Cai, Yufeng, Wang, Wenya, Chen, Yicong, Tan, Haijun, Xie, Ning, Wang, Jiangzhou (2023) Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication. IEEE Communications Magazine, 61 (7). pp. 165-171. ISSN 1558-1896. (doi:10.1109/mcom.007.2200402) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:102335)
The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. (Contact us about this Publication) | |
Official URL: https://doi.org/10.1109/mcom.007.2200402 |
Abstract
This article concerns the problem of ensuring the security of the tag-based Physical-Layer Authentication (PLA) schemes under multiple cooperative attackers. This problem is important and challenging because of the following reasons. First, if more attackers launch a cooperative attack, the success probability of launching an eavesdropping attack will be improved. Second, based on a cooperative communication system, cooperative attackers can launch more advanced attacks, e.g., a cooperative attack that traps the legitimate user to re-transmit the same tag again. Thus, it is challenging and desirable to construct a secure tag-based PLA scheme under multiple cooperative attackers. For effectively defending against a cooperative attack under multiple coop-erative attackers, we propose a new tag-based PLA scheme, referred to as the PLA with the Detection of a Cooperative Attack (PLA-DCA) scheme. The basic idea of the PLA-DCA scheme is to utilize the extra noise in a replayed signal, since a replayed signal inevitably changes the distribution property of receiver noise, e.g., increment of the noise variance. Then, we implemented the proposed scheme and conducted extensive performance comparisons to demonstrate the superiority of the proposed scheme. We evaluate the security of various schemes through equivocation, which represents the uncertainty of estimating a tag. From the simulation results, we verify that the proposed scheme provides higher security than the prior tag-based PLA schemes.
Item Type: | Article |
---|---|
DOI/Identification number: | 10.1109/mcom.007.2200402 |
Additional information: | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Uncontrolled keywords: | Electrical and Electronic Engineering, Computer Networks and Communications, Computer Science Applications |
Subjects: | T Technology > TA Engineering (General). Civil engineering (General) |
Divisions: | Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts |
Funders: | National Natural Science Foundation of China (https://ror.org/01h0zpd94) |
SWORD Depositor: | JISC Publications Router |
Depositing User: | JISC Publications Router |
Date Deposited: | 09 Aug 2023 15:20 UTC |
Last Modified: | 05 Nov 2024 13:08 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/102335 (The current URI for this page, for reference purposes) |
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):