In a wide band and multipath rich environment, precise channel estimation allows authenticating the source and protecting the integrity of a message at the physical layer without the need of a pre-shared secret key. This allows also a reduction of the burden on the authentication protocols at higher layers. In this paper we develop an authentication scheme in the framework of hypothesis testing that suits a multiple wiretap channels environment with correlated fading, as is the case of multiple input multiple output (MIMO) systems and/or orthogonal frequency division multiplexing (OFDM) modulation. By allowing some degree of correlation among the channels, we formulate the optimal attack strategy for the cases of both single attempt and multiple repeated trials. For the latter scenario, due to the complexity of the optimal solution, we also develop a simpler suboptimal attack strategy. The performance of the proposed methods is evaluated in a MIMO/OFDM scenario and numerical results show the merits of the proposed approaches that can be adopted as a layer one authentication mechanism.

Physical Layer Authentication over MIMO Fading Wiretap Channels

BARACCA, PAOLO;LAURENTI, NICOLA;TOMASIN, STEFANO
2012

Abstract

In a wide band and multipath rich environment, precise channel estimation allows authenticating the source and protecting the integrity of a message at the physical layer without the need of a pre-shared secret key. This allows also a reduction of the burden on the authentication protocols at higher layers. In this paper we develop an authentication scheme in the framework of hypothesis testing that suits a multiple wiretap channels environment with correlated fading, as is the case of multiple input multiple output (MIMO) systems and/or orthogonal frequency division multiplexing (OFDM) modulation. By allowing some degree of correlation among the channels, we formulate the optimal attack strategy for the cases of both single attempt and multiple repeated trials. For the latter scenario, due to the complexity of the optimal solution, we also develop a simpler suboptimal attack strategy. The performance of the proposed methods is evaluated in a MIMO/OFDM scenario and numerical results show the merits of the proposed approaches that can be adopted as a layer one authentication mechanism.
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/2525208
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 100
  • ???jsp.display-item.citation.isi??? 89
social impact