Skip to main content

Security Analysis of Authentication Overlaying Tag Signal

  • Conference paper
  • First Online:
  • 804 Accesses

Abstract

This paper presents a new method for authentication based on overlaying tag signal. The tag signal and communication signal are superimposed to form the signal “watermark”. From the point of view of signal transmission, the tag signal can achieve the dual “binding” of shared key and channel. Security analysis and simulation results indicate that it can achieve high authentication success rate and low failure rate. This method does not require complex cryptographic algorithms. So it can achieve security under the premise of reduce the computational amount in the communication process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, Z., Zhan, B., Yang, Y.: A survey of identification and authentication. Acta Electron. Sin. 27(1), 98–102 (1999)

    Google Scholar 

  2. Maurer, U.M.: Authentication theory and hypothesis testing. IEEE Trans. Inf. Theory 46(4), 1350–1356 (2000)

    Article  MathSciNet  Google Scholar 

  3. Yuan, H.: Research on key technologies of wireless network physical layer authentication based on radio frequency fingerprinting, Ph.D. dissertation. Southeast University (2011)

    Google Scholar 

  4. Paul, L.Y., Baras, J.S., Sadler, B.M.: Physical-layer authentication. IEEE Trans. Inf. Forensics Secur. 3(1), 38–51 (2008)

    Article  Google Scholar 

  5. Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Commun. 17(5), 56–62 (2010)

    Article  Google Scholar 

  6. Xiao, L., Greenstein, L.J., Mandayam, N.B., et al.: A physical-layer technique to enhance authentication for mobile terminals. In: Proceedings of IEEE International Conference on Communications, Beijing (2008)

    Google Scholar 

  7. Tugnait, J.K., Kim, H.: A channel-based hypothesis testing approach to enhance user authentication in wireless networks. In: Proceedings of Second International Conference on Communication Systems and Networks, Bangalore (2010)

    Google Scholar 

  8. Shukla, M.K., Trivedi, A., Pandey, O.J.: Physical layer authentication for mobile terminals over MIMO fading wiretap channels. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Mysore (2013)

    Google Scholar 

  9. Shan, D., Zeng, K., Xiang, W., et al.: PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks. IEEE J. Sel. Areas Commun. 31(9), 1817–1827 (2013)

    Article  Google Scholar 

  10. Du, X., Shan, D., Zeng, K., et al.: Physical layer challenge-response authentication in wireless networks with relay. In: Proceedings of IEEE International Conference on Computer Communications (2014)

    Google Scholar 

  11. Molière, R., Delaveau, F., Ngassa, C.L.K., et al.: Tag signals for early authentication and secret key generation in wireless public networks. In: Proceedings of European Conference on Networks and Communications, Paris (2015)

    Google Scholar 

  12. Liu, Z., Xu, J., Zhao, K.: Spectrum water printing technology based on spectrum signal. J. Hebei Univ. Sci. Technol. S1, 116–118 (2011)

    Google Scholar 

  13. Zhang, Y., Xu, J., Liu, Y., et al.: Spectrum tag embedding and extracting method based on correlation identifier. Chin. J. Radio Sci. 31(1), 185–192 (2016)

    Google Scholar 

  14. Jakes, W.C., Cox, D.C.: Microwave Mobile Communications. Wiley, Hoboken (1994)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Song Huawei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huawei, S., Jin, L., Zhang, S. (2018). Security Analysis of Authentication Overlaying Tag Signal. In: Li, C., Mao, S. (eds) Wireless Internet. WiCON 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 230. Springer, Cham. https://doi.org/10.1007/978-3-319-90802-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90802-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90801-4

  • Online ISBN: 978-3-319-90802-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics