End-to-end physical layer authentication for dual-hop wireless networks

P Zhang, J Zhu, Y Chen, X Jiang - IEEE Access, 2019 - ieeexplore.ieee.org
P Zhang, J Zhu, Y Chen, X Jiang
IEEE Access, 2019ieeexplore.ieee.org
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not
well-explored by now. Like one step forward in this direction, this paper focuses on the E2E
physical layer authentication in a dual-hop wireless network with an untrusted relay and
proposes a corresponding physical layer authentication scheme. The scheme fully utilizes
the location-specific features of both channel amplitude and delay interval of cascaded
channels and adopts the artificial jamming technique, so that it is not only resistant to the …
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E physical layer authentication in a dual-hop wireless network with an untrusted relay and proposes a corresponding physical layer authentication scheme. The scheme fully utilizes the location-specific features of both channel amplitude and delay interval of cascaded channels and adopts the artificial jamming technique, so that it is not only resistant to the impersonate attack from an unauthorized transmitter but also resilient to the replay attack from the untrusted relay. Theoretical analysis is further conducted to derive the expressions for the probabilities of false alarm and missed detection, which are two fundamental metrics of authentication performance. Finally, the numerical and simulation results are provided to illustrate both the efficiency of these theoretical results and the E2E authentication performance of dual-hop wireless networks under the proposed scheme.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果