Skip to main content
Kent Academic Repository

Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication

Cai, Yufeng, Wang, Wenya, Chen, Yicong, Tan, Haijun, Xie, Ning, Wang, Jiangzhou (2023) Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication. IEEE Communications Magazine, 61 (7). pp. 165-171. ISSN 1558-1896. (doi:10.1109/mcom.007.2200402) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:102335)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. (Contact us about this Publication)
Official URL:
https://doi.org/10.1109/mcom.007.2200402

Abstract

This article concerns the problem of ensuring the security of the tag-based Physical-Layer Authentication (PLA) schemes under multiple cooperative attackers. This problem is important and challenging because of the following reasons. First, if more attackers launch a cooperative attack, the success probability of launching an eavesdropping attack will be improved. Second, based on a cooperative communication system, cooperative attackers can launch more advanced attacks, e.g., a cooperative attack that traps the legitimate user to re-transmit the same tag again. Thus, it is challenging and desirable to construct a secure tag-based PLA scheme under multiple cooperative attackers. For effectively defending against a cooperative attack under multiple coop-erative attackers, we propose a new tag-based PLA scheme, referred to as the PLA with the Detection of a Cooperative Attack (PLA-DCA) scheme. The basic idea of the PLA-DCA scheme is to utilize the extra noise in a replayed signal, since a replayed signal inevitably changes the distribution property of receiver noise, e.g., increment of the noise variance. Then, we implemented the proposed scheme and conducted extensive performance comparisons to demonstrate the superiority of the proposed scheme. We evaluate the security of various schemes through equivocation, which represents the uncertainty of estimating a tag. From the simulation results, we verify that the proposed scheme provides higher security than the prior tag-based PLA schemes.

Item Type: Article
DOI/Identification number: 10.1109/mcom.007.2200402
Additional information: © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled keywords: Electrical and Electronic Engineering, Computer Networks and Communications, Computer Science Applications
Subjects: T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts
Funders: National Natural Science Foundation of China (https://ror.org/01h0zpd94)
SWORD Depositor: JISC Publications Router
Depositing User: JISC Publications Router
Date Deposited: 09 Aug 2023 15:20 UTC
Last Modified: 09 Aug 2023 15:20 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/102335 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.