Cargando…

Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources

In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authenticati...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Yi, Wen, Hong, Wu, Jinsong, Song, Huanhuan, Xu, Aidong, Jiang, Yixin, Zhang, Tengyue, Wang, Zhen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6514770/
https://www.ncbi.nlm.nih.gov/pubmed/31022882
http://dx.doi.org/10.3390/s19081926
_version_ 1783417938021187584
author Chen, Yi
Wen, Hong
Wu, Jinsong
Song, Huanhuan
Xu, Aidong
Jiang, Yixin
Zhang, Tengyue
Wang, Zhen
author_facet Chen, Yi
Wen, Hong
Wu, Jinsong
Song, Huanhuan
Xu, Aidong
Jiang, Yixin
Zhang, Tengyue
Wang, Zhen
author_sort Chen, Yi
collection PubMed
description In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies.
format Online
Article
Text
id pubmed-6514770
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-65147702019-05-30 Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources Chen, Yi Wen, Hong Wu, Jinsong Song, Huanhuan Xu, Aidong Jiang, Yixin Zhang, Tengyue Wang, Zhen Sensors (Basel) Article In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies. MDPI 2019-04-24 /pmc/articles/PMC6514770/ /pubmed/31022882 http://dx.doi.org/10.3390/s19081926 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chen, Yi
Wen, Hong
Wu, Jinsong
Song, Huanhuan
Xu, Aidong
Jiang, Yixin
Zhang, Tengyue
Wang, Zhen
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title_full Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title_fullStr Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title_full_unstemmed Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title_short Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
title_sort clustering based physical-layer authentication in edge computing systems with asymmetric resources
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6514770/
https://www.ncbi.nlm.nih.gov/pubmed/31022882
http://dx.doi.org/10.3390/s19081926
work_keys_str_mv AT chenyi clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT wenhong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT wujinsong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT songhuanhuan clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT xuaidong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT jiangyixin clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT zhangtengyue clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources
AT wangzhen clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources