Rahman, M. M. U., Yasmeen, A. and Abbasi, Q. H. (2017) Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer. In: IEEE 85th Vehicular Technology Conference: VTC2017-Spring, Sydney, Australia, 4-7 June 2017, ISBN 9781509059324 (doi: 10.1109/VTCSpring.2017.8108526)
|
Text
150048.pdf - Accepted Version 326kB |
Abstract
This paper proposes to exploit the so-called reciprocity parameters (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a measurement of reciprocity parameters of channel occupier (Alice, or, the intruder Eve). Then, with ground truth and current measurement both in hand, Bob carries out the hypothesis testing to automatically accept (reject) the packets sent by Alice (Eve). For the proposed scheme, we provide its success rate (the detection probability of Eve), and its performance comparison with other schemes.
Item Type: | Conference Proceedings |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Abbasi, Professor Qammer |
Authors: | Rahman, M. M. U., Yasmeen, A., and Abbasi, Q. H. |
College/School: | College of Science and Engineering > School of Engineering > Electronics and Nanoscale Engineering |
ISBN: | 9781509059324 |
Copyright Holders: | Copyright © 2017 IEEE |
Publisher Policy: | Reproduced in accordance with the copyright policy of the publisher |
University Staff: Request a correction | Enlighten Editors: Update this record