Physical-layer authentication for wireless security enhancement: current challenges and future developments
Physical-layer authentication for wireless security enhancement: current challenges and future developments
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes the root of security vulnerabilities in wireless communications. In light of this, physical-layer authentication, which is based on exploitation of the dynamics of physical layer attributes, is emerging as an effective approach to enhancing wireless security. In this article, we first review the existing physical-layer authentication techniques and identify their current limitations, ranging from low authentication reliability to the difficulties of integrating these techniques with the existing wireless infrastructure and applying them in complex future networks. We then present three promising research areas in addressing these challenges. Specifically, we propose the use of the multi-attribute multi-observation technique for enhancing the authentication reliability. In order to apply point-to-point physical-layer authentication techniques into existing wireless networks, we propose a cross-layer authentication approach relying on a composite security key that can seamlessly integrate physical-layer and upper-layer authentication schemes. We also discuss possible ways of invoking physical-layer authentication to reduce both the complexity and latency of the security processes in complex heterogeneous networks with the aid of the proposed physical security context sharing.
152-158
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hao, Peng
642e7c6f-deeb-4643-ad6c-bd9706d9b37f
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
June 2016
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hao, Peng
642e7c6f-deeb-4643-ad6c-bd9706d9b37f
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Wang, Xianbin, Hao, Peng and Hanzo, Lajos
(2016)
Physical-layer authentication for wireless security enhancement: current challenges and future developments.
IEEE Communications Magazine, 54 (6), .
(doi:10.1109/MCOM.2016.7498103).
Abstract
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes the root of security vulnerabilities in wireless communications. In light of this, physical-layer authentication, which is based on exploitation of the dynamics of physical layer attributes, is emerging as an effective approach to enhancing wireless security. In this article, we first review the existing physical-layer authentication techniques and identify their current limitations, ranging from low authentication reliability to the difficulties of integrating these techniques with the existing wireless infrastructure and applying them in complex future networks. We then present three promising research areas in addressing these challenges. Specifically, we propose the use of the multi-attribute multi-observation technique for enhancing the authentication reliability. In order to apply point-to-point physical-layer authentication techniques into existing wireless networks, we propose a cross-layer authentication approach relying on a composite security key that can seamlessly integrate physical-layer and upper-layer authentication schemes. We also discuss possible ways of invoking physical-layer authentication to reduce both the complexity and latency of the security processes in complex heterogeneous networks with the aid of the proposed physical security context sharing.
Text
Commag-15-00436-Feb-2016.pdf
- Accepted Manuscript
Text
HANZO_LAYOUT_Rev.pdf
- Version of Record
Restricted to Repository staff only
Request a copy
More information
Accepted/In Press date: 22 March 2016
e-pub ahead of print date: 23 June 2016
Published date: June 2016
Identifiers
Local EPrints ID: 396321
URI: http://eprints.soton.ac.uk/id/eprint/396321
PURE UUID: d07cc999-acc9-455a-9b94-eca45277551d
Catalogue record
Date deposited: 08 Jun 2016 09:07
Last modified: 18 Mar 2024 02:35
Export record
Altmetrics
Contributors
Author:
Xianbin Wang
Author:
Peng Hao
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics