A general analysis and design framework for authentication at the physical layer where the authentication information is transmitted concurrently with the data by superimposing a carefully designed secret modulation on the waveforms is introduced.
Abstract:
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread-spectrum communications) exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted concurrently with the data. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth, as do spread-spectrum methods. The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed in block fading channels. The use of the authentication for channel estimation is also considered, and an improved bit-error rate is demonstrated for time-varying channels. Finally, simulation results are given that demonstrate the potential application of this authentication technique.
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid.
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
TL;DR: A model for time-varying communication single-access and multiple-access channels without feedback is presented and the rate of time variation of the channel is related to the loss in mutual information due to imperfect knowledge of the measured channel.
TL;DR: A new method of digital Steganography, entitled spread spectrum image steganography (SSIS), which hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.
TL;DR: This comparison suggests that watermarking most closely resembles communications with side information at the transmitter and or detector, a configuration originally described by Shannon (1958).
TL;DR: A novel algorithm for generating an image hash based on Fourier transform features and controlled randomization is developed and it is shown that the proposed hash function is resilient to content-preserving modifications, such as moderate geometric and filtering distortions.
TL;DR: Methods how robust hash functions can be built and how the hash bits has another application, the robust image digest can be used as a search index for an efficient image database search.
Authentication is the process where claims of identity are verified. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted concurrently with the data. Finally, simulation results are given that demonstrate the potential application of this authentication technique.
Q2. What is the definition of a robust scheme?
A robust scheme is resistant to channel and noise effects and can continue the authentication process in the midst of interference.
Q3. What is the statistic when the tagged signal is received?
When the authors assume perfect channel estimation, message recovery , and tag estimation , the statistic when the tagged signal is received is(20)where conditioned on , is a zero-mean Gaussian variable with variance .
Q4. How can a long enough authentication codeword be used to improve the performance of the data?
with a long enough authentication codeword, a useful authentication system can be achieved with very slight data degradation.
Q5. What is the key used to authenticate?
In order to authenticate, Alice sends a proof of authentication, called a tag,1 together with each message for Bob’s verification.
Q6. What is the way to generate a tag?
Even if the message is recovered with errors, in some cases, the tag can be correctly generated if the tag generating function has some robustness against the message error.
Q7. What is the probability that Eve can have her block accepted?
When the authentication considers multiple blocks and requires a certain number of tags to be verified, Eve may be able to have her block accepted even if it does not contain a valid tag.
Q8. What is the tradeoff between robustness and security?
The tradeoff between robustness and security is fundamental—by allowing more errors in the authentication process, Eve has a better opportunity to sneak in her own messages.
Q9. How does Eve determine which tag symbol?
Eve estimates each tag symbol with some nonzero error, her search space for the key expands depending on the tag symbol equivocation.
Q10. Why is Eve unable to interfere with Alice’s signals?
The reason is that any error in estimating the propagation delay, multipath, and possibly mobility between Alice, Bob, and herself will result in noncoherent interruption.