A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution

Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale...

Full description

Bibliographic Details
Main Authors: Yongli An, Shikang Zhang, Zhanlin Ji
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9448211/
id doaj-f932b8ea010c4aeeab01c1ad57e594f6
record_format Article
spelling doaj-f932b8ea010c4aeeab01c1ad57e594f62021-06-18T23:00:28ZengIEEEIEEE Access2169-35362021-01-019859478595510.1109/ACCESS.2021.30875089448211A Tag-Based PHY-Layer Authentication Scheme Without Key DistributionYongli An0https://orcid.org/0000-0002-7127-731XShikang Zhang1https://orcid.org/0000-0001-9405-8964Zhanlin Ji2https://orcid.org/0000-0003-3527-3773College of Information Engineering, North China University of Science and Technology, Tangshan, ChinaCollege of Information Engineering, North China University of Science and Technology, Tangshan, ChinaCollege of Information Engineering, North China University of Science and Technology, Tangshan, ChinaAuthentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.https://ieeexplore.ieee.org/document/9448211/Authenticationwireless networktag-basedhash algorithmchannel probing
collection DOAJ
language English
format Article
sources DOAJ
author Yongli An
Shikang Zhang
Zhanlin Ji
spellingShingle Yongli An
Shikang Zhang
Zhanlin Ji
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
IEEE Access
Authentication
wireless network
tag-based
hash algorithm
channel probing
author_facet Yongli An
Shikang Zhang
Zhanlin Ji
author_sort Yongli An
title A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
title_short A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
title_full A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
title_fullStr A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
title_full_unstemmed A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
title_sort tag-based phy-layer authentication scheme without key distribution
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.
topic Authentication
wireless network
tag-based
hash algorithm
channel probing
url https://ieeexplore.ieee.org/document/9448211/
work_keys_str_mv AT yonglian atagbasedphylayerauthenticationschemewithoutkeydistribution
AT shikangzhang atagbasedphylayerauthenticationschemewithoutkeydistribution
AT zhanlinji atagbasedphylayerauthenticationschemewithoutkeydistribution
AT yonglian tagbasedphylayerauthenticationschemewithoutkeydistribution
AT shikangzhang tagbasedphylayerauthenticationschemewithoutkeydistribution
AT zhanlinji tagbasedphylayerauthenticationschemewithoutkeydistribution
_version_ 1721372695559405568