Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Wireless physical layer authentication via fingerprint embedding

Published: 01 June 2015 Publication History

Abstract

Authentication is a fundamental requirement for secure communications. In this article, we describe a general framework for fingerprint embedding at the physical layer in order to provide message authentication that is secure and bandwidth-efficient. Rather than depending on channel or device characteristics that are outside of our control, deliberate fingerprint embedding for message authentication enables control over performance trade-offs by design. Furthermore, low-power fingerprint designs enhance security by making the authentication tags less accessible to adversaries. We define metrics for communications and authentication performance, and discuss the trade-offs in system design. Results from our wireless software-defined radio experiments validate the theory and demonstrate the low complexity, practicality, and enhanced security of the approach.

References

[1]
A. K. Jain, A. A. Ross, and K. Nandakumar, Introduction to Biometrics, Springer, 2011.
[2]
B. Danev and S. Čapkun, “Transient-Based Identification of Wireless Sensor Nodes,” Proc. ACM/IEEE IPSN, 2009.
[3]
B. Danev et al., “Attacks on Physical-Layer Identification,” Proc. 3th ACM Conf. Wireless Network Security, 2010. pp. 89–98.
[4]
R. Gerdes et al., “Physical-Layer Identification of Wired Ethernet Devices,” IEEE Trans. Info. Forensics Security, vol. 7. no. 4. Aug. 2012. pp. 1339–53.
[5]
L. Xiao et al., “Using the Physical Layer for Wireless Authentication in Time-Variant Channels,” IEEE Trans. Wireless Commun., vol. 7 no. 7, July 2008, pp. 2571–79.
[6]
U. Ruhrmair, S. Devadas, and F. Koushanfar, “Security Based on Physical Unclonability and Disorder,” Introduction to Hardware Security and Trust, M. Tehranipoor and C. Wang Eds., Springer, 2011.
[7]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001.
[8]
P. Yu and B. Sadler, “MIMO Authentication via Deliberate Fingerprinting at the Physical Layer,” IEEE Trans. Info. Forensics Security, vol. 6, no. 3, 2011, pp. 606–15.
[9]
P. Yu, J. Baras, and B. Sadler, “Physical-Layer Authentication,” IEEE Trans. Info. Forensics Security, vol. 3, no. 1, Mar. 2008, pp. 38–51.
[10]
P. Yu, “Multicarrier Authentication at the Physical Layer,” Proc. Int'l. Symp. on a World of Wireless, Mobile and Multimedia Networks, 2008, pp. 1–6.
[11]
Ettus Research – Product Detail, Mar. 2013; https://www.ettus.com/product/details/USRP-PKG
[12]
G. Verma, P. Yu, and B. Sadler, “Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios,” IEEE Access, vol. 3, 2015, pp. 81–88.
[13]
G. Verma and P. L. Yu, “A MATLAB Library for Rapid Prototyping of Wireless Communications Algorithms with the USRP Radio Family,” U.S. Army Research Lab., tech. rep., 2013.
[14]
U. Maurer, “Authentication Theory and Hypothesis Testing,” IEEE Trans. Info. Theory, vol. 46, no. 4, July 2000, pp. 1350–56.
[15]
T. Cover and J. Thomas, Elements of Information Theory, Wiley-Interscience, 1991.

Cited By

View all
  • (2024)An Optimization Framework for Active Physical-Layer AuthenticationIEEE Transactions on Mobile Computing10.1109/TMC.2022.321705523:1(164-179)Online publication date: 1-Jan-2024
  • (2024)Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.332732726:1(347-388)Online publication date: 1-Jan-2024
  • (2023)Multi-User Physical-Layer Authentication and ClassificationIEEE Transactions on Wireless Communications10.1109/TWC.2023.324002122:9(6171-6184)Online publication date: 1-Sep-2023
  • Show More Cited By

Index Terms

  1. Wireless physical layer authentication via fingerprint embedding
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image IEEE Communications Magazine
            IEEE Communications Magazine  Volume 53, Issue 6
            June 2015
            224 pages

            Publisher

            IEEE Press

            Publication History

            Published: 01 June 2015

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 17 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)An Optimization Framework for Active Physical-Layer AuthenticationIEEE Transactions on Mobile Computing10.1109/TMC.2022.321705523:1(164-179)Online publication date: 1-Jan-2024
            • (2024)Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.332732726:1(347-388)Online publication date: 1-Jan-2024
            • (2023)Multi-User Physical-Layer Authentication and ClassificationIEEE Transactions on Wireless Communications10.1109/TWC.2023.324002122:9(6171-6184)Online publication date: 1-Sep-2023
            • (2023)Tag-Based PHY-Layer Authentication for RIS-Assisted Communication SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.323386220:6(4778-4792)Online publication date: 1-Nov-2023
            • (2021)Machine Learning–based Cyber Attacks Targeting on Controlled InformationACM Computing Surveys10.1145/346517154:7(1-36)Online publication date: 18-Jul-2021
            • (2021)Performance Analysis of Tag Embedded Based Message Authentication Scheme2021 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM46510.2021.9685114(01-06)Online publication date: 7-Dec-2021
            • (2020)A Novel Hybrid MSK Modulation Scheme for Additional Data Transmission2020 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC45663.2020.9120549(1-6)Online publication date: 25-May-2020
            • (2018)Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2018.8580677(1-6)Online publication date: 9-Sep-2018
            • (2018)Blind Authentication at the Physical Layer Under Time-Varying Fading ChannelsIEEE Journal on Selected Areas in Communications10.1109/JSAC.2018.282458336:7(1465-1479)Online publication date: 18-Oct-2018

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media