{"title":"针对主用户仿真攻击的物理层认证方案","authors":"Kapil M. Borle, Biao Chen, Wenliang Du","doi":"10.1109/ICASSP.2013.6638195","DOIUrl":null,"url":null,"abstract":"This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.","PeriodicalId":183968,"journal":{"name":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","volume":"33 9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"35","resultStr":"{\"title\":\"A physical layer authentication scheme for countering primary user emulation attack\",\"authors\":\"Kapil M. Borle, Biao Chen, Wenliang Du\",\"doi\":\"10.1109/ICASSP.2013.6638195\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.\",\"PeriodicalId\":183968,\"journal\":{\"name\":\"2013 IEEE International Conference on Acoustics, Speech and Signal Processing\",\"volume\":\"33 9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"35\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference on Acoustics, Speech and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASSP.2013.6638195\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASSP.2013.6638195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A physical layer authentication scheme for countering primary user emulation attack
This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.