Skip to main content
Top

2018 | OriginalPaper | Chapter

Channel-Based Collaborative Authentication Scheme for Wireless Sensor Network

Authors : Guangming Han, Ting Jiang

Published in: Communications, Signal Processing, and Systems

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the broadcast nature of wireless communications, information security becomes a more challenging issue in contrast to traditional wired channels especially for capabilities limited wireless sensor networks. On the other hand, we can exploit the randomness of wireless channels to authenticate devices by comparing their channel properties. In this paper, we proposed a performance enhanced physical layer authentication scheme for wireless sensor networks by collaboration of multiple sink nodes. A binary hypothesis testing based authentication method is proposed to identify nodes by directly comparing the current and previous channel frequency responses to decide whether the transmitter is malicious node or the legitimate node. Besides, we collaboratively integrate the decisions of different sink nodes to improve the authentication performance. The simulation results show that our proposed collaborative authentication scheme improves detection performance greatly.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference P. Guo, J. Wang, J. Zhu Y. Cheng, Authentication mechanism on wireless sensor networks: a survey (2013) P. Guo, J. Wang, J. Zhu Y. Cheng, Authentication mechanism on wireless sensor networks: a survey (2013)
2.
go back to reference E. Jorswieck, S. Tomasin, A. Sezgin, Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing. Proc. IEEE 103, 1702–1724 (2015)CrossRef E. Jorswieck, S. Tomasin, A. Sezgin, Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing. Proc. IEEE 103, 1702–1724 (2015)CrossRef
3.
go back to reference M. Demirbas, S. Youngwhan, An RSSI-based scheme for sybil attack detection in wireless sensor networks, in International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM’06), pp. 5–570 (2006) M. Demirbas, S. Youngwhan, An RSSI-based scheme for sybil attack detection in wireless sensor networks, in International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM’06), pp. 5–570 (2006)
4.
go back to reference L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Fingerprints in the ether: using the physical layer for wireless authentication. IEEE Int. Conf. Commun. 4646–4651 (2007) L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Fingerprints in the ether: using the physical layer for wireless authentication. IEEE Int. Conf. Commun. 4646–4651 (2007)
5.
go back to reference L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensic Secur 4, 492–503 (2009)CrossRef L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensic Secur 4, 492–503 (2009)CrossRef
6.
go back to reference X. Wang, P. Hao, L. Hanzo, Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun. Mag. 54, 152–158 (2016)CrossRef X. Wang, P. Hao, L. Hanzo, Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun. Mag. 54, 152–158 (2016)CrossRef
7.
go back to reference P. Hao, X. Wang, A. Behnad, Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers. IEEE Int. Conf. Commun. (ICC) 939–944 (2014) P. Hao, X. Wang, A. Behnad, Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers. IEEE Int. Conf. Commun. (ICC) 939–944 (2014)
8.
go back to reference P. Pardesi, J. Grover, Improved multiple sink placement strategy in wireless sensor networks. Int. Conf. Futur. Trends Comput. Anal. Knowl. Manag. (ABLAZE) 418–424 (2015) P. Pardesi, J. Grover, Improved multiple sink placement strategy in wireless sensor networks. Int. Conf. Futur. Trends Comput. Anal. Knowl. Manag. (ABLAZE) 418–424 (2015)
9.
go back to reference D, Wu, G. Zhu, D. Zhao, L. Liu, Energy balancing in an OFDM-Based WSN, in IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1–5 (2011) D, Wu, G. Zhu, D. Zhao, L. Liu, Energy balancing in an OFDM-Based WSN, in IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1–5 (2011)
10.
go back to reference S. Rosati, G. Corazza, A. Vanelli-Coralli, OFDM channel estimation with optimal threshold-based selection of CIR samples. IEEE Glob. Telecommun. Conf. (2009) S. Rosati, G. Corazza, A. Vanelli-Coralli, OFDM channel estimation with optimal threshold-based selection of CIR samples. IEEE Glob. Telecommun. Conf. (2009)
11.
go back to reference F. He, H. Man, D. Kivanc, B. McNair, EPSON: enhanced physical security in OFDM networks. IEEE Int. Conf. Commun. 1–5 (2009) F. He, H. Man, D. Kivanc, B. McNair, EPSON: enhanced physical security in OFDM networks. IEEE Int. Conf. Commun. 1–5 (2009)
12.
go back to reference S. Kay, Fundamentals of Statistical Signal Processing (PTR Prentice-Hall, Englewood Cliffs, NJ, 1998) S. Kay, Fundamentals of Statistical Signal Processing (PTR Prentice-Hall, Englewood Cliffs, NJ, 1998)
13.
go back to reference F. Liu, X. Wang, S. Primak, A two dimensional quantization algorithm for CIR-based physical layer authentication. IEEE Int. Conf. Commun. (ICC) (2013) F. Liu, X. Wang, S. Primak, A two dimensional quantization algorithm for CIR-based physical layer authentication. IEEE Int. Conf. Commun. (ICC) (2013)
Metadata
Title
Channel-Based Collaborative Authentication Scheme for Wireless Sensor Network
Authors
Guangming Han
Ting Jiang
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3229-5_30