Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer

Rahman, M. M. U., Yasmeen, A. and Abbasi, Q. H. (2017) Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer. In: IEEE 85th Vehicular Technology Conference: VTC2017-Spring, Sydney, Australia, 4-7 June 2017, ISBN 9781509059324 (doi: 10.1109/VTCSpring.2017.8108526)

[img]
Preview
Text
150048.pdf - Accepted Version

326kB

Abstract

This paper proposes to exploit the so-called reciprocity parameters (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a measurement of reciprocity parameters of channel occupier (Alice, or, the intruder Eve). Then, with ground truth and current measurement both in hand, Bob carries out the hypothesis testing to automatically accept (reject) the packets sent by Alice (Eve). For the proposed scheme, we provide its success rate (the detection probability of Eve), and its performance comparison with other schemes.

Item Type:Conference Proceedings
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Abbasi, Professor Qammer
Authors: Rahman, M. M. U., Yasmeen, A., and Abbasi, Q. H.
College/School:College of Science and Engineering > School of Engineering > Electronics and Nanoscale Engineering
ISBN:9781509059324
Copyright Holders:Copyright © 2017 IEEE
Publisher Policy:Reproduced in accordance with the copyright policy of the publisher

University Staff: Request a correction | Enlighten Editors: Update this record