计算机科学 ›› 2016, Vol. 43 ›› Issue (2): 188-191.doi: 10.11896/j.issn.1002-137X.2016.02.041

• 信息安全 • 上一篇    下一篇

PHY-CRAM物理层激励响应认证机制的性能分析

张丹,吴晓富,颜俊,朱卫平   

  1. 南京邮电大学通信与信息工程学院 南京210003,南京邮电大学通信与信息工程学院 南京210003,南京邮电大学通信与信息工程学院 南京210003,南京邮电大学通信与信息工程学院 南京210003
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(61372123)资助

Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism

ZHANG Dan, WU Xiao-fu, YAN Jun and ZHU Wei-ping   

  • Online:2018-12-01 Published:2018-12-01

摘要: 物理层认证是利用物理层资源的特性识别通信用户身份,可以有效地阻止非法用户的接入与访问,加强无线网络的信息安全性。PHY-CRAM是最近提出的一种典型的物理层激励响应认证机制,目前其性能主要依赖于仿真。尝试对其认证性能进行理论分析,推导了成功认证概率和错误接收概率的解析表达式。推导结果表明:PHY-CRAM认证准则中的相关系数服从莱斯分布,成功认证概率和错误接收概率均可用Marcum Q函数来计算。进一步的计算机仿真结果显示:相关系数的概率密度曲线与莱斯分布的概率密度曲线相吻合,且认证使用的密钥越长,吻合性越好;接收操作特性(ROC)曲线的理论值和统计值是一致的。

关键词: 激励响应认证,OFDM技术,接收操作特性曲线,理论分析

Abstract: The physical layer authentication recognizes the identities of communication users by exploiting the characteristics of physical layer resources,which can effectively prevent illegal users from accessing the wireless network in order to enhance the information security of wireless network.PHY-CRAM proposed recently is a typical physical layer challenge response authentication mechanism,and its performance mainly depends on the simulation.So this paper attempted to theoretically analyze the authentication performance and derived the analytical expressions of successful authentication rate and false acceptance rate.The derived results show that the correlation coefficient of PHY-CRAM authentication standards obeys Rice distribution,and successful authentication rate and false acceptance rate can be calculated by Marcum Q function.The computer simulation results show that the probability density curve of correlation coefficient is coincident with that of Rice distribution,and the longer the secret key is,the better the fitness is.The theory value of receiver operating characteristic curve is identical with the statistical value.

Key words: Challenge response authentication,OFDM technology,Receiver operating characteristic curve,Theoretical analysis

[1] Yu P L,Baras J S,Sadler B M.Physical-layer authentication[J].IEEE Trans.Inf.Forensics Security,2008,3(1):38-51
[2] Lin Tong,Huang Kai-zhi,Luo Wen-yu.A Multicarrier-basedPhysical Layer Security Scheme for the Multicast Systems[J].Journal of Electronics & Information Technology,2013,35(6):1338-1343(in Chinese) 林通,黄开枝,罗文宇.一种基于多载波的多播系统物理层安全方案[J].电子与信息学报,2013,35(6):1338-1343
[3] Baracca P,Laurenti N,Tomasin S.Physical layer authentication over MIMO fading wiretap channels[J].IEEE Trans.Wireless Commun.,2012,11(7):2564-2573
[4] Li Wei,Chen Bin,Wei Ji-bo,et al.Secure Communications viaSending Artifical Noise by the Receiver:Ergodic Secure Region Analysis[J].Journal of Signal Processing,2012,28(9):1314-1320(in Chinese) 李为,陈彬,魏急波,等.基于接收机人工噪声的物理层安全技术及保密区域分析[J].信号处理,2012,28(9):1314-1320
[5] Li Xiang-yu,Jin Liang,Huang Kai-zhi,et al.A Physical Layer Security Transmission Mechanism of Relay System Based on Joint Channel Characteristics[J].Chinese Journal of Compu-ters,2012,35(7):1439-1406(in Chinese) 李翔宇,金梁,黄开枝,等.基于联合信道特征的中继物理层安全传输机制[J].计算机学报,2012,35(7):1439-1406
[6] Xiao L,Greenstein L,Mandayam N,et al.Using the physical layer for wireless authentication in time-variant channels[J].IEEE Trans.Wireless Commun.,2008,7(7):2571-2579
[7] Hou Wei-kun,Wang Xian-bin,Jean Y C,et al.Physical layer authentication for mobile systems with time-varying carrier frequency offsets[J].IEEE Trans.Commun.,2014,2(5):1658-1667
[8] Dai Qiao,Song Hua-wei,Jin Liang,et al.Physical-layer Authentication and Key Distribution Mechanism Based on Equivalent Channel[J].Science China,2014,44(12):1580-1592(in Chinese) 戴峤,宋华伟,金梁,等.基于等效信道的物理层认证和密钥分发机制[J].中国科学,2014,4(12):1580-1592
[9] Zeng K,Govindan K,Mohapatra P.Non-cryptographic authentication and identification in wireless networks[J].IEEE Trans.Wireless Commun.,2010,17(5):56-62
[10] Liu Y,Ning P.Enhanced wireless channel authentication using time-synched link signature,2012 [C]∥ IEEE International Conference on Computer Communications (INFOCOM’12).Orlando,FL,2012:2636-2640
[11] Wu Xiao-fu,Yang Zhen.Physical-layer authentication for multi-carrier transmission[J].IEEE Commun.Lett.,2014,9(1):74-77
[12] Ma Ting,Ren Meng-yin,Wen Hong,et al.Bi-Directional Physical Layer-Assist Authentication in Smart-Meter System[J].China Information Security,2014(11):85-87(in Chinese) 马婷,任梦吟,文红,等.智能电表系统中的双向物理层辅助认证技术[J].信息安全与通信保密,2014(11):85-87
[13] Shan Dan,Zeng Kai,Xiang Wei-dong,et al.PHY-CRAM:Physical layer challenge-response authentication mechanism for wireless networks[J].IEEE J.Sel.Areas Commun.,2013,31(9):1817-1827
[14] Tugnait J K.Wireless user authentication via comparison ofpower spectral densities[J].IEEE J.Sel.Areas Commun.,2013,1(9):1791-1802
[15] 3GPP.Technical specification group radio access networks-deployment aspects:TR25.943[R].2009
[16] Yahong R.Improved Models for the Generation of Multiple Uncorrelated Rayleigh Fading Waveforms[J].IEEE Commun.Lett.,2002,6(6):256-258

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!