Cargando…
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authenticati...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6514770/ https://www.ncbi.nlm.nih.gov/pubmed/31022882 http://dx.doi.org/10.3390/s19081926 |
_version_ | 1783417938021187584 |
---|---|
author | Chen, Yi Wen, Hong Wu, Jinsong Song, Huanhuan Xu, Aidong Jiang, Yixin Zhang, Tengyue Wang, Zhen |
author_facet | Chen, Yi Wen, Hong Wu, Jinsong Song, Huanhuan Xu, Aidong Jiang, Yixin Zhang, Tengyue Wang, Zhen |
author_sort | Chen, Yi |
collection | PubMed |
description | In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies. |
format | Online Article Text |
id | pubmed-6514770 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-65147702019-05-30 Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources Chen, Yi Wen, Hong Wu, Jinsong Song, Huanhuan Xu, Aidong Jiang, Yixin Zhang, Tengyue Wang, Zhen Sensors (Basel) Article In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies. MDPI 2019-04-24 /pmc/articles/PMC6514770/ /pubmed/31022882 http://dx.doi.org/10.3390/s19081926 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chen, Yi Wen, Hong Wu, Jinsong Song, Huanhuan Xu, Aidong Jiang, Yixin Zhang, Tengyue Wang, Zhen Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title | Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title_full | Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title_fullStr | Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title_full_unstemmed | Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title_short | Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources |
title_sort | clustering based physical-layer authentication in edge computing systems with asymmetric resources |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6514770/ https://www.ncbi.nlm.nih.gov/pubmed/31022882 http://dx.doi.org/10.3390/s19081926 |
work_keys_str_mv | AT chenyi clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT wenhong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT wujinsong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT songhuanhuan clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT xuaidong clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT jiangyixin clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT zhangtengyue clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources AT wangzhen clusteringbasedphysicallayerauthenticationinedgecomputingsystemswithasymmetricresources |