A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9448211/ |
id |
doaj-f932b8ea010c4aeeab01c1ad57e594f6 |
---|---|
record_format |
Article |
spelling |
doaj-f932b8ea010c4aeeab01c1ad57e594f62021-06-18T23:00:28ZengIEEEIEEE Access2169-35362021-01-019859478595510.1109/ACCESS.2021.30875089448211A Tag-Based PHY-Layer Authentication Scheme Without Key DistributionYongli An0https://orcid.org/0000-0002-7127-731XShikang Zhang1https://orcid.org/0000-0001-9405-8964Zhanlin Ji2https://orcid.org/0000-0003-3527-3773College of Information Engineering, North China University of Science and Technology, Tangshan, ChinaCollege of Information Engineering, North China University of Science and Technology, Tangshan, ChinaCollege of Information Engineering, North China University of Science and Technology, Tangshan, ChinaAuthentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.https://ieeexplore.ieee.org/document/9448211/Authenticationwireless networktag-basedhash algorithmchannel probing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yongli An Shikang Zhang Zhanlin Ji |
spellingShingle |
Yongli An Shikang Zhang Zhanlin Ji A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution IEEE Access Authentication wireless network tag-based hash algorithm channel probing |
author_facet |
Yongli An Shikang Zhang Zhanlin Ji |
author_sort |
Yongli An |
title |
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution |
title_short |
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution |
title_full |
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution |
title_fullStr |
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution |
title_full_unstemmed |
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution |
title_sort |
tag-based phy-layer authentication scheme without key distribution |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2021-01-01 |
description |
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack. |
topic |
Authentication wireless network tag-based hash algorithm channel probing |
url |
https://ieeexplore.ieee.org/document/9448211/ |
work_keys_str_mv |
AT yonglian atagbasedphylayerauthenticationschemewithoutkeydistribution AT shikangzhang atagbasedphylayerauthenticationschemewithoutkeydistribution AT zhanlinji atagbasedphylayerauthenticationschemewithoutkeydistribution AT yonglian tagbasedphylayerauthenticationschemewithoutkeydistribution AT shikangzhang tagbasedphylayerauthenticationschemewithoutkeydistribution AT zhanlinji tagbasedphylayerauthenticationschemewithoutkeydistribution |
_version_ |
1721372695559405568 |