Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates

作者: Weikun Hou , Xianbin Wang , Jean-Yves Chouinard

DOI: 10.1109/ICC.2012.6364429

关键词:

摘要: Information security is becoming a critical challenge in wireless communications due to the open nature of channels and transparency standardized transmission schemes. Among various techniques, user authentication one essential measure identify legitimate users protect integrity transmissions. In this paper, novel physical layer scheme proposed enhance communication by exploiting unique characteristics oscillator each device. realistic scenarios, radio frequency (RF) oscillators transmitter receiver pair always present some bias nominal carrier manufacturing limitations operating conditions. This characterized device-dependent offset (CFO), which can be used specific transmitter. scheme, CFO at different time received signal first estimated. It then examined hypothesis testing determine whether has consistent for purpose. Adaptive thresholds variation are derived discrimination based on signal-to-noise ratio (SNR). Simulation results further confirm effectiveness multipath fading environments.

参考文章(12)
Suhas Mathur, Alex Reznik, Chunxuan Ye, Rajat Mukherjee, Akbar Rahman, Yogendra Shah, Wade Trappe, Narayan Mandayam, Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] IEEE Wireless Communications. ,vol. 17, pp. 63- 70 ,(2010) , 10.1109/MWC.2010.5601960
Nate Goergen, T. Charles Clancy, Timothy R. Newman, Physical Layer Authentication Watermarks through Synthetic Channel Emulation 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN). pp. 1- 7 ,(2010) , 10.1109/DYSPAN.2010.5457897
Fiona Jiazi Liu, Xianbin Wang, Helen Tang, Robust physical layer authentication using inherent properties of channel impulse response military communications conference. pp. 538- 542 ,(2011) , 10.1109/MILCOM.2011.6127727
N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing. ,vol. 5, pp. 128- 143 ,(2006) , 10.1109/TMC.2006.16
Kai Zeng, Kannan Govindan, Prasant Mohapatra, Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] IEEE Wireless Communications. ,vol. 17, pp. 56- 62 ,(2010) , 10.1109/MWC.2010.5601959
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe, Using the physical layer for wireless authentication in time-variant channels IEEE Transactions on Wireless Communications. ,vol. 7, pp. 2571- 2579 ,(2008) , 10.1109/TWC.2008.070194
P.H. Moose, A technique for orthogonal frequency division multiplexing frequency offset correction IEEE Transactions on Communications. ,vol. 42, pp. 2908- 2914 ,(1994) , 10.1109/26.328961
Paul L. Yu, John S. Baras, Brian M. Sadler, Multicarrier authentication at the physical layer world of wireless mobile and multimedia networks. pp. 1- 6 ,(2008) , 10.1109/WOWMOM.2008.4594926
Xianbin Wang, Fiona Jiazi Liu, Dian Fan, Helen Tang, Peter C. Mason, Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System 2011 IEEE International Conference on Communications (ICC). pp. 1- 5 ,(2011) , 10.1109/ICC.2011.5962692
Paul L. Yu, John S. Baras, Brian M. Sadler, Physical-Layer Authentication IEEE Transactions on Information Forensics and Security. ,vol. 3, pp. 38- 51 ,(2008) , 10.1109/TIFS.2007.916273