Abstract:
This paper concerns the problem of defending against the jamming attack for the Physical-Layer Authentication (PLA). The problem is important due to the fact that jamming...Show MoreMetadata
Abstract:
This paper concerns the problem of defending against the jamming attack for the Physical-Layer Authentication (PLA). The problem is important due to the fact that jamming attacks can make the legitimate receiver reject a legitimate signal or accept an impersonating signal. In this paper, we propose two jamming detection schemes to defend against jamming attacks for the PLA. The first scheme is the Jamming-Attack Detection (JAD) scheme, which exploits the difference of noise variances between the handshaking and communication stages. The second scheme is the Composite Jamming-Attack Detection (CJAD) scheme, which exploits the difference of noise variances between Alice and Bob. Moreover, we provide the theoretical analysis of the proposed schemes over wireless fading channels and derive their closed-form expressions. We implement our schemes and conduct extensive performance comparisons. Our theoretical analysis and simulation results show that if security is the priority, the CJAD scheme is the best option. If we further consider the overhead, the JAD scheme is the best option under the strategy of jamming attacks and the CJAD scheme may be a better option under the strategy of enhanced jamming attacks, especially for the larger power of a jamming signal.
Published in: IEEE Transactions on Wireless Communications ( Volume: 22, Issue: 12, December 2023)