One Solution to Physical-Layer Authentication in Wireless Communication System

Article Preview

Abstract:

Authentication is the process where claims of identity are verified. Most mechanisms of authentication exist above the physical layer, though some exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted synchronously with the data. By superimposing a carefully designed secret modulation (wavelet transform) on the waveforms, authentication is added to the signal without requiring additional bandwidth. Simulation results are given that demonstrate the potential application of this authentication technique.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

2071-2075

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. J. Simmons, A survey of information authentication, Proc. IEEE, vol. 76, no. 5, p.603 –620, May (1988).

Google Scholar

[2] A. J. Menezes,P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, (2001).

Google Scholar

[3] S. H. Supangkat, T. Eric, and A. S. Pamuji, A public key signature for authentication in telephone, in Proc. APCCAS, 2002, p.495–498.

DOI: 10.1109/apccas.2002.1115320

Google Scholar

[4] J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette, Radio frequency watermarking for OFDM wireless networks, in Proc. ICASSP, Montreal, QC, Canada, 2004, p.397–400.

DOI: 10.1109/icassp.2004.1327131

Google Scholar

[5] X. Wang, Y. Wu, and B. Caron, Transmitter identification using embedded pseudo random sequences, IEEE Trans. Broadcast., vol. 50, no. 3, p.244–252, Sep. (2004).

DOI: 10.1109/tbc.2004.834027

Google Scholar

[6] L. -F. Wei, Coded modulation with unequal error protection, IEEE Trans. Commun., vol. 41, no. 10, p.1439–1449, Oct. (1993).

DOI: 10.1109/26.237878

Google Scholar

[7] P. K. Vitthaladevuni and M. -S. Alouini, Exact BER computation of generalized hierarchical PSK constellations, IEEE Trans. Commun., vol. 51, no. 12, p.2030–2037, Dec. (2003).

DOI: 10.1109/tcomm.2003.820748

Google Scholar

[8] M. Morimoto, M. Okada, and S. Komaki, A hierarchical image transmission system in a fading channel, in Proc. 4th IEEE Int. Conf. UniversalPersonal Communications, Nov. 1995, p.769–772.

DOI: 10.1109/icupc.1995.497113

Google Scholar

[9] M. Dong, L. Tong, and B. M. Sadler, Optimal insertion of pilot symbols for transmissions over time-varying flat fading channels, IEEEJ. Sel. Areas Commun., vol. 52, no. 5, p.1403–1418, May (2004).

DOI: 10.1109/tsp.2004.826182

Google Scholar

[10] J. E. Kleider, G. Maalouli, S. Gifford, and S. Chuprun, Preamble and embedded synchronization for RF carrier frequency-hopped OFDM, IEEE J. Sel. Areas Commun., vol. 23, no. 5, p.920–931, May (2005).

DOI: 10.1109/jsac.2005.845421

Google Scholar

[11] J. Fridrich and M. Goljan, Robush hash functions for digital watermarking, inProc. Int. Conf. Information Technology: Coding andComputing, Las Vegas, NV, Mar. 2000, p.178–183.

DOI: 10.1109/itcc.2000.844203

Google Scholar

[12] A. Swaminathan, Y. Mao, and M. Wu, Robust and secure imagehashing, IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, p.215–230, Jun. (2006).

Google Scholar

[13] Paul L. Yu, John S. Baras, and Brian M. Sadler, Physical-Layer Authentication, IEEE Transactions On Information Forensics AND Security, Vol. 3, no. 1, Mar (2008).

DOI: 10.1109/tifs.2007.916273

Google Scholar