An area based physical layer authentication framework to detect spoofing attacks

Springer Science and Business Media LLC - Tập 63 - Trang 1-14 - 2020
Na Li1, Shida Xia1, Xiaofeng Tao1, Zhiyuan Zhang1, Xiaohui Wang1
1National Engineering Laboratory for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China

Tóm tắt

In this paper, we propose an area-oriented authentication framework, which aims to provide a light-weight first authentication by reducing the complexity in acquiring and maintaining many different reference vectors as in the traditional one-by-one authentication framework. Under the proposed framework, we first derive the missing detection probability and the false alarm probability, respectively. Then we quantitatively evaluate the average risks that a spoofer is successfully detected or a legitimate user is falsely alarmed, at any position in a certain area. And correspondingly three kinds of areas are defined as the clear area where the spoofers prefer not to attack, the danger area where the spoofers have pretty high probabilities to attack successfully, and the warning area where the legitimate users are much likely to be falsely reported as attackers. These results depict the security situation distribution of a region, and provide useful insights for network operators to take proper following strategies. Finally, simulations are given to verify our analytical derivations and show the impacts of system parameters.

Tài liệu tham khảo

Yilmaz M H, Arslan H. A survey: spoofing attacks in physical layer security. In: Proceedings of IEEE Local Computer Networks Conference Workshops, Clearwater Beach, 2015. 812–817 Xiao L, Sheng G, Wan X, et al. Learning-based PHY-layer authentication for underwater sensor networks. IEEE Commun Lett, 2019, 23: 60–63 Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun, 2010, 17: 56–62 Aman M N, Chua K C, Sikdar B. Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J, 2017, 4: 1327–1340 Namal S, Georgantas K, Gurtov A. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography. In: Proceedings of 2013 IEEE Wireless Communications and Networking Conference, Shanghai, 2013. 1830–1835 Johansson N A, Wang Y P E, Eriksson E, et al. Radio access for ultra-reliable and low-latency 5G communications. In: Proceedings of 2015 IEEE International Conference on Communication Workshop (ICCW), London, 2015. 1184–1189 Kamal M, Tariq M. Light-weight security and data provenance for multi-hop Internet of Things. IEEE Access, 2018, 6: 34439–34448 Yang J, Ji X, Huang K, et al. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun, 2019, 13: 144–152 Suzan S, Babak D B. A survey on lightweight cryptographic algorithms. In: Proceedings of TENCON 2018–2018 IEEE Region 10 Conference, Jeju, 2018. 1784–1789 Challa S, Wazid M, Das A K, et al. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 2017, 5: 3028–3043 Xiao L, Greenstein L, Mandayam N, et al. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans Wirel Commun, 2009, 8: 5948–5956 Shi L, Li M, Yu S, et al. BANA: body area network authentication exploiting channel characteristics. IEEE J Sel Areas Commun, 2013, 31: 1803–1816 Zhang K, Liang X, Lu R, et al. Sybil attacks and their defenses in the Internet of Things. IEEE Internet Things J, 2014, 1: 372–383 Demirbas M, Song Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Buffalo-Niagara Falls, 2006. 564–570 Wang X, Hao P, Hanzo L. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag, 2016, 54: 152–158 Xiao L, Wan X, Han Z. PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun, 2018, 17: 1676–1687 Mohamed M, Cheffena M. Received signal strength based gait authentication. IEEE Sens J, 2018, 18: 6727–6734 Li J, Halder B, Stoica P, et al. Computationally efficient angle estimation for signals with known waveforms. IEEE Trans Signal Process, 1995, 43: 2154–2163 Wang Y, Guan X, Cai Y. The impacts of mobility on performance of physical layer secret key based on angle of arrival. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing, Yangzhou, 2016. 1–5 Abdelaziz A, Burton R, Koksal C E. Message authentication and secret key agreement in VANETs via angle of arrival. In: Proceedings of 2016 IEEE Vehicular Networking Conference, Columbus, 2016. 1–2 Zanella A. Best practice in RSS measurements and ranging. IEEE Commun Surv Tut, 2016, 18: 2662–2686 Zhao Y, Liu Y, Yu T, et al. FREDI: robust RSS-based ranging with multipath effect and radio interference. Comput Netw, 2018, 147: 49–63 Zanella A, Bardella A. RSS-based ranging by multichannel RSS averaging. IEEE Wirel Commun Lett, 2014, 3: 10–13 Stoyanova T, Kerasiotis F, Efstathiou K, et al. Modeling of the RSS uncertainty for RSS-based outdoor localization and tracking applications in wireless sensor networks. In: Proceedings of 2010 4th International Conference on Sensor Technologies and Applications, Venice, 2010. 45–50 Achroufene A, Amirat Y, Chibani A. RSS-based indoor localization using belief function theory. IEEE Trans Automat Sci Eng, 2019, 16: 1163–1180 Waadt A E, Wang S, Kocks C, et al. Positioning in multiband OFDM UWB utilizing received signal strength. In: Proceedings of Positioning Navigation and Communication, Dresden, 2010. 308–312 Bhargava V, Sichitiu M L. Physical authentication through localization in wireless local area networks. In: Proceedings of IEEE Global Telecommunications Conference, St. Louis, 2005. 2658–2662 Chen Y, Yang J, Trappe W, et al. Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans Veh Technol, 2010, 59: 2418–2434 Yang J, Chen Y Y, Trappe W, et al. Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans Parallel Distrib Syst, 2013, 24: 44–58 Li N, Geng H, Xia S, et al. An area description framework for physical layer authentication. In: Proceedings of 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, 2019. 1–6