Identifying unique devices through wireless fingerprinting
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Secrecy extraction from increased randomness in a time-variant MIMO channel
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A novel framework for message authentication in vehicular communication networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Enhancing wireless security through reconfigurable antennas
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
A channel-based hypothesis testing approach to enhance user authentication in wireless networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Spatial modulation with partial-CSI at the receiver: optimal detector and performance evaluation
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
On channel-based user authentication for mobile terminals
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
IEEE Transactions on Communications
Exploiting the physical layer for enhanced security
IEEE Wireless Communications
IEEE Transactions on Communications
Short paper: ACE: authenticating the channel estimation process in wireless communication systems
Proceedings of the fourth ACM conference on Wireless network security
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Distributed radio relay for communication and control with physical-layer security in smart grid
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Hi-index | 0.01 |
The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the spatial variability of the radio channel response in a rich scattering environment, as is typical of indoor environments. Specifically, we describe a physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal. In this way, legitimate users can be reliably authenticated and false users can be reliably detected. We analyze the ability of a receiver to discriminate between transmitters (users) according to their channel frequency responses. This work is based on a generalized channel response with both spatial and temporal variability, and considers correlations among the time, frequency and spatial domains. Simulation results, using the ray-tracing tool WiSE to generate the time-averaged response, verify the efficacy of the approach under realistic channel conditions, as well as its capability to work under unknown channel variations.