Computer Science ›› 2016, Vol. 43 ›› Issue (2): 188-191.doi: 10.11896/j.issn.1002-137X.2016.02.041

Previous Articles     Next Articles

Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism

ZHANG Dan, WU Xiao-fu, YAN Jun and ZHU Wei-ping   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The physical layer authentication recognizes the identities of communication users by exploiting the characteristics of physical layer resources,which can effectively prevent illegal users from accessing the wireless network in order to enhance the information security of wireless network.PHY-CRAM proposed recently is a typical physical layer challenge response authentication mechanism,and its performance mainly depends on the simulation.So this paper attempted to theoretically analyze the authentication performance and derived the analytical expressions of successful authentication rate and false acceptance rate.The derived results show that the correlation coefficient of PHY-CRAM authentication standards obeys Rice distribution,and successful authentication rate and false acceptance rate can be calculated by Marcum Q function.The computer simulation results show that the probability density curve of correlation coefficient is coincident with that of Rice distribution,and the longer the secret key is,the better the fitness is.The theory value of receiver operating characteristic curve is identical with the statistical value.

Key words: Challenge response authentication,OFDM technology,Receiver operating characteristic curve,Theoretical analysis

[1] Yu P L,Baras J S,Sadler B M.Physical-layer authentication[J].IEEE Trans.Inf.Forensics Security,2008,3(1):38-51
[2] Lin Tong,Huang Kai-zhi,Luo Wen-yu.A Multicarrier-basedPhysical Layer Security Scheme for the Multicast Systems[J].Journal of Electronics & Information Technology,2013,35(6):1338-1343(in Chinese) 林通,黄开枝,罗文宇.一种基于多载波的多播系统物理层安全方案[J].电子与信息学报,2013,35(6):1338-1343
[3] Baracca P,Laurenti N,Tomasin S.Physical layer authentication over MIMO fading wiretap channels[J].IEEE Trans.Wireless Commun.,2012,11(7):2564-2573
[4] Li Wei,Chen Bin,Wei Ji-bo,et al.Secure Communications viaSending Artifical Noise by the Receiver:Ergodic Secure Region Analysis[J].Journal of Signal Processing,2012,28(9):1314-1320(in Chinese) 李为,陈彬,魏急波,等.基于接收机人工噪声的物理层安全技术及保密区域分析[J].信号处理,2012,28(9):1314-1320
[5] Li Xiang-yu,Jin Liang,Huang Kai-zhi,et al.A Physical Layer Security Transmission Mechanism of Relay System Based on Joint Channel Characteristics[J].Chinese Journal of Compu-ters,2012,35(7):1439-1406(in Chinese) 李翔宇,金梁,黄开枝,等.基于联合信道特征的中继物理层安全传输机制[J].计算机学报,2012,35(7):1439-1406
[6] Xiao L,Greenstein L,Mandayam N,et al.Using the physical layer for wireless authentication in time-variant channels[J].IEEE Trans.Wireless Commun.,2008,7(7):2571-2579
[7] Hou Wei-kun,Wang Xian-bin,Jean Y C,et al.Physical layer authentication for mobile systems with time-varying carrier frequency offsets[J].IEEE Trans.Commun.,2014,2(5):1658-1667
[8] Dai Qiao,Song Hua-wei,Jin Liang,et al.Physical-layer Authentication and Key Distribution Mechanism Based on Equivalent Channel[J].Science China,2014,44(12):1580-1592(in Chinese) 戴峤,宋华伟,金梁,等.基于等效信道的物理层认证和密钥分发机制[J].中国科学,2014,4(12):1580-1592
[9] Zeng K,Govindan K,Mohapatra P.Non-cryptographic authentication and identification in wireless networks[J].IEEE Trans.Wireless Commun.,2010,17(5):56-62
[10] Liu Y,Ning P.Enhanced wireless channel authentication using time-synched link signature,2012 [C]∥ IEEE International Conference on Computer Communications (INFOCOM’12).Orlando,FL,2012:2636-2640
[11] Wu Xiao-fu,Yang Zhen.Physical-layer authentication for multi-carrier transmission[J].IEEE Commun.Lett.,2014,9(1):74-77
[12] Ma Ting,Ren Meng-yin,Wen Hong,et al.Bi-Directional Physical Layer-Assist Authentication in Smart-Meter System[J].China Information Security,2014(11):85-87(in Chinese) 马婷,任梦吟,文红,等.智能电表系统中的双向物理层辅助认证技术[J].信息安全与通信保密,2014(11):85-87
[13] Shan Dan,Zeng Kai,Xiang Wei-dong,et al.PHY-CRAM:Physical layer challenge-response authentication mechanism for wireless networks[J].IEEE J.Sel.Areas Commun.,2013,31(9):1817-1827
[14] Tugnait J K.Wireless user authentication via comparison ofpower spectral densities[J].IEEE J.Sel.Areas Commun.,2013,1(9):1791-1802
[15] 3GPP.Technical specification group radio access networks-deployment aspects:TR25.943[R].2009
[16] Yahong R.Improved Models for the Generation of Multiple Uncorrelated Rayleigh Fading Waveforms[J].IEEE Commun.Lett.,2002,6(6):256-258

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!