| Literature DB >> 35270908 |
Ningbo Fan1, Jiahui Sang2, Yulin Heng2, Xia Lei2, Tao Tao2.
Abstract
Channel-based physical-layer authentication, which is capable of detecting spoofing attacks in dual-hop wireless networks with low cost and low complexity, attracted a great deal of attention from researchers. In this paper, we explore the likelihood ratio test (LRT) with cascade channel frequency response, which is optimal according to the Neyman-Pearson theorem. Since it is difficult to derive the theoretical threshold and the probability of detection for LRT, majority voting (MV) algorithm is employed as a trade-off between performance and practicality. We make decisions according to the temporal variations of channel frequency response in independent subcarriers separately, the results of which are used to achieve a hypothesis testing. Then, we analyze the theoretical false alarm rate (FAR) and miss detection rate (MDR) by quantifying the upper bound of their sum. Moreover, we develop the optimal power allocation strategy between the transmitter and the relay by minimizing the derived upper bound with the optimal decision threshold according to the relay-to-receiver channel gain. The proposed power allocation strategy takes advantage of the difference of noise power between the relay and the receiver to jointly adjust the transmit power, so as to improve the authentication performance on condition of fixed total power. Simulation results demonstrate that the proposed power allocation strategy outperforms the equal power allocation in terms of FAR and MDR.Entities:
Keywords: dual-hop wireless networks; false alarm rate; miss detection rate; optimal power allocation; physical-layer authentication
Mesh:
Year: 2022 PMID: 35270908 PMCID: PMC8914856 DOI: 10.3390/s22051759
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of several authentication schemes.
| Authentication based on time domain multipath channel characteristics | Authentication based on frequency domain multipath channel characteristics | Authentication based on signal watermarking | Authentication based on fingerprint identification | |
| Principle | Based on time domain impulse response | Based on frequency domain impulse response | Transmit secret security authentication code or label with message | Based on physical differences of analog equipment |
| Main defects | Limited by the number of multipaths and the ability to distinguish | Limited by Doppler changes | Low power efficiency; watermark has an impact on the main signal | Characteristics are random and weak; poor stability |
Figure 1System model: Alice communicates with Bob with aid of amplify and forward (AF) relay; Eve is a would-be intruder impersonating Alice.
System parameters.
| Carrier frequency | 2.4 GHz |
| Subcarrier interval | 15 kHz |
| Number of subcarriers | 128 |
| Relative speed | 200 km/h |
Channel parameters of extended vehicular A (EVA) model.
| Number of multipaths | 9 |
| Multipath time delay (ns) | (0 30 150 310 370 710 1090 1730 2510) |
| Multipath relative power (dB) | (0 −1.5 −1.4 −3.6 −0.6 −9.1 −7.0 −12.0 −16.9) |
Figure 2Likelihood ratio test (LRT) and majority voting algorithm comparison.
Figure 3Theoretical expression for false alarm rate (FAR) and miss detection rate (MDR) validation.
Figure 4Authentication performance at different thresholds.
Figure 5Authentication performance in different relay noise power.
Figure 6Performance comparison of two allocation schemes.
Figure 7Optimal threshold validation.