals

Reads0
Chats0
TLDR
Simulations in a typical indoor building show that the scheme based on the Neyman-Pearson test is more robust against terminal mobility, and is able to detect spoofing attacks efficiently with small system overhead when the terminal moves with a typical pedestrian speed.
Abstract
We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically, it is based on the spatial variability characteristic of wireless channels, and able to work with moderate terminal mobility. For the authentication of the first frame in each data burst, the legal transmitter uses the saved channel response from the previous burst as the key for authentication of the first frame in the next burst. The key is obtained either via feedback from the receiver, or using the symmetric channel property of a TDD system. Then the authentication of the following frames in the burst is performed either by a Neyman-Pearson hypothesis test, or a least-squares adaptive channel estimator. Simulations in a typical indoor building show that the scheme based on the Neyman-Pearson test is more robust against terminal mobility, and is able to detect spoofing attacks efficiently with small system overhead when the terminal moves with a typical pedestrian speed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Book

Information Theoretic Security

TL;DR: Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks.
Journal ArticleDOI

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

TL;DR: A comprehensive review of the physical layer security in multiuser wireless networks can be found in this article, where the authors provide an overview of the foundations dating back to Shannon and Wyner on information-theoretic security.
Journal ArticleDOI

Using the physical layer for wireless authentication in time-variant channels

TL;DR: A physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal, so that legitimate users can be reliably authenticated and false users can been reliably detected.
Journal ArticleDOI

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

TL;DR: In this paper, the authors provide a comprehensive taxonomy of wireless features that can be used in fingerprinting, and provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches.
References
More filters
Book

Adaptive Filter Theory

Simon Haykin
TL;DR: In this paper, the authors propose a recursive least square adaptive filter (RLF) based on the Kalman filter, which is used as the unifying base for RLS Filters.
Proceedings ArticleDOI

An RSSI-based scheme for sybil attack detection in wireless sensor networks

TL;DR: This work presents a robust and lightweight solution for sybil attack problem based on received signal strength indicator (RSSI) readings of messages and shows that even though RSSI is time-varying and unreliable in general and radio transmission is non-isotropic, it is feasible to overcome these problems.
Journal ArticleDOI

Using the physical layer for wireless authentication in time-variant channels

TL;DR: A physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal, so that legitimate users can be reliably authenticated and false users can been reliably detected.
Journal ArticleDOI

Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels

TL;DR: Using the theory of reciprocity for antennas and electromagnetic propagation, a key distribution method is proposed that uses the ultrawideband channel pulse response between two transceivers as a source of common randomness that is not available to enemy observers in other locations.
Proceedings ArticleDOI

Detecting identity-based attacks in wireless networks using signalprints

TL;DR: It is shown that a transmitting device can be robustly identified by its signalprint, a tuple of signal strength values reported by access points acting as sensors, allowing detection of a large class of identity-based attacks with high probability.
Related Papers (5)