Skip to main content
Log in

An area based physical layer authentication framework to detect spoofing attacks

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

In this paper, we propose an area-oriented authentication framework, which aims to provide a light-weight first authentication by reducing the complexity in acquiring and maintaining many different reference vectors as in the traditional one-by-one authentication framework. Under the proposed framework, we first derive the missing detection probability and the false alarm probability, respectively. Then we quantitatively evaluate the average risks that a spoofer is successfully detected or a legitimate user is falsely alarmed, at any position in a certain area. And correspondingly three kinds of areas are defined as the clear area where the spoofers prefer not to attack, the danger area where the spoofers have pretty high probabilities to attack successfully, and the warning area where the legitimate users are much likely to be falsely reported as attackers. These results depict the security situation distribution of a region, and provide useful insights for network operators to take proper following strategies. Finally, simulations are given to verify our analytical derivations and show the impacts of system parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Yilmaz M H, Arslan H. A survey: spoofing attacks in physical layer security. In: Proceedings of IEEE Local Computer Networks Conference Workshops, Clearwater Beach, 2015. 812–817

  2. Xiao L, Sheng G, Wan X, et al. Learning-based PHY-layer authentication for underwater sensor networks. IEEE Commun Lett, 2019, 23: 60–63

    Article  Google Scholar 

  3. Zeng K, Govindan K, Mohapatra P. Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun, 2010, 17: 56–62

    Article  Google Scholar 

  4. Aman M N, Chua K C, Sikdar B. Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J, 2017, 4: 1327–1340

    Article  Google Scholar 

  5. Namal S, Georgantas K, Gurtov A. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography. In: Proceedings of 2013 IEEE Wireless Communications and Networking Conference, Shanghai, 2013. 1830–1835

  6. Johansson N A, Wang Y P E, Eriksson E, et al. Radio access for ultra-reliable and low-latency 5G communications. In: Proceedings of 2015 IEEE International Conference on Communication Workshop (ICCW), London, 2015. 1184–1189

  7. Kamal M, Tariq M. Light-weight security and data provenance for multi-hop Internet of Things. IEEE Access, 2018, 6: 34439–34448

    Article  Google Scholar 

  8. Yang J, Ji X, Huang K, et al. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun, 2019, 13: 144–152

    Article  Google Scholar 

  9. Suzan S, Babak D B. A survey on lightweight cryptographic algorithms. In: Proceedings of TENCON 2018–2018 IEEE Region 10 Conference, Jeju, 2018. 1784–1789

  10. Challa S, Wazid M, Das A K, et al. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 2017, 5: 3028–3043

    Article  Google Scholar 

  11. Xiao L, Greenstein L, Mandayam N, et al. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans Wirel Commun, 2009, 8: 5948–5956

    Article  Google Scholar 

  12. Shi L, Li M, Yu S, et al. BANA: body area network authentication exploiting channel characteristics. IEEE J Sel Areas Commun, 2013, 31: 1803–1816

    Article  Google Scholar 

  13. Zhang K, Liang X, Lu R, et al. Sybil attacks and their defenses in the Internet of Things. IEEE Internet Things J, 2014, 1: 372–383

    Article  Google Scholar 

  14. Demirbas M, Song Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Buffalo-Niagara Falls, 2006. 564–570

  15. Wang X, Hao P, Hanzo L. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag, 2016, 54: 152–158

    Article  Google Scholar 

  16. Xiao L, Wan X, Han Z. PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun, 2018, 17: 1676–1687

    Article  Google Scholar 

  17. Mohamed M, Cheffena M. Received signal strength based gait authentication. IEEE Sens J, 2018, 18: 6727–6734

    Article  Google Scholar 

  18. Li J, Halder B, Stoica P, et al. Computationally efficient angle estimation for signals with known waveforms. IEEE Trans Signal Process, 1995, 43: 2154–2163

    Article  Google Scholar 

  19. Wang Y, Guan X, Cai Y. The impacts of mobility on performance of physical layer secret key based on angle of arrival. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing, Yangzhou, 2016. 1–5

  20. Abdelaziz A, Burton R, Koksal C E. Message authentication and secret key agreement in VANETs via angle of arrival. In: Proceedings of 2016 IEEE Vehicular Networking Conference, Columbus, 2016. 1–2

  21. Zanella A. Best practice in RSS measurements and ranging. IEEE Commun Surv Tut, 2016, 18: 2662–2686

    Article  Google Scholar 

  22. Zhao Y, Liu Y, Yu T, et al. FREDI: robust RSS-based ranging with multipath effect and radio interference. Comput Netw, 2018, 147: 49–63

    Article  Google Scholar 

  23. Zanella A, Bardella A. RSS-based ranging by multichannel RSS averaging. IEEE Wirel Commun Lett, 2014, 3: 10–13

    Article  Google Scholar 

  24. Stoyanova T, Kerasiotis F, Efstathiou K, et al. Modeling of the RSS uncertainty for RSS-based outdoor localization and tracking applications in wireless sensor networks. In: Proceedings of 2010 4th International Conference on Sensor Technologies and Applications, Venice, 2010. 45–50

  25. Achroufene A, Amirat Y, Chibani A. RSS-based indoor localization using belief function theory. IEEE Trans Automat Sci Eng, 2019, 16: 1163–1180

    Article  Google Scholar 

  26. Waadt A E, Wang S, Kocks C, et al. Positioning in multiband OFDM UWB utilizing received signal strength. In: Proceedings of Positioning Navigation and Communication, Dresden, 2010. 308–312

  27. Bhargava V, Sichitiu M L. Physical authentication through localization in wireless local area networks. In: Proceedings of IEEE Global Telecommunications Conference, St. Louis, 2005. 2658–2662

  28. Chen Y, Yang J, Trappe W, et al. Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans Veh Technol, 2010, 59: 2418–2434

    Article  Google Scholar 

  29. Yang J, Chen Y Y, Trappe W, et al. Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans Parallel Distrib Syst, 2013, 24: 44–58

    Article  Google Scholar 

  30. Li N, Geng H, Xia S, et al. An area description framework for physical layer authentication. In: Proceedings of 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakech, 2019. 1–6

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61941114, 61601051), Beijing Municipal Science and Technology Project (Grant No. Z181100003218005), and the 111 Project of China (Grant No. B16006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Tao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, N., Xia, S., Tao, X. et al. An area based physical layer authentication framework to detect spoofing attacks. Sci. China Inf. Sci. 63, 222302 (2020). https://doi.org/10.1007/s11432-019-2802-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2802-x

Keywords

Navigation