认知无线网络中的轻量级物理层辅助认证
作者:
基金项目:

国家自然科学基金面上项目(61771140);国家自然科学基金海峡联合基金重点项目(U1405255);福州市科技重大项目(榕科(2017)325号);福建省科技厅高校产学研项目(2017H6005)


Lightweight Physical Layer-Assisted Authentication Scheme in Cognitive Wireless Networks
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [19]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    由于无线信道的开放性和无线传输的广播特性,认知无线网络很容易遭受消息篡改、伪造、窃听以及拒绝服务等攻击.为了抵抗这些攻击,研究人员提出了许多物理层认证技术.相比于传统的密码学认证机制,物理层认证技术更快速、更高效.因此非常适用于对认知无线网络中资源受限的终端进行连续、实时的认证.但现有的物理层认证技术无法实现初始认证,而且在认证过程中丢包事件时常发生,导致认证时延较长,认证效率较低.本文将传统密码学认证技术与物理层认证技术相结合,提出一种轻量级的跨层认证方案.该方案只在初次认证采用密码学技术,其余认证采用快速高效的物理层认证技术,提高了认证效率.本文方案采用改进的归一化统计量,使得门限的计算变得更为简单,有效地降低了计算复杂度,减少了用户的认证等待时延.此外,本文采用了基于哈希链的认证方法,保证了在丢包情况下仍能实现连续的认证.性能分析表明,与现有的方案相比,本文的方案在提高认证效率方面具有较大的优势.

    Abstract:

    Cognitive wireless networks are vulnerable to message tampering, forgery, eavesdropping, and denial of service attacks due to the openness of wireless channels and the broadcasting characteristics of wireless transmission. In order to resist these attacks, researchers have proposed many physical layer authentication technologies. Compared with traditional cryptographic authentication mechanism, physical layer authentication technology is faster and more efficient, so it is very suitable for continuous and real-time authentication of resource-constrained terminals in cognitive wireless networks. However, the existing physical layer authentication technology can not achieve the initial authentication, and packet loss events often occur in the authentication process, resulting in long authentication delay and low authentication efficiency. This study combines traditional cryptographic authentication technology with physical layer authentication technology, and proposes a lightweight cross-layer authentication scheme. The scheme only uses cryptography technology in the initial authentication, while the other authentication uses fast and efficient physical layer authentication technology, which improves the authentication efficiency. In this scheme, an improved normalized statistic is used, which makes the calculation of threshold simpler, reduces the computational complexity effectively and reduces the user authentication waiting delay. In addition, the Hash chain-based authentication method is adopted to ensure that continuous authentication can still be achieved in case of packet loss. Performance analysis shows that, compared with existing schemes, the scheme in this study has greater advantages in improving authentication efficiency.

    参考文献
    [1] Mitola J, Maguire GQ. Cognitive radio:Making software radios more personal. IEEE Personal Communications, 1999, 6(4):13-18.[doi:10.1109/98.788210
    [2] Singhal D, Sharma MK, Garimella RM. Energy efficient localization of primary users for avoiding interference in cognitive network. Proceedings of 2012 International Conference on Computer Communication and Informatics. Coimbatore, India. 2012. 1-5.
    [3] 张静, 蒋宝强, 郑霖. 认知无线网络技术在卫星通信中的应用. 桂林电子科技大学学报, 2013, 33(4):284-287.[doi:10.3969/j.issn.1673-808X.2013.04.007
    [4] 祝思婷. 车辆密集场景下的认知车联网频谱感知研究[硕士学位论文]. 北京:北京邮电大学, 2017.
    [5] 郎为民. 无线认知电传感器网络研究. 邮电设计技术, 2011, (12):48-51.[doi:10.3969/j.issn.1007-3043.2011.12.011
    [6] 刘超. 认知Ad-hoc无线网络的跨层结构设计. 电子测量技术, 2014, 37(11):122-126.[doi:10.3969/j.issn.1002-7300.2014.11.029
    [7] 裴庆祺, 李红宁, 赵弘洋, 等. 认知无线电网络安全综述. 通信学报, 2013, 34(1):144-158
    [8] Shi E, Perrig A. Designing secure sensor networks. IEEE Wireless Communications, 2004, 11(6):38-43.[doi:10.1109/MWC.2004.1368895
    [9] 邱慧敏. Sybil攻击原理和防御措施. 计算机安全, 2005, (10):63-65.[doi:10.3969/j.issn.1671-0428.2005.10.029
    [10] 刘丽珍. 无线传感器网络中克隆节点攻击检测协议研究[硕士学位论文]. 长沙:中南大学, 2012.
    [11] 李传目. 安全密码认证机制的研究. 计算机工程与应用, 2003, 39(28):173-175.[doi:10.3321/j.issn:1002-8331.2003.28.053
    [12] Kahate A. 密码学与网络安全. 金名, 译. 2版. 北京:清华大学出版社, 2009.
    [13] He F, Man H, Kivanc D, et al. EPSON:Enhanced physical security in OFDM networks. Proceedings of 2009 IEEE International Conference on Communications. Dresden, Germany. 2009. 1-5.
    [14] Xiao L, Greenstein L, Mandayam N, et al. Fingerprints in the ether:Using the physical layer for wireless authentication. Proceedings of 2007 IEEE International Conference on Communications. Glasgow, UK. 2007. 4646-4651.
    [15] Wen H, Wang Y F, Zhu X P, et al. Physical layer assist authentication technique for smart meter system. IET Communications, 2013, 7(3):189-197.[doi:10.1049/iet-com.2012.0300
    [16] Xiao L, Reznik A, Trappe W, et al. PHY-authentication protocol for spoofing detection in wireless networks. Proceedings of 2010 IEEE Global Telecommunications Conference GLOBECOM. Miami, FL, USA. 2010. 1-6.
    [17] Xiao L, Yan Li Y, Liu G L, et al. PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Transactions on Vehicular Technology, 2016, 65(12):10037-10047.[doi:10.1109/TVT.2016.2524258
    [18] 马婷, 周年荣, 高峰, 等. 智能电表系统中的物理层辅助认证技术. 网络安全技术与应用, 2013, (10):21-22.[doi:10.3969/j.issn.1009-6833.2013.10.016
    [19] Eltaief H, Youssef H. Efficient sender authentication and signing of multicast streams over lossy channels. Proceedings of ACS/IEEE International Conference on Computer Systems and Applications-AICCSA. Hammamet, Tunisia. 2010.
    相似文献
    引证文献
引用本文

颜胜男,许力,曾雅丽.认知无线网络中的轻量级物理层辅助认证.计算机系统应用,2019,28(6):22-28

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2018-11-16
  • 最后修改日期:2018-12-10
  • 在线发布日期: 2019-05-28
  • 出版日期: 2019-06-15
文章二维码
您是第11305038位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号