2015
DOI: 10.1109/tifs.2015.2392565
|View full text |Cite
|
Sign up to set email alerts
|

On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading

Abstract: For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modeled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side info… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
18
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 37 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…A bound for the system's performance, in terms of the FA and MD probabilities P FA (φ) and P MD (φ) for a given attack strategy can be obtained by applying the data processing inequality [35]. By defining the Kullback-Leibler (KL) divergence as…”
Section: A Distributed Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…A bound for the system's performance, in terms of the FA and MD probabilities P FA (φ) and P MD (φ) for a given attack strategy can be obtained by applying the data processing inequality [35]. By defining the Kullback-Leibler (KL) divergence as…”
Section: A Distributed Authenticationmentioning
confidence: 99%
“…Thus, the complexity of our algorithm for authenticating a single packet is O 4N (N sym + N 3 sym + N 2 sym )N EM . We also note that the EM algorithm, as well as the alternate maximization process, provably converge to a local maximum of the log-likelihood function (35). We explore this convergence numerically in the following.…”
mentioning
confidence: 94%
“…A general analysis and evaluation framework is presented in [14], while a recent overview of physical layer authentication methods can be found in [15]. Typically, authentication methods are classified into key-based and key-less methods: in key-less methods users are authenticated by verifying that messages of the same user are transmitted through the same (initially authenticated) channel [16], [17]. An artificial noise (AN) aided message authentication code is proposed where the AN is quantized and transmitted above the physical layer.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the broadcasting nature of the wireless channels causes the wireless communication channel easily to be eavesdropped on or intercepted by an adversary [1,2]. Therefore, the interest in exploiting the characteristics of the wireless channels at the PHYlayer to enhance and complement the conventional security mechanisms is growing, such as the secret key extraction from the characteristics of wireless channels [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] and PHYlayer authentication [20][21][22][23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…In general, according to whether a shared secret key between the legitimate parties is utilized to authenticate each other or not, the existing PHY-layer authentication schemes can be divided into key based or keyless [20]. In some practical cases, it might be difficult to implement the keyless authentication schemes [21][22][23]. This is because the features of either the transmitting device or the specific channel between the legitimate users, which are exploited to authenticate the transmission, are required to be identified.…”
Section: Introductionmentioning
confidence: 99%