logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 12 : 222302(2020) https://doi.org/10.1007/s11432-019-2802-x

An area based physical layer authentication framework to detect spoofing attacks

More info
  • ReceivedAug 20, 2019
  • AcceptedFeb 18, 2020
  • PublishedOct 28, 2020

Abstract


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61941114, 61601051), Beijing Municipal Science and Technology Project (Grant No. Z181100003218005), and the 111 Project of China (Grant No. B16006).


References

[1] Yilmaz M H, Arslan H. A survey: spoofing attacks in physical layer security. In: Proceedings of IEEE Local Computer Networks Conference Workshops, Clearwater Beach, 2015. 812--817. Google Scholar

[2] Xiao L, Sheng G, Wan X. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks. IEEE Commun Lett, 2019, 23: 60-63 CrossRef Google Scholar

[3] Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks. IEEE Wireless Commun, 2010, 17: 56-62 CrossRef Google Scholar

[4] Aman M N, Chua K C, Sikdar B. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J, 2017, 4: 1327-1340 CrossRef Google Scholar

[5] Namal S, Georgantas K, Gurtov A. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography. In: Proceedings of 2013 IEEE Wireless Communications and Networking Conference, Shanghai, 2013. 1830--1835. Google Scholar

[6] Johansson N A, Wang Y P E, Eriksson E, et al. Radio access for ultra-reliable and low-latency 5G communications. In: Proceedings of 2015 IEEE International Conference on Communication Workshop (ICCW), London, 2015. 1184--1189. Google Scholar

[7] Kamal M, Tariq M. Light-Weight Security and Data Provenance for Multi-Hop Internet of Things. IEEE Access, 2018, 6: 34439-34448 CrossRef Google Scholar

[8] Yang J, Ji X, Huang K. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. 18 CrossRef Google Scholar

[9] Suzan S, Babak D B. A survey on lightweight cryptographic algorithms. In: Proceedings of TENCON 2018 - 2018 IEEE Region 10 Conference, Jeju, 2018. 1784--1789. Google Scholar

[10] Challa S, Wazid M, Das A K. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 2017, 5: 3028-3043 CrossRef Google Scholar

[11] Xiao L, Greenstein L, Mandayam N. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans Wireless Commun, 2009, 8: 5948-5956 CrossRef Google Scholar

[12] Shi L, Li M, Yu S. BANA: Body Area Network Authentication Exploiting Channel Characteristics. IEEE J Sel Areas Commun, 2013, 31: 1803-1816 CrossRef Google Scholar

[13] Zhang K, Liang X, Lu R. Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet Things J, 2014, 1: 372-383 CrossRef Google Scholar

[14] Demirbas M, Song Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Buffalo-Niagara Falls, 2006. 564--570. Google Scholar

[15] Wang X, Hao P, Hanzo L. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag, 2016, 54: 152-158 CrossRef Google Scholar

[16] Xiao L, Wan X, Han Z. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead. IEEE Trans Wireless Commun, 2018, 17: 1676-1687 CrossRef Google Scholar

[17] Mohamed M, Cheffena M. Received Signal Strength Based Gait Authentication. IEEE Sens J, 2018, 18: 6727-6734 CrossRef ADS Google Scholar

[18] Jian Li , Halder B, Stoica P. Computationally efficient angle estimation for signals with known waveforms. IEEE Trans Signal Process, 1995, 43: 2154-2163 CrossRef ADS Google Scholar

[19] Wang Y, Guan X, Cai Y. The impacts of mobility on performance of physical layer secret key based on angle of arrival. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing, Yangzhou, 2016. 1--5. Google Scholar

[20] Abdelaziz A, Burton R, Koksal C E. Message Authentication and Secret Key Agreement in VANETs via Angle of Arrival. In: Proceedings of 2016 IEEE Vehicular Networking Conference, Columbus, 2016. 1--2. Google Scholar

[21] Zanella A. Best Practice in RSS Measurements and Ranging. IEEE Commun Surv Tutorials, 2016, 18: 2662-2686 CrossRef Google Scholar

[22] Zhao Y, Liu Y, Yu T. FREDI: Robust RSS-based ranging with multipath effect and radio interference. Comput Networks, 2018, 147: 49-63 CrossRef Google Scholar

[23] Zanella A, Bardella A. RSS-Based Ranging by Multichannel RSS Averaging. IEEE Wireless Commun Lett, 2014, 3: 10-13 CrossRef Google Scholar

[24] Stoyanova T, Kerasiotis F, Efstathiou K, et al. Modeling of the RSS uncertainty for RSS-based outdoor localization and tracking applications in wireless sensor networks. In: Proceedings of 2010 4th International Conference on Sensor Technologies and Applications, Venice, 2010. 45--50. Google Scholar

[25] Achroufene A, Amirat Y, Chibani A. RSS-Based Indoor Localization Using Belief Function Theory. IEEE Trans Automat Sci Eng, 2019, 16: 1163-1180 CrossRef Google Scholar

[26] Waadt A E, Wang S, Kocks C, et al. Positioning in multiband OFDM UWB utilizing received signal strength. In: Proceedings of Positioning Navigation and Communication, Dresden, 2010. 308--312. Google Scholar

[27] Bhargava V, Sichitiu M L. Physical authentication through localization in wireless local area networks. In: Proceedings of IEEE Global Telecommunications Conference, St. Louis, 2005. 2658--2662. Google Scholar

[28] Chen Y, Yang J, Trappe W. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks. IEEE Trans Veh Technol, 2010, 59: 2418-2434 CrossRef Google Scholar

[29] Jie Yang , Yingying Chen , Trappe W. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE Trans Parallel Distrib Syst, 2013, 24: 44-58 CrossRef Google Scholar

[30] Li N, Geng H, Xia S, and Tao X. An area description framework for physical layer authentication. In: Proceedings of 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, 2019. 1--6. Google Scholar