Computer Science ›› 2020, Vol. 47 ›› Issue (12): 267-272.doi: 10.11896/jsjkx.190900095

Previous Articles     Next Articles

Wireless Network Authentication Method Based on Physical Layer Channel Characteristics

LI Zhao-bin, CUI Zhao, WEI Zhan-zhen, ZHAO Hong, GUO Chao   

  1. Beijing Electronic Science and Technology Institute Beijing 100070,China
  • Received:2019-09-16 Revised:2019-12-27 Published:2020-12-17
  • About author:LI Zhao-bin,born in 1977Ph.Dasso-ciate researcher.His main research interests include network security and so on.
    CUI Zhao,born in 1995graduate student.His main research interests includephysical layer communication security and so on.
  • Supported by:
    National Key Research and Development Project (2017YFB0802705,2017YFGX110123) and Fundamental Research Funds for the Central Universities (328201911).

Abstract: In lightweight Internet of Things (IoT)the traditional authentication method has problems such as high energy consumption and high delay.Thereforethis paper proposed a wireless network authentication mechanism based on physical layer channel characteristics.The channel impulse frequency response (CIR) is used for identity authenticationand it is used as the initial message authentication code (MAC) for message authentication.It uses "Hash chain" to generate tag signalsso as to realize MAC updating and improve the sensitivity of packet exchangetampering and other attacks.This method combines identity authentication with message authenticationtag signal and communication informationand is suitable for the communication environment with high security requirements and limited equipment resourcessuch as industrial Internet of Things and smart home.The security analysis and simulation results show that compared with HMACEIA3 and other algorithmsthe authentication delay of this scheme is small and it has certain practicability.

Key words: Identification, Label signal, Message authentication, Message authentication code, Physical layer channel characteristics

CLC Number: 

  • TP309
[1] WANG X B,HAO P,HANZO L.Physical-layer Authentication for Wireless Security Enhancement:Current Challenges and Future Developments[J].IEEE Communications Magazine,2016,54(6):152-158.
[2] PERAZZONE J,YU P L,SADLER B M,et al.Physical Layer Authentication via Fingerprint Embedding:Min-Entropy Analysis:Invited Presentation[C]//2019 53rd Annual Conference on Information Sciences and Systems (CISS).Baltimore,MD,USA,2019:1-6.
[3] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al.A Physi-cal-Layer Technique to Enhance Authentication for Mobile Terminals[C]//IEEE International Conference on Communications.Beijing,2008:1520-1524.
[4] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al.Fingerprints in the Ether:Using the Physical Layer for Wireless Authentication[C]//Proceedings of IEEE International Conference on Communications.Glasgow,UK,2007:4646-4651.
[5] JIANG W,ANTHONY L,MOHAMMAD A F.Physical Layer Key Generation:Securing Wireless Communication in Automotive Cyber-Physical Systems[J].ACM Transactions on Cyber-Physical Systems,2018,3(2):1-26.
[6] ZHANG J Q,RAJENDRAN S,SUN Z,et al.Physical Layer Security for the Internet of Things:Authentication and Key Ge-neration[J].IEEE Wireless Communications,2018,26(5):92-98.
[7] RAHBARI H,LIU J S,Park J M J.SecureMatch:Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques[C]//2018 IEEE Conference on Communications and Network Security (CNS).Beijing,2018:1-9.
[8] SONG H W,JIN L,ZHANG S J.Physical Layer Authentication Based on Tag Signal[J].Journal of Electronics &Information Technology ,2008,40(5):1066-1071.
[9] YANG J,JI X S,HUANG K Z,et al.Cross-Layer Authentication Scheme Based on Wireless Channel Characteristics[J].Journal of Information Engineering University,2017,18(3):267-272.
[10] WANG X,JIN L,HUANG K Z.Cross-Layer Mutual Authentication Scheme Based on Physical Layer Location Information[J].Journal of Information Engineering University,2017,18(3):279-283,304.
[11] JI X S,YANG J,HUANG K Z,et al.Physical Layer Authentication Scheme Based on Hash Method[J].Journal of Electro-nics &Information Technology ,2016,38(11):2900-2907.
[12] HUSSAIN S,FAROOP S M,USTUN T S.Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security[J].IEEE Access,2019(7):80980-80984.
[13] WANG M W,WANG L J,XIE W M.Mutual AuthenticationScheme Based on Session Key in Wireless Sensor Network[J].Application Research of Computers,2014,31(8):2506-2509.
[14] YAN S N,XU L,ZENG Y L.Lightweight Physical Layer Auxi-liary Authentication in Cognitive Wireless Network[J].Computer Systems &Applications,2019,28(6):22-28.
[15] YANG G,WANG J T,CHENG H B,et al.A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms[J].Acta Electronica Sinica,2007(1):180-184.
[16] PATZOLD M.Mobile Radio Channels[M].New York:JohnWiley &Sons,2012:55-147.
[17] MAURER U.Authentication Theory and Hypothesis Testing[J].IEEE Transactions on Information Theory,2000,46(4):1350-1356.
[18] LIU Z G,YANG L C,PU J,et al.The System of Digital Signature Authentication Based on PKI[J].Application Research of Computers,2004(9):158-160.
[19] WANG X,YU H.How to Break MD5 and Other Hash Functions[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,Berlin,Heidelberg,2005.
[20] SUI L,GUO W B,JIANG W B,et al.Generation and Extraction of Secret Keys Based on Properties of Wireless Channels[J].Computer Science,2015,42(2):137-141.
[21] SONG H W.Research on Physical Layer Security Authentication Technology in Mobile Communication[D].Zhengzhou:PLA Strategic Support Force Information Engineering Univer-sity,2018.
[22] HUANG X J,BI H J,YU S Y.Subspace-based Blind Channel Estimation for Orthogonal Frequency Division Multiplexing (OFDM) Systems[J].Journal of Shanghai Jiaotong University,2004(S1):6-9.
[1] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[2] CHEN Kun-feng, PAN Zhi-song, WANG Jia-bao, SHI Lei, ZHANG Jin. Moderate Clothes-Changing Person Re-identification Based on Bionics of Binocular Summation [J]. Computer Science, 2022, 49(8): 165-171.
[3] MENG Yue-bo, MU Si-rong, LIU Guang-hui, XU Sheng-jun, HAN Jiu-qiang. Person Re-identification Method Based on GoogLeNet-GMP Based on Vector Attention Mechanism [J]. Computer Science, 2022, 49(7): 142-147.
[4] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[5] XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660.
[6] SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216.
[7] YU Shu-hao, ZHOU Hui, YE Chun-yang, WANG Tai-zheng. SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion [J]. Computer Science, 2022, 49(6A): 256-260.
[8] DONG Zhen-heng, REN Wei-ping, YOU Xin-dong, LYU Xue-qiang. Machine Translation Method Integrating New Energy Terminology Knowledge [J]. Computer Science, 2022, 49(6): 305-312.
[9] WANG Xue-guang, ZHU Jun-wen, ZHANG Ai-xin. Identification Method of Voiceprint Identity Based on ARIMA Prediction of MFCC Features [J]. Computer Science, 2022, 49(5): 92-97.
[10] LI Guo-quan, YAO Kai, PANG Yu. Automatic Identification Algorithm of Blood Cell Image Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(4): 247-253.
[11] YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178.
[12] LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min. User Trajectory Identification Model via Attention Mechanism [J]. Computer Science, 2022, 49(3): 308-312.
[13] ZHANG Xin-feng, SONG Bo. A Person Re-identification Method Based on Improved Triple Loss and Feature Fusion [J]. Computer Science, 2021, 48(9): 146-152.
[14] LI Shuang-qiu, YU Zhi-bin, YANG Ling, ZHANG Yi-fang, LIU Li-ping. Extraction Method of Wireless Frame Interval Feature [J]. Computer Science, 2021, 48(9): 286-291.
[15] LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!