Cargando…

Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Shaoyu, Huang, Kaizhi, Xu, Xiaoming, Hu, Xiaoyan, Yang, Jing, Jin, Liang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9031411/
https://www.ncbi.nlm.nih.gov/pubmed/35455151
http://dx.doi.org/10.3390/e24040488
_version_ 1784692383546343424
author Wang, Shaoyu
Huang, Kaizhi
Xu, Xiaoming
Hu, Xiaoyan
Yang, Jing
Jin, Liang
author_facet Wang, Shaoyu
Huang, Kaizhi
Xu, Xiaoming
Hu, Xiaoyan
Yang, Jing
Jin, Liang
author_sort Wang, Shaoyu
collection PubMed
description Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception [Formula: see text] , where [Formula: see text] is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.
format Online
Article
Text
id pubmed-9031411
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-90314112022-04-23 Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication Wang, Shaoyu Huang, Kaizhi Xu, Xiaoming Hu, Xiaoyan Yang, Jing Jin, Liang Entropy (Basel) Article Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception [Formula: see text] , where [Formula: see text] is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed. MDPI 2022-03-30 /pmc/articles/PMC9031411/ /pubmed/35455151 http://dx.doi.org/10.3390/e24040488 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Shaoyu
Huang, Kaizhi
Xu, Xiaoming
Hu, Xiaoyan
Yang, Jing
Jin, Liang
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_full Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_fullStr Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_full_unstemmed Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_short Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_sort unconditional authentication based on physical layer offered chain key in wireless communication
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9031411/
https://www.ncbi.nlm.nih.gov/pubmed/35455151
http://dx.doi.org/10.3390/e24040488
work_keys_str_mv AT wangshaoyu unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT huangkaizhi unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT xuxiaoming unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT huxiaoyan unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT yangjing unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT jinliang unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication