帮助 关于我们

返回检索结果

Physical Layer Authentication in Wireless Communication Networks: A Survey

查看参考文献122篇

Bai Lin 1   Zhu Lina 2 *   Liu Jianwei 1   Choi Jinho 3   Zhang Wei 4  
文摘 Physical layer security (PLS) in wireless communication systems has attracted extensive research attentions in recent years. Unlike cryptography-based methods applied in upper-layer in network, PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the randomness of signals and wireless channels. In this survey, we provide a comprehensive review in the domain of physical layer authentication (PLA) in wireless communication systems, including the concepts, several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems. The survey begins with an overview of the background and basic concepts of PLA, such as the general model of wireless security communication system, typical frameworks of key-based/less PLA systems, and the common attack models. We then discuss the major concerns and key techniques that are applied in PLA systems, where three types of authentication schemes are considered,i.e., the authentication based on channel information, radio-frequency and identity watermarks. Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered. Finally, the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper.
来源 Journal of Communications and Information Networks ,2020,5(3):237-264 【核心库】
DOI 10.23919/JCIN.2020.9130438
关键词 physical layer authentication (PLA) ; radiofrequency identification ; hypothesis testing ; wireless communication
地址

1. School of Cyber Science and Technology, Beihang University, Beijing, 100191  

2. School of Electronic and Information Engineering, Beihang University, Beijing, 100191  

3. School of Information Technology, Deakin University, Australia, Burwood, VIC 3125  

4. School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia, Sydney, NSW 2052

语种 英文
文献类型 研究性论文
ISSN 2096-1081
学科 电子技术、通信技术
基金 国家自然科学基金 ;  supported by National Key Research and Development Program of China
文献收藏号 CSCD:6808615

参考文献 共 122 共7页

1.  Danev B. On physical-layer identification of wireless devices. ACM Comput. Surv,2012,45(1) 被引 12    
2.  Baldini G. A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components. IEEE Commun. Surveys Tuts,2017,19(3):1761-1789 被引 4    
3.  Xu Q. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Commun. Surveys Tuts,2015,18(1):94-104 被引 3    
4.  Wang X. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag,2016,54(6):152-158 被引 4    
5.  Mukherjee A. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surveys Tuts,2014,16(3):1550-1573 被引 45    
6.  Liu Y. Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Commun. Surveys Tut,2017,19(1):347-376 被引 7    
7.  Jorswieck E. Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing. Proc. IEEE,2015,103(10):1702-1724 被引 4    
8.  Massey J L. An introduction to contemporary cryptology. Proc. IEEE,1988,76(5):533-549 被引 9    
9.  Barenghi A. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE,2012,100(11):3056-3076 被引 12    
10.  Shannon C E. Communication theory of secrecy systems. Bell Syst. Tech. J,1949,28(4):656-715 被引 373    
11.  Wyner A D. The wire-tap channel. Bell Syst. Tech. J,1975,54(8):1355-1367 被引 251    
12.  Csiszar I. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory,1979,24(3):339-348 被引 84    
13.  Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory,1993,39(3):733-742 被引 67    
14.  Liang Y. Information theoretic security. Foundations and Trends in Communications and Information Theory,2009,5(4/5):355-580 被引 5    
15.  Bloch M. Physical-layer security: From information theory to security engineering,2011 被引 14    
16.  Gilbert E N. Codes which detect deception. Bell Syst. Tech. J,1974,53(3):405-424 被引 20    
17.  Brickell E F. A few results in message authentication. Congr. Numerantium,1984,43:141-154 被引 1    
18.  Sgarro A. Blind coding: Authentication frauds from the point of view of rate-distortion theory. Journal of Discrete Mathematical Sciences and Cryptography,2001,4(2/3) 被引 1    
19.  Maurer U. Authentication theory and hypothesis testing. IEEE Trans. Inf. Theory,2000,46(4):1350-1356 被引 8    
20.  Tugnait J K. A channel-based hypothesis testing approach to enhance user authentication in wireless networks. Proceedings of IEEE International Conference on Communication systems and networks (COMSNETS),2010:1-9 被引 1    
引证文献 1

1 Tang Chengwen Multi-objective Handover Strategy for Space Earth Integrated Network Transactions of Nanjing University of Aeronautics and Astronautics,2023,40(4):447-459
被引 0 次

显示所有1篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号