A physical-layer authentication scheme based on hash method

Author(s):  
Jing Yang ◽  
Xinsheng Ji ◽  
Kaizhi Huang ◽  
Yajun Chen ◽  
Xiaohui Qi
2021 ◽  
Vol 2 (2) ◽  
Author(s):  
D. L. Lavanya ◽  
R. Ramaprabha ◽  
B. Thangapandian ◽  
K. Gunaseelan

2019 ◽  
Vol 13 (12) ◽  
pp. 1776-1780
Author(s):  
Yachao Ran ◽  
Harith Al-Shwaily ◽  
Chaoqing Tang ◽  
Gui Yun Tian ◽  
Martin Johnston

2018 ◽  
Vol 36 (4) ◽  
pp. 748-761 ◽  
Author(s):  
Dajiang Chen ◽  
Ning Zhang ◽  
Rongxing Lu ◽  
Xiaojie Fang ◽  
Kuan Zhang ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-16 ◽  
Author(s):  
Jiazi Liu ◽  
Xianbin Wang ◽  
Helen Tang

Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G) wireless communications, due to the deployment of dense small cells in a hierarchical network architecture. In this paper, we propose a novel physical layer authentication scheme by exploiting the advantages of amplify-and-forward (AF) cooperative relaying, which can increase the coverage and convergence of the heterogeneous networks. The essence of the proposed scheme is to select the best relay among multiple AF relays for cooperation between legitimate transmitter and intended receiver in the presence of a spoofer. To achieve this goal, two best relay selection schemes are developed by maximizing the signal-to-noise ratio (SNR) of the legitimate link to the spoofing link at the destination and relays, respectively. In the sequel, we derive closed-form expressions for the outage probabilities of the effective SNR ratios at the destination. With the help of the best relay, a new test statistic is developed for making an authentication decision, based on normalized channel difference between adjacent end-to-end channel estimates at the destination. The performance of the proposed authentication scheme is compared with that in a direct transmission in terms of outage and spoofing detection.


2018 ◽  
Vol 12 (6) ◽  
pp. 712-718 ◽  
Author(s):  
Saud Althunibat ◽  
Victor Sucasas ◽  
Georgios Mantas ◽  
Jonathan Rodriguez

2017 ◽  
Vol 128 ◽  
pp. 164-171 ◽  
Author(s):  
Caidan Zhao ◽  
Minmin Huang ◽  
Lianfen Huang ◽  
Xiaojiang Du ◽  
Mohsen Guizani

2021 ◽  
Vol 71 (2) ◽  
pp. 241-247
Author(s):  
D.L. Lavanya ◽  
R. Ramaprabha ◽  
K. Gunaseelan

With the fast development in services related to localisation, location-based service (LBS) gains more importance amongst all the mobile wireless services. To avail the service in the LBS system, information about the location and identity of the user has to be provided to the service provider. The service provider authenticates the user based on their identity and location before providing services. In general, sharing location information and preserving the user’s privacy is a highly challenging task in conventional authentication techniques. To resolve these challenges in authenticating the users, retaining users’ privacy, a new SVD (singular value decomposition) based Privacy Preserved Location Authentication Scheme (SPPLAS) has been proposed. In this proposed method, physical layer signatures such as channel state information (CSI) and carrier frequency offset (CFO) are used for generating secret key required for encrypting the user’s location and identity information, and thus encrypted user’s information is sent to service provider for authentication. Secret key is generated by applying SVD on CSI vector. The proposed scheme aids in authenticating the user through location information while protecting the user’s privacy. The performance of the proposed method is evaluated in terms of bit mismatch, leakage and bit error rate performance of receiver and adversary. The simulation results show that the proposed scheme achieves better robustness and security than the existing location-based authentication techniques.


Sign in / Sign up

Export Citation Format

Share Document