Browse > Article
http://dx.doi.org/10.3837/tiis.2021.06.018

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks  

Wang, Qiuhua (School of Cyberspace, Hangzhou Dianzi University)
Kang, Mingyang (School of Cyberspace, Hangzhou Dianzi University)
Yuan, Lifeng (School of Cyberspace, Hangzhou Dianzi University)
Wang, Yunlu (School of Cyberspace, Hangzhou Dianzi University)
Miao, Gongxun (Zhongfu Information Co., Ltd.)
Choo, Kim-Kwang Raymond (Department of Information Systems and Cyber Security, University of Texas at San Antonio)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.6, 2021 , pp. 2255-2281 More about this Journal
Abstract
Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.
Keywords
Physical layer authentication; industrial wireless network; channel state information; test statistic;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Brown, X. Du and K. Nygard, "An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme," in Proc. of IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, Washington, DC, USA, pp. 991-995, 2007.
2 X. Wang, P. Hao and L. Hanzo, "Physical-Layer Authentication for Wireless Security Enhancement: Current Challenges and Future Developments," IEEE Communications Magazine, vol. 54, no. 6, pp. 152-158, Jun. 2016.   DOI
3 R. Liao, H. Wen, F. Pan, H. Song, A. Xu and Y. Jiang, "A Novel Physical Layer Authentication Method with Convolutional Neural Network," in Proc. of 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, pp. 231-235, 2019.
4 W. Hou, X. Wang, J. Chouinard and A. Refaey, "Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets," IEEE Trans. Commun., vol. 62, no. 5, pp. 1658-1667, May 2014.   DOI
5 G. Oligeri, S. Raponi, S. Sciancalepore, R. Pietro, "PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning," ArXiv, Oct. 2020. [Online]. Available: https://arxiv.org/abs/2010.05470v1
6 Y. Chen, A. Xu, Y. Jiang and Y. Zhang, "A Data Authentication Method Based on Vector Projection for Industrial Edge Computing System," DEStech Transactions on Computer Science and Engineering, 2019.
7 L. Xiao, Y. Li, G. Han, G. Liu and W. Zhuang, "PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks," IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10037-10047, Dec. 2016.   DOI
8 G. Verma, P. Yu and B. M. Sadler, "Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios," IEEE Access, vol. 3, pp. 81-88, 2015.   DOI
9 N. Xie and S. Zhang, "Blind Authentication at the Physical Layer Under Time-Varying Fading Channels," IEEE Journal on Selected Areas in Communications, vol. 36, no. 7, pp. 1465-1479, Jul. 2018.   DOI
10 M. Luvisotto, Z. Pang and D. Dzung, "Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions," IEEE Trans Ind. Informat., vol. 13, no. 3, pp. 1448- 1459, June 2017.   DOI
11 M. Luvisotto, Z. Pang, D. Dzung, M. Zhan and X. Jiang, "Physical Layer Design of High-Performance Wireless Transmission for Critical Control Applications," IEEE Trans Ind. Informat., vol. 13, no. 6, pp. 2844-2854, Dec. 2017.   DOI
12 Q. Wang, H. Li, Zh. Chen, D. Zhao and Sh. Ye, "Supervised and semi-supervised deep neural networks for CSI-based authentication," ArXiv, Jul. 2018. [Online]. Available: https://arxiv.org/abs/1807.09469
13 R. Liao, H. Wen, J. Wu and F. Pan, "Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks," Sensors, May 2019.
14 F. J. Liu, X. Wang and S. L. Primak, "A two dimensional quantization algorithm for CIR-based physical layer authentication," in Proc. of IEEE Int. Conf. Commun. (ICC), Budapest, pp. 4724- 4728, 2013.
15 F. Pan, Z. Pang, H. Wen and M. Luvisotto, "Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS," IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6481-6491, Dec. 2019.   DOI
16 O. Ureten and N. Serinken, "Wireless Security Through RF Fingerprinting," Canadian Journal of Electrical and Computer Engineering, vol. 32, no. 1, pp. 27-33, Winter 2007.   DOI
17 X. Liang, K. Zhang, X. Shen and X. Lin, "Security and privacy in mobile social networks: challenges and solutions," IEEE Wireless Commun. Mag., vol. 21, no. 1, pp. 33-41, Feb. 2014.   DOI
18 Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sen. Netw., vol. 2, no. 4, pp. 500-528, Nov. 2006.   DOI
19 J. Cao, M. Ma, H. Li, Y. Zhang and Z. Luo, "A Survey on Security Aspects for LTE and LTE-A Networks," IEEE Commun. Surv. Tut., vol. 16, no. 1, pp. 283-302, First Quarter 2014.   DOI
20 H. Liu, Y. Wang, J. Liu, J. Yang, Y. Chen and H. V. Poor, "Authenticating Users Through FineGrained Channel Information," IEEE Trans. Mobile Comput., vol. 17, no. 2, pp. 251-264, Feb. 2018.   DOI
21 L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication," in Proc. of IEEE Int. Conf. Commun. (ICC), Glasgow, pp. 4646-4651, 2007.
22 W. C. Jakes, Microwave Mobile Communications, Hoboken, NJ, USA: Wiley, 1994.
23 F. He, H. Man, D. Kivanc and B. McNair, "EPSON: Enhanced Physical Security in OFDM Networks," in Proc. of IEEE Int. Conf. Commun. (ICC), Dresden, pp. 1-5, 2009.
24 H. Wen, Y.F. Wang, X.P. Zhu, L. Zhou, "Physical Layer Assist Authentication Technique for Smart Meter System," IET Communications, vol. 7, pp. 189-197, Feb. 2013.   DOI
25 T. Ma, "Research on lightweight physical layer assist authentication technique in smart grid," M.S. thesis, Nat. Key Lab. Sci. Technol. Commun., Univ. Electron. Sci. Technol. China, Chengdu, China, Jul. 2015.
26 L. Xiao, X. Wan and Z. Han, "PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead," IEEE Trans. Wireless Commun., vol. 17, no. 3, pp. 1676-1687, March 2018.   DOI
27 F. Pan, Z. Pang, M. Xiao, H. Wen and R. Liao, "Clone Detection Based on Physical Layer Reputation for Proximity Service," IEEE Access, vol. 7, pp. 3948-3957, 2019.   DOI
28 X. Wu and Z. Yang, "Physical-Layer Authentication for Multi-Carrier Transmission," IEEE Communications Letters, vol. 19, no. 1, pp. 74-77, Jan. 2015.   DOI
29 L. Xiao, T. Chen, G. Han, W. Zhuang and L. Sun, "Game Theoretic Study on Channel-Based Authentication in MIMO Systems," IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7474-7484, Aug. 2017.   DOI
30 Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, Feb. 2006.   DOI
31 J. Choi, "A Coding Approach With Key-Channel Randomization for Physical-Layer Authentication," IEEE Trans. Inf. Forensics Security, vol. 14, no. 1, pp. 175-185, Jan. 2019.   DOI
32 X. Wu, Z. Yang, C. Ling and X. Xia, "Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6611-6625, Oct. 2016.   DOI
33 S. Tomasin, "Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches," IEEE Trans. Wireless Commun, vol. 17, no. 9, pp. 5700-5712, Sept. 2018.   DOI
34 C. Pei, N. Zhang, X. S. Shen and J. W. Mark, "Channel-based physical layer authentication," in Proc. of IEEE Global Commun. Conf. (GLOBECOM), pp. 4114-4119, Dec. 2014.
35 A. Weinand, M. Karrenbauer, J. Lianghai and H. D. Schotten, "Physical Layer Authentication for Mission Critical Machine Type Communication Using Gaussian Mixture Model Based Clustering," in Proc. of 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, pp. 1-5, 2017.
36 H. Wen, P. -. Ho, C. Qi and G. Gong, "Physical layer assisted authentication for distributed ad hoc wireless sensor networks," IET Information Security, vol. 4, no. 4, pp. 390-396, Dec. 2010.   DOI
37 P. Hao, X. Wang and W. Shen, "A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication," IEEE Access, vol. 6, pp. 42279-42293, 2018.   DOI
38 D. A. Knox and T. Kunz, "Secure Authentication in Wireless Sensor Networks Using RF Fingerprints," in Proc. of 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, pp. 230-237, 2008.
39 V. Brik, S. Banerjee, M. Gruteser and S. Oh, "Wireless device identification with radiometric signatures," in Proc. of the 14th ACM International Conference on Mobile Computing and Networking, pp. 116-127, 2008.
40 N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-Layer Authentication Based on Extreme Learning Machine," IEEE Commun. Lett., vol. 21, no. 7, pp. 1557-1560, July 2017.   DOI
41 L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," in Proc. of IEEE Int. Conf. Commun. (ICC), Beijing, pp. 1520-1524, 2008.
42 L. Xiao, L. J. Greenstein, N. B. Mandayam and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571- 2579, July 2008.   DOI
43 D. Shan, K. Zeng, W. Xiang, P. Richardson and Y. Dong, "PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1817-1827, Sep. 2013.   DOI
44 X. Du, D. Shan, K. Zeng and L. Huie, "Physical layer challenge-response authentication in wireless networks with relay," in Proc. of IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, pp. 1276-1284, 2014.
45 F. Pan, H. Wen, R. Liao, Y. Jang and A.Xu, "Physical layer authentication based on channel information and machine learning," in Proc. of IEEE Conf. Commun. Netw. Secur. (CNS), pp. 364-365, Oct. 2017.
46 S. Van Vaerenbergh, O. Gonzalez, J. Via and I. Santamaria, "Physical layer authentication based on channel response tracking using Gaussian processes," in Proc. of 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, pp. 2410-2414, 2014.
47 Y. Shi and M. A. Jensen, "Improved Radiometric Identification of Wireless Devices Using MIMO Transmission," IEEE Transactions on Information Forensics and Security, vol. 6, no. 4, pp. 1346-1354, Dec. 2011.   DOI
48 W. Hou, X. Wang and J. Chouinard, "Physical Layer Authentication in OFDM Systems based on Hypothesis Testing of CFO Estimates," in Proc. of 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, pp. 3559-3563, 2012.
49 P. L. Yu, G. Verma and B. M. Sadler, "Wireless physical layer authentication via fingerprint embedding," IEEE Communications Magazine, vol. 53, no. 6, pp. 48-53, Jun. 2015.   DOI
50 R. Candell, K. A. Remley, N. Moayeri, "Radio frequency measurements for selected manufacturing and industrial environments," NIST Tech. Rep. 1951, Jul. 2016.
51 S. Yan, X. Wang, L. Xu, "Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks," IET Communications, vol. 14, no. 18, pp. 3128-3134, Nov. 2020.   DOI