Lightweight Physical Layer-Assisted Authentication Scheme in Cognitive Wireless Networks
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [19]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Cognitive wireless networks are vulnerable to message tampering, forgery, eavesdropping, and denial of service attacks due to the openness of wireless channels and the broadcasting characteristics of wireless transmission. In order to resist these attacks, researchers have proposed many physical layer authentication technologies. Compared with traditional cryptographic authentication mechanism, physical layer authentication technology is faster and more efficient, so it is very suitable for continuous and real-time authentication of resource-constrained terminals in cognitive wireless networks. However, the existing physical layer authentication technology can not achieve the initial authentication, and packet loss events often occur in the authentication process, resulting in long authentication delay and low authentication efficiency. This study combines traditional cryptographic authentication technology with physical layer authentication technology, and proposes a lightweight cross-layer authentication scheme. The scheme only uses cryptography technology in the initial authentication, while the other authentication uses fast and efficient physical layer authentication technology, which improves the authentication efficiency. In this scheme, an improved normalized statistic is used, which makes the calculation of threshold simpler, reduces the computational complexity effectively and reduces the user authentication waiting delay. In addition, the Hash chain-based authentication method is adopted to ensure that continuous authentication can still be achieved in case of packet loss. Performance analysis shows that, compared with existing schemes, the scheme in this study has greater advantages in improving authentication efficiency.

    Reference
    [1] Mitola J, Maguire GQ. Cognitive radio:Making software radios more personal. IEEE Personal Communications, 1999, 6(4):13-18.[doi:10.1109/98.788210
    [2] Singhal D, Sharma MK, Garimella RM. Energy efficient localization of primary users for avoiding interference in cognitive network. Proceedings of 2012 International Conference on Computer Communication and Informatics. Coimbatore, India. 2012. 1-5.
    [3] 张静, 蒋宝强, 郑霖. 认知无线网络技术在卫星通信中的应用. 桂林电子科技大学学报, 2013, 33(4):284-287.[doi:10.3969/j.issn.1673-808X.2013.04.007
    [4] 祝思婷. 车辆密集场景下的认知车联网频谱感知研究[硕士学位论文]. 北京:北京邮电大学, 2017.
    [5] 郎为民. 无线认知电传感器网络研究. 邮电设计技术, 2011, (12):48-51.[doi:10.3969/j.issn.1007-3043.2011.12.011
    [6] 刘超. 认知Ad-hoc无线网络的跨层结构设计. 电子测量技术, 2014, 37(11):122-126.[doi:10.3969/j.issn.1002-7300.2014.11.029
    [7] 裴庆祺, 李红宁, 赵弘洋, 等. 认知无线电网络安全综述. 通信学报, 2013, 34(1):144-158
    [8] Shi E, Perrig A. Designing secure sensor networks. IEEE Wireless Communications, 2004, 11(6):38-43.[doi:10.1109/MWC.2004.1368895
    [9] 邱慧敏. Sybil攻击原理和防御措施. 计算机安全, 2005, (10):63-65.[doi:10.3969/j.issn.1671-0428.2005.10.029
    [10] 刘丽珍. 无线传感器网络中克隆节点攻击检测协议研究[硕士学位论文]. 长沙:中南大学, 2012.
    [11] 李传目. 安全密码认证机制的研究. 计算机工程与应用, 2003, 39(28):173-175.[doi:10.3321/j.issn:1002-8331.2003.28.053
    [12] Kahate A. 密码学与网络安全. 金名, 译. 2版. 北京:清华大学出版社, 2009.
    [13] He F, Man H, Kivanc D, et al. EPSON:Enhanced physical security in OFDM networks. Proceedings of 2009 IEEE International Conference on Communications. Dresden, Germany. 2009. 1-5.
    [14] Xiao L, Greenstein L, Mandayam N, et al. Fingerprints in the ether:Using the physical layer for wireless authentication. Proceedings of 2007 IEEE International Conference on Communications. Glasgow, UK. 2007. 4646-4651.
    [15] Wen H, Wang Y F, Zhu X P, et al. Physical layer assist authentication technique for smart meter system. IET Communications, 2013, 7(3):189-197.[doi:10.1049/iet-com.2012.0300
    [16] Xiao L, Reznik A, Trappe W, et al. PHY-authentication protocol for spoofing detection in wireless networks. Proceedings of 2010 IEEE Global Telecommunications Conference GLOBECOM. Miami, FL, USA. 2010. 1-6.
    [17] Xiao L, Yan Li Y, Liu G L, et al. PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Transactions on Vehicular Technology, 2016, 65(12):10037-10047.[doi:10.1109/TVT.2016.2524258
    [18] 马婷, 周年荣, 高峰, 等. 智能电表系统中的物理层辅助认证技术. 网络安全技术与应用, 2013, (10):21-22.[doi:10.3969/j.issn.1009-6833.2013.10.016
    [19] Eltaief H, Youssef H. Efficient sender authentication and signing of multicast streams over lossy channels. Proceedings of ACS/IEEE International Conference on Computer Systems and Applications-AICCSA. Hammamet, Tunisia. 2010.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

颜胜男,许力,曾雅丽.认知无线网络中的轻量级物理层辅助认证.计算机系统应用,2019,28(6):22-28

Copy
Share
Article Metrics
  • Abstract:2685
  • PDF: 2756
  • HTML: 1649
  • Cited by: 0
History
  • Received:November 16,2018
  • Revised:December 10,2018
  • Online: May 28,2019
  • Published: June 15,2019
Article QR Code
You are the first990390Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063