2017
DOI: 10.3390/s17020289
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

Abstract: Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Different from the literature presented so far, our authentication approach relies on the estimation of the distribution of selected underwater channel features instead of their instantaneous realizations, as opposed to, e.g., [9]- [19]. Unlike [5], we do not explicitly generate keys starting from channel features; we do not base our scheme on cryptography (unlike [2]); and in order to save energy we do not require the transmission of structured jamming signals, unlike some approaches in [3].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different from the literature presented so far, our authentication approach relies on the estimation of the distribution of selected underwater channel features instead of their instantaneous realizations, as opposed to, e.g., [9]- [19]. Unlike [5], we do not explicitly generate keys starting from channel features; we do not base our scheme on cryptography (unlike [2]); and in order to save energy we do not require the transmission of structured jamming signals, unlike some approaches in [3].…”
Section: Related Workmentioning
confidence: 99%
“…ROC curve for the KL bound(19), GG signals with estimated parameters (GG Model), and Bellhop signals (Actual).…”
mentioning
confidence: 99%
“…Proof: According to the principle of channel reciprocity [36], [37], we know that only legitimate SN and the sink can be able to generate correlated channel parameters. Then, the SN and the sink can confirm the validity of each other because the average of the path loss values generated independently from their end of the channel is always greater than or equals to the threshold.…”
Section: ) Mutual Authenticationmentioning
confidence: 99%
“…The system utilizes the principle of reciprocity from electromagnetic propagation which shows that the channel characteristics obtained by the sender and receiver will be the same if the measurement is carried out within coherence time. Some studies use the received signal strength (RSS) as one of the characteristics of radio channels [19,20,21,22,23]. These channel characteristics are the most available characteristics in wireless devices with various standards, i.e., Bluetooth, IEEE 802.15.4, and IEEE 802.11.…”
Section: Introductionmentioning
confidence: 99%