2 research outputs found

    Distributed SIMO Physical Layer Authentication: Performance Bounds Under Optimal Attacker Strategies

    Full text link
    We provide worst-case bounds for the detection performance of a physical layer authentication scheme where authentication is based on channel-state information (CSI) observed at multiple distributed remote radio-heads (RRHs). The bounds are established based on two physical-layer attack strategies that a sophisticated attacker can launch against a given deployment. First, we consider a power manipulation attack, in which a single-antenna attacker adopts optimal transmit power and phase, and derive an approximation for the missed detection probability that is applicable for both statistical and perfect CSI knowledge at the attacker. Secondly, we characterize the spatial attack position that maximizes the attacker's success probability under strong line-of-sight conditions. We use this to provide a heuristic truncated search algorithm that efficiently finds the optimal attack position, and hence, constitutes a powerful tool for planning, analyzing, and optimizing deployments. Interestingly, our results show that there is only a small gap between the detection performance under a power manipulation attack based on statistical respectively perfect CSI knowledge, which significantly strengthens the relevance and applicability of our results in real-world scenarios. Furthermore, our results illustrate the benefits of the distributed approach by showing that the worst-case bounds can be reduced by 4 orders of magnitude without increasing the total number of antennas.Comment: Submitted to IEEE Transactions on Wireless Communication

    Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis

    Full text link
    We study the detection and delay performance impacts of a feature-based physical layer authentication (PLA) protocol in mission-critical machine-type communication (MTC) networks. The PLA protocol uses generalized likelihood-ratio testing based on the line-of-sight (LOS), single-input multiple-output channel-state information in order to mitigate impersonation attempts from an adversary node. We study the detection performance, develop a queueing model that captures the delay impacts of erroneous decisions in the PLA (i.e., the false alarms and missed detections), and model three different adversary strategies: data injection, disassociation, and Sybil attacks. Our main contribution is the derivation of analytical delay performance bounds that allow us to quantify the delay introduced by PLA that potentially can degrade the performance in mission-critical MTC networks. For the delay analysis, we utilize tools from stochastic network calculus. Our results show that with a sufficient number of receive antennas (approx. 4-8) and sufficiently strong LOS components from legitimate devices, PLA is a viable option for securing mission-critical MTC systems, despite the low latency requirements associated to corresponding use cases. Furthermore, we find that PLA can be very effective in detecting the considered attacks, and in particular, it can significantly reduce the delay impacts of disassociation and Sybil attacks
    corecore