Abstract
This paper presents a new method for authentication based on overlaying tag signal. The tag signal and communication signal are superimposed to form the signal “watermark”. From the point of view of signal transmission, the tag signal can achieve the dual “binding” of shared key and channel. Security analysis and simulation results indicate that it can achieve high authentication success rate and low failure rate. This method does not require complex cryptographic algorithms. So it can achieve security under the premise of reduce the computational amount in the communication process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, Z., Zhan, B., Yang, Y.: A survey of identification and authentication. Acta Electron. Sin. 27(1), 98–102 (1999)
Maurer, U.M.: Authentication theory and hypothesis testing. IEEE Trans. Inf. Theory 46(4), 1350–1356 (2000)
Yuan, H.: Research on key technologies of wireless network physical layer authentication based on radio frequency fingerprinting, Ph.D. dissertation. Southeast University (2011)
Paul, L.Y., Baras, J.S., Sadler, B.M.: Physical-layer authentication. IEEE Trans. Inf. Forensics Secur. 3(1), 38–51 (2008)
Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Commun. 17(5), 56–62 (2010)
Xiao, L., Greenstein, L.J., Mandayam, N.B., et al.: A physical-layer technique to enhance authentication for mobile terminals. In: Proceedings of IEEE International Conference on Communications, Beijing (2008)
Tugnait, J.K., Kim, H.: A channel-based hypothesis testing approach to enhance user authentication in wireless networks. In: Proceedings of Second International Conference on Communication Systems and Networks, Bangalore (2010)
Shukla, M.K., Trivedi, A., Pandey, O.J.: Physical layer authentication for mobile terminals over MIMO fading wiretap channels. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Mysore (2013)
Shan, D., Zeng, K., Xiang, W., et al.: PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks. IEEE J. Sel. Areas Commun. 31(9), 1817–1827 (2013)
Du, X., Shan, D., Zeng, K., et al.: Physical layer challenge-response authentication in wireless networks with relay. In: Proceedings of IEEE International Conference on Computer Communications (2014)
Molière, R., Delaveau, F., Ngassa, C.L.K., et al.: Tag signals for early authentication and secret key generation in wireless public networks. In: Proceedings of European Conference on Networks and Communications, Paris (2015)
Liu, Z., Xu, J., Zhao, K.: Spectrum water printing technology based on spectrum signal. J. Hebei Univ. Sci. Technol. S1, 116–118 (2011)
Zhang, Y., Xu, J., Liu, Y., et al.: Spectrum tag embedding and extracting method based on correlation identifier. Chin. J. Radio Sci. 31(1), 185–192 (2016)
Jakes, W.C., Cox, D.C.: Microwave Mobile Communications. Wiley, Hoboken (1994)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huawei, S., Jin, L., Zhang, S. (2018). Security Analysis of Authentication Overlaying Tag Signal. In: Li, C., Mao, S. (eds) Wireless Internet. WiCON 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 230. Springer, Cham. https://doi.org/10.1007/978-3-319-90802-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-90802-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90801-4
Online ISBN: 978-3-319-90802-1
eBook Packages: Computer ScienceComputer Science (R0)