{"title":"Covert Authentication at the Physical Layer","authors":"Xufei Li, Shuiguang Zeng, Yangyang Liu","doi":"10.1109/NaNA53684.2021.00015","DOIUrl":null,"url":null,"abstract":"The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.