A channel-based hypothesis testing approach to enhance user authentication in wireless networks

作者: Jitendra K. Tugnait , Hyosung Kim

DOI: 10.1109/COMSNETS.2010.5432018

关键词: Computer networkStatistical hypothesis testingChannel state informationPhysical layerWireless securityCommunication channelWireless networkTransmission (telecommunications)WirelessComputer science

摘要: We consider a physical layer approach to enhance wireless security by using the unique channel state information (CSI) of legitimate user authenticate subsequent transmissions from this user, thereby denying access any spoofer whose CSI would significantly differ that virtue different spatial location. In some existing approaches, multicarrier systems have been considered where frequency response at distinct frequencies is used devise hypothesis testing approach: current transmission (packet) same as previous transmission? paper we investigate single-carrier timedomain via either residual or time-domain comparison. A formulated test whiteness residuals are generated estimated transmission. also compared with Two binary approaches and illustrated simulations.

参考文章(13)
R. Viswanathan, M. D. Srinath, P. K. Rajasekaran, An introduction to statistical signal processing with applications ,(1979)
Zang Li, Wenyuan Xu, Rob Miller, Wade Trappe, Securing wireless systems via lower layer enforcements workshop on wireless security. pp. 33- 42 ,(2006) , 10.1145/1161289.1161297
Xiaoli Ma, Georgios B. Giannakis, Shuichi Ohno, Optimal training for block transmissions over doubly-selective fading channels IEEE International Conference on Acoustics Speech and Signal Processing. ,vol. 2, pp. 1509- 1512 ,(2002) , 10.1109/ICASSP.2002.5744900
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, A Physical-Layer Technique to Enhance Authentication for Mobile Terminals international conference on communications. pp. 1520- 1524 ,(2008) , 10.1109/ICC.2008.294
T. Zemen, C.F. Mecklenbrauker, Time-variant channel estimation using discrete prolate spheroidal sequences IEEE Transactions on Signal Processing. ,vol. 53, pp. 3597- 3607 ,(2005) , 10.1109/TSP.2005.853104
M. Shin, J. Ma, A. Mishra, W.A. Arbaugh, Wireless Network Security and Interworking Proceedings of the IEEE. ,vol. 94, pp. 455- 466 ,(2006) , 10.1109/JPROC.2005.862322
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe, Using the physical layer for wireless authentication in time-variant channels IEEE Transactions on Wireless Communications. ,vol. 7, pp. 2571- 2579 ,(2008) , 10.1109/TWC.2008.070194
W.A. Arbaugh, N. Shankar, Y.C.J. Wan, Kan Zhang, Your 80211 wireless network has no clothes IEEE Wireless Communications. ,vol. 9, pp. 44- 51 ,(2002) , 10.1109/MWC.2002.1160080
Y.R. Zheng, Chengshan Xiao, Simulation models with correct statistical properties for Rayleigh fading channels IEEE Transactions on Communications. ,vol. 51, pp. 920- 928 ,(2003) , 10.1109/TCOMM.2003.813259
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication international conference on communications. pp. 4646- 4651 ,(2007) , 10.1109/ICC.2007.767