Publication | Closed Access
Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing
102
Citations
103
References
2015
Year
Wireless CommunicationsEngineeringInformation SecurityVerificationInformation ForensicsFormal VerificationWireless SecurityInformation Theoretic SecuritySecure CommunicationPrivacy-preserving CommunicationInternet Of ThingsWireless MediumSecure ProtocolAuthentication ProtocolLightweight Authentication MechanismPhysical-layer ProcessingComputer EngineeringData PrivacyComputer ScienceWireless AuthenticationChannel UncertaintyData SecurityCryptography
The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be another node or device. These two attacks define the protection goals, namely, confidentiality and authenticity. Traditionally, both are solved by cryptographic approaches exploiting knowledge available in the surrounding infrastructure. The novel communication paradigms for the Internet of Things or cyber-physical systems do not scale with the standard cryptographic approach. Instead it is possible to exploit properties of the underlying physical channel to provide countermeasures against eavesdropping and impersonation attacks. Thereby, the random fading channel induces uncertainty which is detrimental but at the same time also helpful. In this paper, we review and describe a generalized model for physical-layer-based confidential data transmission and wireless authentication. A key role is played by the channel uncertainty and available design dimensions such as time, frequency, and space. We show that wireless authentication and secret-key generation can work in multicarrier and multiple-antenna systems and explain how even outdated channel state information can help to increase the available secure degrees of freedom. This survey focuses on the system design of wireless physical-layer confidentiality and authenticity under channel uncertainty. The insights could lead to a design of practical systems which are preparing the ground for confidentiality and authenticity already on the physical layer of the communication protocol stack.
| Year | Citations | |
|---|---|---|
Page 1
Page 1