Abstract
In this paper, we propose an area-oriented authentication framework, which aims to provide a light-weight first authentication by reducing the complexity in acquiring and maintaining many different reference vectors as in the traditional one-by-one authentication framework. Under the proposed framework, we first derive the missing detection probability and the false alarm probability, respectively. Then we quantitatively evaluate the average risks that a spoofer is successfully detected or a legitimate user is falsely alarmed, at any position in a certain area. And correspondingly three kinds of areas are defined as the clear area where the spoofers prefer not to attack, the danger area where the spoofers have pretty high probabilities to attack successfully, and the warning area where the legitimate users are much likely to be falsely reported as attackers. These results depict the security situation distribution of a region, and provide useful insights for network operators to take proper following strategies. Finally, simulations are given to verify our analytical derivations and show the impacts of system parameters.
Similar content being viewed by others
References
Yilmaz M H, Arslan H. A survey: spoofing attacks in physical layer security. In: Proceedings of IEEE Local Computer Networks Conference Workshops, Clearwater Beach, 2015. 812–817
Xiao L, Sheng G, Wan X, et al. Learning-based PHY-layer authentication for underwater sensor networks. IEEE Commun Lett, 2019, 23: 60–63
Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun, 2010, 17: 56–62
Aman M N, Chua K C, Sikdar B. Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J, 2017, 4: 1327–1340
Namal S, Georgantas K, Gurtov A. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography. In: Proceedings of 2013 IEEE Wireless Communications and Networking Conference, Shanghai, 2013. 1830–1835
Johansson N A, Wang Y P E, Eriksson E, et al. Radio access for ultra-reliable and low-latency 5G communications. In: Proceedings of 2015 IEEE International Conference on Communication Workshop (ICCW), London, 2015. 1184–1189
Kamal M, Tariq M. Light-weight security and data provenance for multi-hop Internet of Things. IEEE Access, 2018, 6: 34439–34448
Yang J, Ji X, Huang K, et al. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun, 2019, 13: 144–152
Suzan S, Babak D B. A survey on lightweight cryptographic algorithms. In: Proceedings of TENCON 2018–2018 IEEE Region 10 Conference, Jeju, 2018. 1784–1789
Challa S, Wazid M, Das A K, et al. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 2017, 5: 3028–3043
Xiao L, Greenstein L, Mandayam N, et al. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans Wirel Commun, 2009, 8: 5948–5956
Shi L, Li M, Yu S, et al. BANA: body area network authentication exploiting channel characteristics. IEEE J Sel Areas Commun, 2013, 31: 1803–1816
Zhang K, Liang X, Lu R, et al. Sybil attacks and their defenses in the Internet of Things. IEEE Internet Things J, 2014, 1: 372–383
Demirbas M, Song Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Buffalo-Niagara Falls, 2006. 564–570
Wang X, Hao P, Hanzo L. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag, 2016, 54: 152–158
Xiao L, Wan X, Han Z. PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun, 2018, 17: 1676–1687
Mohamed M, Cheffena M. Received signal strength based gait authentication. IEEE Sens J, 2018, 18: 6727–6734
Li J, Halder B, Stoica P, et al. Computationally efficient angle estimation for signals with known waveforms. IEEE Trans Signal Process, 1995, 43: 2154–2163
Wang Y, Guan X, Cai Y. The impacts of mobility on performance of physical layer secret key based on angle of arrival. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing, Yangzhou, 2016. 1–5
Abdelaziz A, Burton R, Koksal C E. Message authentication and secret key agreement in VANETs via angle of arrival. In: Proceedings of 2016 IEEE Vehicular Networking Conference, Columbus, 2016. 1–2
Zanella A. Best practice in RSS measurements and ranging. IEEE Commun Surv Tut, 2016, 18: 2662–2686
Zhao Y, Liu Y, Yu T, et al. FREDI: robust RSS-based ranging with multipath effect and radio interference. Comput Netw, 2018, 147: 49–63
Zanella A, Bardella A. RSS-based ranging by multichannel RSS averaging. IEEE Wirel Commun Lett, 2014, 3: 10–13
Stoyanova T, Kerasiotis F, Efstathiou K, et al. Modeling of the RSS uncertainty for RSS-based outdoor localization and tracking applications in wireless sensor networks. In: Proceedings of 2010 4th International Conference on Sensor Technologies and Applications, Venice, 2010. 45–50
Achroufene A, Amirat Y, Chibani A. RSS-based indoor localization using belief function theory. IEEE Trans Automat Sci Eng, 2019, 16: 1163–1180
Waadt A E, Wang S, Kocks C, et al. Positioning in multiband OFDM UWB utilizing received signal strength. In: Proceedings of Positioning Navigation and Communication, Dresden, 2010. 308–312
Bhargava V, Sichitiu M L. Physical authentication through localization in wireless local area networks. In: Proceedings of IEEE Global Telecommunications Conference, St. Louis, 2005. 2658–2662
Chen Y, Yang J, Trappe W, et al. Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans Veh Technol, 2010, 59: 2418–2434
Yang J, Chen Y Y, Trappe W, et al. Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans Parallel Distrib Syst, 2013, 24: 44–58
Li N, Geng H, Xia S, et al. An area description framework for physical layer authentication. In: Proceedings of 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, 2019. 1–6
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61941114, 61601051), Beijing Municipal Science and Technology Project (Grant No. Z181100003218005), and the 111 Project of China (Grant No. B16006).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, N., Xia, S., Tao, X. et al. An area based physical layer authentication framework to detect spoofing attacks. Sci. China Inf. Sci. 63, 222302 (2020). https://doi.org/10.1007/s11432-019-2802-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2802-x