基于標(biāo)簽信號(hào)的物理層安全認(rèn)證
doi: 10.11999/JEIT170672
基金項(xiàng)目:
國(guó)家863計(jì)劃項(xiàng)目(2015AA01A708)
Physical Layer Authentication Based on Tag Signal
Funds:
National 863 Program of China (2015AA01A708)
-
摘要: 該文提出一種基于疊加標(biāo)簽信號(hào)進(jìn)行認(rèn)證的新方法。利用合法通信雙方預(yù)先共享密鑰和信道具有短時(shí)互易性的優(yōu)勢(shì),在發(fā)送方利用擴(kuò)譜碼和量化的信道值生成標(biāo)簽信號(hào),并與通信信號(hào)疊加發(fā)送,在接收方能夠檢測(cè)并鑒別標(biāo)簽信號(hào),而且不影響通信信號(hào)的正常解調(diào)。這種方法不需要復(fù)雜的密碼算法,減小了通信過程中的計(jì)算量,而且能夠有效地防范被動(dòng)竊聽和主動(dòng)攻擊。仿真結(jié)果表明,該方法有較高的實(shí)用價(jià)值。
-
關(guān)鍵詞:
- 物理層安全 /
- 標(biāo)簽信號(hào) /
- 認(rèn)證
Abstract: This paper proposes a new method of authentication based on piling up tag signal. Using the advantage of legality sides sharing a private key and having coherent channel state information in short time, the sender produces a tag signal from spread frequency code and measures channel state information, then overlaps the tag signal on the communicational signal, the receiver can detect the correct tag signal and demodulate the communicational signal. This method avoids using complex cryptographic algorithm, reduces the amount of calculation, and prevents passive eavesdropping and active attack effectively. Simulation results show that this method has high use value.-
Key words:
- Physical layer security /
- Tag signal /
- Authentication
-
李中獻(xiàn), 詹榜華, 楊義先. 認(rèn)證理論與技術(shù)的發(fā)展[J]. 電子學(xué)報(bào), 1999, 27(1): 98-102. LI Zhongxian, ZHAN Banghua, and YANG Yixian. A survey of identification and authentication[J]. Acta Electronica Sinica, 1999, 27(1): 98-102. SIMMONS G J. Authentication theory/coding theory[C]. Proceedings of CRYPTO 84 on Advances in Cryptology, New York, USA, 1985: 411-431. MAURER U. Authentication theory and hypothesis testing [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1350-1356. doi: 10.1109/18.850674. WANG Xianbin, HAO Peng, and HANZO Lajos. Physical- layer authentication for wireless security enhancement: current challenges and future developments[J]. IEEE Communications Magazine, 2016, 54(6): 152-158. doi: 10.1109/MCOM.2016.7498103. PAUL L Y, BARAS J S, and SADLER B M. Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 38-51. doi: 10.1109/ TIFS.2007.916273. PAUL L Y, BARAS J S, and SADLER B M. Multicarrier authentication at the physical layer[C]. Proceedings of the 2008 International Symposium on a World of Wireless Mobile and Multimedia Networks, Newport Beach, CA, USA, 2008: 1-6. doi: 10.1109/WOWMOM.2008.4594926. LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi: 10.1109/TWC.2016.2535442. WANG Ning, JIANG Ting, L Shichao, et al. Physical- layer authentication based on extreme learning machine [J]. IEEE Communications Letters, 2017, 21(7): 1557-1560. doi: 10.1109/LCOMM.2017.2690437. DAI Chuping, YANG Jianxi, QIN Yongning, et al. Physical layer authentication algorithm based on SVM[C]. Proceedings of 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 2016: 1597-1601. RAHMAN M M U, ABBASI Q H, CHOPRA N, et al. Physical layer authentication in nano networks at terahertz frequencies for biomedical applications[J]. IEEE Access, 2017, 5: 7808-7815. doi: 10.1109/ACCESS.2017.2700330. ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62. BARACCA P, LAURENTI N, and TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. doi: 10.1109/TWC.2012.051512.111481. KUMAR V, PARK J M, CLANCY T C, et al. PHY-layer authentication by introducing controlled inter symbol interference[C]. Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, USA, 2013: 10-18. doi: 10.1109/CNS.2013. 6682687. XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. A physical-layer technique to enhance authentication for mobile terminals[C]. Proceedings of IEEE International Conference on Communications, Beijing, 2008: 1520-1524. doi: 10.1109/ICC.2008.294. XIAO Liang, GREENSTEIN L, MANDAYAM N, et al. Fingerprints in the ether: Using the physical layer for wireless authentication[C]. Proceedings of IEEE International Conference on Communications, Glasgow, UK, 2007: 4646-4651. doi: 10.1109/ICC.2007.767. TUGNAIT J K and KIM H. A channel-based hypothesis testing approach to enhance user authentication in wireless networks[C]. Proceedings of Second International Conference on Communication Systems and Networks, Bangalore, India, 2010: 1-9. doi: 10.1109/COMSNETS. 2010.5432018. SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY- CRAM: Physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC.2013.130914. DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE INFOCOM, Toronto, Canada, 2014: 1276-1284. doi: 10.1109/INFOCOM.2014.6848060. MOLIRE R, DELAVEAU F, NGASSA C L K, et al. Tag signals for early authentication and secret key generation in wireless public networks[C]. European Conference on Networks and Communications, Paris, 2015: 108-112. doi: 10.1109/EuCNC.2015.7194050. 張余, 許金勇, 柳永祥, 等. 基于相關(guān)標(biāo)識(shí)符的頻譜水印嵌入與提取方法[J]. 電波科學(xué)學(xué)報(bào), 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701. ZHANG Yu, XU Jinyong, LIU Yongxiang, et al. Spectrum watermark embedding and extracting methodbased on correlation identifier[J]. Chinese Journal of Radio Science, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701. ZHANG Jinling, WEN Hong, SONG Huanhuan, et al. Using basis expansion model for physical layer authentication in time-variant system[C]. IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 2016: 348-349. doi: 10.1109/CNS.2016.7860505. 曾璐, 謝曉堯. 基于MATLAB擴(kuò)譜通信系統(tǒng)誤碼率的研究[J]. 通信技術(shù), 2011, 44(11): 25-26. ZENG Lu and XIE Xiaoyao. Study on bit error rate of spread spectrum communication system based on MATLAB [J]. Communications Technology, 2011, 44(11): 25-26. JAKES W C and COX D C. Microwave Mobile Communications[M]. Wiley-IEEE Press, 1994, Ch 1. -
計(jì)量
- 文章訪問數(shù): 1552
- HTML全文瀏覽量: 291
- PDF下載量: 143
- 被引次數(shù): 0