Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes
Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes
Conventional authentication mechanisms routinely used for validating communication devices are facing significant challenges. This is mainly due to their reliance on both ‘spoofable’ digital credentials and static binary characteristic, and inevitable misdetection in physical layer authentication using time-varying attributes, leading to the cascading risks of security and trust. To circumvent these impediments, we develop an adaptive trust management based soft authentication and progressive authorization scheme by intelligently exploiting the time-varying communication link-related attribute of the transmitter to improve wireless security. First of all, the trust relationship between the transmitter and receiver is established based on the evaluation of selected physical layer attribute for fast authentication and multiple-level authorization. Through the designed trust model, the transmitter is authorized by the specific level of services/resources corresponding to its trust level, so that soft security is achieved. To dynamically update the trust level of the transmitter, we propose an online conformal prediction based adaptive trust adjustment algorithm relying on the realtime validation of its attribute estimates at the receiver, thus resulting in progressive authorization. The performance of our scheme is theoretically analyzed in terms of its individual risk and individual satisfaction. Our simulation results demonstrate that the proposed scheme significantly improves the security performance and robustness in time-varying environments, and performs better than the static binary authentication scheme and existing physical layer authentication benchmarker.
authentication and authorization, online conformal prediction, Physical layer attributes, risk assessment, satisfaction evaluation, trust management
2607-2620
Fang, He
a3808cd6-bd8c-4a6c-b233-ca8649ec40a5
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
1 April 2020
Fang, He
a3808cd6-bd8c-4a6c-b233-ca8649ec40a5
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Fang, He, Wang, Xianbin and Hanzo, Lajos
(2020)
Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes.
IEEE Transactions on Communications, 68 (4), , [8955830].
(doi:10.1109/TCOMM.2020.2965451).
Abstract
Conventional authentication mechanisms routinely used for validating communication devices are facing significant challenges. This is mainly due to their reliance on both ‘spoofable’ digital credentials and static binary characteristic, and inevitable misdetection in physical layer authentication using time-varying attributes, leading to the cascading risks of security and trust. To circumvent these impediments, we develop an adaptive trust management based soft authentication and progressive authorization scheme by intelligently exploiting the time-varying communication link-related attribute of the transmitter to improve wireless security. First of all, the trust relationship between the transmitter and receiver is established based on the evaluation of selected physical layer attribute for fast authentication and multiple-level authorization. Through the designed trust model, the transmitter is authorized by the specific level of services/resources corresponding to its trust level, so that soft security is achieved. To dynamically update the trust level of the transmitter, we propose an online conformal prediction based adaptive trust adjustment algorithm relying on the realtime validation of its attribute estimates at the receiver, thus resulting in progressive authorization. The performance of our scheme is theoretically analyzed in terms of its individual risk and individual satisfaction. Our simulation results demonstrate that the proposed scheme significantly improves the security performance and robustness in time-varying environments, and performs better than the static binary authentication scheme and existing physical layer authentication benchmarker.
Text
TCOMpaper_twocolumn
- Accepted Manuscript
More information
Accepted/In Press date: 27 December 2019
e-pub ahead of print date: 10 January 2020
Published date: 1 April 2020
Additional Information:
Funding Information:
Manuscript received February 21, 2019; revised July 31, 2019 and November 29, 2019; accepted December 26, 2019. Date of publication January 10, 2020; date of current version April 16, 2020. The work of He Fang and Xianbin Wang was supported by the Canada Research Chair Program and the Natural Sciences and Engineering Research Council of Canada under the Discovery Grant RGPIN-2018-06254 and Collaborative Research and Development Grant CRDPJ 533987-18. The work of Lajos Hanzo was supported by the Engineering and Physical Sciences Research Council projects EP/Noo4558/1, EP/PO34284/1, COALESCE, by the Royal Society’s Global Challenges Research Fund Grant as well as by the European Research Council’s Advanced Fellow Grant QuantCom. The associate editor coordinating the review of this article and approving it for publication was Y.-W.-P. Hong. (Corresponding author: Lajos Hanzo.) He Fang and Xianbin Wang are with the Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada (e-mail: hfang42@uwo.ca; xianbin.wang@uwo.ca).
Copyright © 2020, IEEE
Keywords:
authentication and authorization, online conformal prediction, Physical layer attributes, risk assessment, satisfaction evaluation, trust management
Identifiers
Local EPrints ID: 436861
URI: http://eprints.soton.ac.uk/id/eprint/436861
ISSN: 0090-6778
PURE UUID: 46c37c58-cd6d-48c9-a250-a5415234893c
Catalogue record
Date deposited: 13 Jan 2020 17:30
Last modified: 18 Mar 2024 05:25
Export record
Altmetrics
Contributors
Author:
He Fang
Author:
Xianbin Wang
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics