Impact of Directional Antenna on Physical Layer Authentication

作者: Zhicheng Zeng , Ming Zhu , Lei Wang , Zhenquan Qin , Zhaoshu Tang

DOI: 10.1109/FCST.2015.37

关键词:

摘要: Many existed physical layer based schemes have been proposed to enhance the traditional authentication in wireless networks. However earlier did not discuss directional antenna issue, and lacked of real measurement evaluation. In this paper, we take an insight into threat on by observation. We give a brief overview mainstream schemes, build real-time experimental platform collect channel state information, evaluate performance some collecting data different typical environments, especially situation when attacker uses antenna. show are effective most cases, but may fail detect third party equipped with Based our discovery, suggest that impact should be seriously considered applications, security domain.

参考文章(14)
Daniel B. Faria, David R. Cheriton, Detecting identity-based attacks in wireless networks using signalprints workshop on wireless security. pp. 43- 52 ,(2006) , 10.1145/1161289.1161298
A. Lee Swindlehurst, Amitav Mukherjee, S. A. A. Fakoorian, Jing Huang, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey arXiv: Information Theory. ,(2010) , 10.1109/SURV.2014.012314.00178
M. Demirbas, Youngwhan Song, An RSSI-based scheme for sybil attack detection in wireless sensor networks world of wireless, mobile and multimedia networks. pp. 564- 570 ,(2006) , 10.1109/WOWMOM.2006.27
Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 1550- 1573 ,(2014) , 10.1109/SURV.2014.012314.00178
Jitendra K. Tugnait, Hyosung Kim, A channel-based hypothesis testing approach to enhance user authentication in wireless networks 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). pp. 109- 117 ,(2010) , 10.1109/COMSNETS.2010.5432018
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe, Channel-based spoofing detection in frequency-selective rayleigh channels IEEE Transactions on Wireless Communications. ,vol. 8, pp. 5948- 5956 ,(2009) , 10.1109/TWC.2009.12.081544
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wetherall, Tool release: gathering 802.11n traces with channel state information acm special interest group on data communication. ,vol. 41, pp. 53- 53 ,(2011) , 10.1145/1925861.1925870
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, A Physical-Layer Technique to Enhance Authentication for Mobile Terminals international conference on communications. pp. 1520- 1524 ,(2008) , 10.1109/ICC.2008.294
Kai Zeng, Kannan Govindan, Prasant Mohapatra, Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] IEEE Wireless Communications. ,vol. 17, pp. 56- 62 ,(2010) , 10.1109/MWC.2010.5601959
Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi, Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information 2013 Proceedings IEEE INFOCOM. pp. 2544- 2552 ,(2013) , 10.1109/INFCOM.2013.6567061