期刊文献+

基于无线信道特征的跨层认证机制 被引量:3

Cross-Layer Authentication Scheme Based on Wireless Channel Characteristic
下载PDF
导出
摘要 针对现有无线网络认证面临的中间人攻击问题,提出一种基于无线信道特征的跨层认证机制。通过在高层认证流程中增加对无线信道的检测,防止用户在初次接入过程中遭受中间人攻击。利用信道的互易性,用户侧和网络侧分别提取无线信道特征作为物理层认证参数并嵌入高层认证流程中,生成具有身份和信道双重信息的认证响应。如果认证过程中出现中间人攻击,双方会提取出不同的物理层认证参数,进而产生不同的认证响应,导致认证失败。认证服务器根据无线信道条件设置认证门限,增强机制的容错性。所提取的无线信道特征通过了NIST随机性测试,具有良好的随机性。仿真结果验证了认证效果,采用BPSK调制在0.5d B的信噪比条件下可实现99.8%以上的中间人检测率。 To deal with the threat of Man-in-the-Middle (MitM) attacks in authentication mechanisms of wireless network, we propose a cross-layer authentication scheme based on wireless channel characteristic during the first access. The channel characteristics at both the user and the base sta- tion are extracted based on the reciprocity of wireless channel to generate response containing dual information of identity and channel. If there exists a MitM, the user and base station will extract dif- ferent channel characteristics and further to generate different responses, leading to a failed authenti- cation. An authentication threshold is set according to the wireless channel condition, making the proposed scheme fault-tolerant. The channel characteristic extracted passes the NIST random test which proves its randomness. Security analysis shows that the proposed scheme can effectively pre-vent MitM attack, which can achieve a detection rate above 99.8% under the SNR of 12dB when BPSK is employed.
出处 《信息工程大学学报》 2017年第3期267-272,共6页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(61379006) 国家863计划资助项目(SS2015AA011306) 国家青年科学基金资助项目(61501516)
关键词 无线通信 认证 跨层 中间人 信道特征 wireless communication authentication cross-layer man-in-the-middle channel characteristic
  • 相关文献

参考文献1

二级参考文献29

  • 1王保仓,杨波,胡予濮.一种新的信息协调协议[J].西安电子科技大学学报,2006,33(3):486-490. 被引量:2
  • 2Diffie W,Heilman M.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 3Maurer U.Secret Key Agreement by Public Discussion from Common Information[J].IEEE Transactions on Information Theory,1993,39(3):733-742.
  • 4Wiesner S.Conjugate Coding [J].Sigact News,1983,15(1):78-88.
  • 5Balanis C A.Antenna Theory:Analysis and Design[M].2nd ed,New York:Wiley,1997.
  • 6Goldsmith A.Wireless Communications[M].Cambridge University Press,2005.
  • 7Shannon C E.Communication Theory of Secrecy Systems [J].Bell System Technical Journal,1949,28(4):656-715.
  • 8Wyner A D.The Wire-tap Channel[J].Bell System Technical Journal,1975,54(8):1355-1367.
  • 9Csiszar I,Komer J.Broadcast Channels with Confidential Messages[J].IEEE Transactions on Information Theory,1978,24(3):339-348.
  • 10Bennett C H,Brassard G,Crepeau C.GeneralizedPri-vacy Amplification[J].IEEE Transactions on Information Theory,1995,41(6):1915-1923.

同被引文献26

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部