Covert Authentication at the Physical Layer

Xufei Li, Shuiguang Zeng, Yangyang Liu
{"title":"Covert Authentication at the Physical Layer","authors":"Xufei Li, Shuiguang Zeng, Yangyang Liu","doi":"10.1109/NaNA53684.2021.00015","DOIUrl":null,"url":null,"abstract":"The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.
在物理层隐蔽身份验证
无线通信的开放性使其面临着各种各样的干扰,恶意攻击者可以选择有价值的信息进行干扰,从而达到利益最大化。这种针对性的消息通常需要各种安全机制的全面保护,这在一定程度上提高了安全性,同时也降低了被选择性攻击的风险。一种是保证真实性的身份验证机制,但由于普通身份验证是通过向消息添加数字签名位来进行的,因此受到长度检测的影响。鉴于这一缺点,本文考虑在物理层将数字签名嵌入到消息中,使其难以被攻击者感知。不同于以往的射频水印技术在基本消息符号中加入低功耗的认证标签符号,同时表现出明显的星座特征,使攻击者无法察觉,我们提出在嵌入过程中使用网格编码调制(TCM)来阻止基于星座特征的检测。仿真结果验证了该认证方案的准确性及其对基于消息的影响。仿真结果表明,该方法在保证良好的认证精度的同时,具有较强的隐蔽性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信