Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Optimization Framework for Active Physical-Layer Authentication

Published: 01 January 2024 Publication History

Abstract

This paper concerns the problem of the parameter optimization of an active Physical-Layer Authentication (PLA) scheme, which is crucial for minimizing the distortion on the base signal carrying the original message caused by embedding a tag. An inappropriate parameter may significantly lower the efficiency of the entire period of message transmission. In this paper, we propose an optimization framework for an active PLA scheme and further propose a new systematic metric, defined as Secure Authentication Efficiency (SAE). In the proposed framework, we minimize the aforementioned distortion by tuning three parameters, i.e., the Probability of Message Transmission (PMT), the Probability of Message Outage (PMO), and the Probability of Secure Authentication (PSA). The proposed optimization framework deepens the understanding of the correlation between the parameters of an active PLA scheme and the conditions of a wireless channel, and allows us to systematically optimize the parameters of the active PLA scheme. Then, we establish an objective function by maximizing the SAE with both PMT and PMO constraints. We implement our approach and conduct extensive performance comparisons. Our experimental results show that when the SNR at the receiver is more than 15 dB, our approach achieves an average SAE of greater than 80%, whereas the prior scheme without parameter optimization degenerates to zero SAE under some conditions, e.g., high SNR at adversary or high communication rate.

References

[1]
N. Xie, Z. Li, and H. Tan, “A survey of physical layer authentication in wireless communications,” IEEE Commun. Surv. Tut., vol. 23, no. 1, pp. 283–310, First Quarter 2021.
[2]
J. B. Perazzone, P. L. Yu, B. M. Sadler, and R. S. Blum, “Cryptographic side-channel signaling and authentication via fingerprint embedding,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 9, pp. 2216–2225, Sep. 2018.
[3]
P. Zhang, J. Liu, Y. Shen, H. Li, and X. Jiang, “Lightweight tag-based PHY-layer authentication for IoT devices in smart cities,” IEEE IoT J., vol. 7, no. 5, pp. 3977–3990, May 2020.
[4]
P. Zhang, Y. Shen, X. Jiang, and B. Wu, “Physical layer authentication jointly utilizing channel and phase noise in MIMO systems,” IEEE Trans. Commun., vol. 68, no. 4, pp. 2446–2458, Apr. 2020.
[5]
N. Xie and S. Zhang, “Blind authentication at the physical layer under time-varying fading channels,” IEEE J. Sel. Areas Commun., vol. 36, no. 7, pp. 1465–1479, Jul. 2018.
[6]
N. Xie, S. Zhang, and A. X. Liu, “Physical-layer authentication in non-orthogonal multiple access systems,” IEEE/ACM Trans. Netw., vol. 28, no. 3, pp. 1144–1157, Jun. 2020.
[7]
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.
[8]
M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. S. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675–685, Dec. 2011.
[9]
X. Tan, K. Borle, W. Du, and B. Chen, “Cryptographic link signatures for spectrum usage authentication in cognitive radio,” in Proc. ACM Conf. Wireless Netw. Secur., 2011, pp. 79–90.
[10]
N. Xie, C. Chen, and Z. Ming, “Security model of authentication at the physical layer and performance analysis over fading channels,” IEEE Trans. Dependable Secure Comput., vol. 6, no. 4, pp. 1355–1369, Jan./Feb. 2021.
[11]
P. L. Yu, J. S. Baras, and B. M. Sadler, “Physical-layer authentication,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38–51, Mar. 2008.
[12]
P. L. Yu and B. M. Sadler, “MIMO authentication via deliberate fingerprinting at the physical layer,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 606–615, Sep. 2011.
[13]
X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surv. Tut., vol. 19, no. 2, pp. 1027–1053, Second Quarter 2017.
[14]
L. Yang, Z. Zhang, B. Y. Zhao, C. Kruegel, and H. Zheng, “Enforcing dynamic spectrum access with spectrum permits,” in Proc. IEEE Int. Symp. Dynamic Spectr. Access Netw., 2012, pp. 195–204.
[15]
V. Kumar, J. M. Park, and K. Bian, “Blind transmitter authentication for spectrum security and enforcement,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 787–798.
[16]
V. Kumar, J. M. J. Park, and K. Bian, “PHY-layer authentication using duobinary signaling for spectrum enforcement,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 5, pp. 1027–1038, May 2016.
[17]
J. B. Perazzone, L. Y. Paul, B. M. Sadler, and R. S. Blum, “Artificial noise-aided MIMO physical layer authentication with imperfect CSI,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 2173–2185, 2021.
[18]
G. Verma, P. Yu, and B. M. Sadler, “Physical layer authentication via fingerprint embedding using software-defined radios,” IEEE Access, vol. 3, pp. 81–88, 2015.
[19]
P. L. Yu, G. Verma, and B. M. Sadler, “Wireless physical layer authentication via fingerprint embedding,” IEEE Commun. Mag., vol. 53, no. 6, pp. 48–53, Jun. 2015.
[20]
N. Xie, Q. Zhang, J. Chen, and H. Tan, “Privacy-preserving physical-layer authentication for non-orthogonal multiple access systems,” IEEE J. Sel. Areas Commun., vol. 40, no. 4, pp. 1371–1385, Apr. 2022.
[21]
S. J. Maeng, Y. Yapıcı, İ. Güvenç, A. Bhuyan, and H. Dai, “Precoder design for physical-layer security and authentication in massive MIMO UAV communications,” IEEE Trans. Veh. Technol., vol. 71, no. 3, pp. 2949–2964, Mar. 2022.
[22]
A. Goldsmith, Wireless Communications. Cambridge, U.K.: Cambridge Univ. Press, 2005.
[23]
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, Oct. 2017.
[24]
S. Arnon, Visible Light Communication. Cambridge, U.K.: Cambridge Univ. Press, 2015.
[25]
S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint,” IEEE Commun. Surv. Tut., vol. 18, no. 4, pp. 2624–2661, Fourth Quarter 2016.
[26]
J. Winters, “On the capacity of radio communication systems with diversity in a rayleigh fading environment,” IEEE J. Sel. Areas Commun., vol. 5, no. 5, pp. 871–878, Jun. 1987.
[27]
J. Hu, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert wireless communications with channel inversion power control in rayleigh fading,” IEEE Trans. Veh. Technol., vol. 68, no. 12, pp. 12 135–12 149, Dec. 2019.
[28]
M. Khormuji, P. Wang, M. J. Emadi, and B. M. Popović, “On the achievable rate of MISO fading channels with instantaneous CSI only at the transmitter,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2710–2714, Dec. 2020.
[29]
H. Viswanathan, “Capacity of markov channels with receiver CSI and delayed feedback,” IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 761–771, Mar. 1999.

Cited By

View all
  • (2023)PhyFinAtt: An Undetectable Attack Framework Against PHY Layer Fingerprint-Based WiFi AuthenticationIEEE Transactions on Mobile Computing10.1109/TMC.2023.333895423:7(7753-7770)Online publication date: 4-Dec-2023
  • (undefined)Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive SurveyACM Computing Surveys10.1145/3715319

Index Terms

  1. An Optimization Framework for Active Physical-Layer Authentication
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Mobile Computing
          IEEE Transactions on Mobile Computing  Volume 23, Issue 1
          Jan. 2024
          1000 pages

          Publisher

          IEEE Educational Activities Department

          United States

          Publication History

          Published: 01 January 2024

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 29 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)PhyFinAtt: An Undetectable Attack Framework Against PHY Layer Fingerprint-Based WiFi AuthenticationIEEE Transactions on Mobile Computing10.1109/TMC.2023.333895423:7(7753-7770)Online publication date: 4-Dec-2023
          • (undefined)Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive SurveyACM Computing Surveys10.1145/3715319

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media