Power allocation tradeoffs in multicarrier authentication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
A novel framework for message authentication in vehicular communication networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Enhancing wireless security through reconfigurable antennas
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread-spectrum communications) exist at the physical layer often with an additional cost in bandwidth. This paper introduces a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted concurrently with the data. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth, as do spread-spectrum methods. The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed in block fading channels. The use of the authentication for channel estimation is also considered, and an improved bit-error rate is demonstrated for time-varying channels. Finally, simulation results are given that demonstrate the potential application of this authentication technique.