Physical Layer Authentication in Wireless Communication Networks: A Survey
查看参考文献122篇
文摘
|
Physical layer security (PLS) in wireless communication systems has attracted extensive research attentions in recent years. Unlike cryptography-based methods applied in upper-layer in network, PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the randomness of signals and wireless channels. In this survey, we provide a comprehensive review in the domain of physical layer authentication (PLA) in wireless communication systems, including the concepts, several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems. The survey begins with an overview of the background and basic concepts of PLA, such as the general model of wireless security communication system, typical frameworks of key-based/less PLA systems, and the common attack models. We then discuss the major concerns and key techniques that are applied in PLA systems, where three types of authentication schemes are considered,i.e., the authentication based on channel information, radio-frequency and identity watermarks. Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered. Finally, the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper. |
来源
|
Journal of Communications and Information Networks
,2020,5(3):237-264 【核心库】
|
DOI
|
10.23919/JCIN.2020.9130438
|
关键词
|
physical layer authentication (PLA)
;
radiofrequency identification
;
hypothesis testing
;
wireless communication
|
地址
|
1.
School of Cyber Science and Technology, Beihang University, Beijing, 100191
2.
School of Electronic and Information Engineering, Beihang University, Beijing, 100191
3.
School of Information Technology, Deakin University, Australia, Burwood, VIC 3125
4.
School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia, Sydney, NSW 2052
|
语种
|
英文 |
文献类型
|
研究性论文 |
ISSN
|
2096-1081 |
学科
|
电子技术、通信技术 |
基金
|
国家自然科学基金
;
supported by National Key Research and Development Program of China
|
文献收藏号
|
CSCD:6808615
|
参考文献 共
122
共7页
|
1.
Danev B. On physical-layer identification of wireless devices.
ACM Comput. Surv,2012,45(1)
|
被引
12
次
|
|
|
|
2.
Baldini G. A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components.
IEEE Commun. Surveys Tuts,2017,19(3):1761-1789
|
被引
4
次
|
|
|
|
3.
Xu Q. Device fingerprinting in wireless networks: Challenges and opportunities.
IEEE Commun. Surveys Tuts,2015,18(1):94-104
|
被引
3
次
|
|
|
|
4.
Wang X. Physical-layer authentication for wireless security enhancement: Current challenges and future developments.
IEEE Commun. Mag,2016,54(6):152-158
|
被引
4
次
|
|
|
|
5.
Mukherjee A. Principles of physical layer security in multiuser wireless networks: A survey.
IEEE Commun. Surveys Tuts,2014,16(3):1550-1573
|
被引
45
次
|
|
|
|
6.
Liu Y. Physical layer security for next generation wireless networks: Theories, technologies, and challenges.
IEEE Commun. Surveys Tut,2017,19(1):347-376
|
被引
7
次
|
|
|
|
7.
Jorswieck E. Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing.
Proc. IEEE,2015,103(10):1702-1724
|
被引
4
次
|
|
|
|
8.
Massey J L. An introduction to contemporary cryptology.
Proc. IEEE,1988,76(5):533-549
|
被引
9
次
|
|
|
|
9.
Barenghi A. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures.
Proc. IEEE,2012,100(11):3056-3076
|
被引
12
次
|
|
|
|
10.
Shannon C E. Communication theory of secrecy systems.
Bell Syst. Tech. J,1949,28(4):656-715
|
被引
373
次
|
|
|
|
11.
Wyner A D. The wire-tap channel.
Bell Syst. Tech. J,1975,54(8):1355-1367
|
被引
251
次
|
|
|
|
12.
Csiszar I. Broadcast channels with confidential messages.
IEEE Trans. Inf. Theory,1979,24(3):339-348
|
被引
84
次
|
|
|
|
13.
Maurer U M. Secret key agreement by public discussion from common information.
IEEE Trans. Inf. Theory,1993,39(3):733-742
|
被引
67
次
|
|
|
|
14.
Liang Y. Information theoretic security.
Foundations and Trends in Communications and Information Theory,2009,5(4/5):355-580
|
被引
5
次
|
|
|
|
15.
Bloch M.
Physical-layer security: From information theory to security engineering,2011
|
被引
14
次
|
|
|
|
16.
Gilbert E N. Codes which detect deception.
Bell Syst. Tech. J,1974,53(3):405-424
|
被引
20
次
|
|
|
|
17.
Brickell E F. A few results in message authentication.
Congr. Numerantium,1984,43:141-154
|
被引
1
次
|
|
|
|
18.
Sgarro A. Blind coding: Authentication frauds from the point of view of rate-distortion theory.
Journal of Discrete Mathematical Sciences and Cryptography,2001,4(2/3)
|
被引
1
次
|
|
|
|
19.
Maurer U. Authentication theory and hypothesis testing.
IEEE Trans. Inf. Theory,2000,46(4):1350-1356
|
被引
8
次
|
|
|
|
20.
Tugnait J K. A channel-based hypothesis testing approach to enhance user authentication in wireless networks.
Proceedings of IEEE International Conference on Communication systems and networks (COMSNETS),2010:1-9
|
被引
1
次
|
|
|
|
|