14,931 research outputs found
Authenticating Users Through Fine-Grained Channel Information
User authentication is the critical first step in detecting identity-based attacks and preventing subsequent malicious attacks. However, the increasingly dynamic mobile environments make it harder to always apply cryptographic-based methods for user authentication due to their infrastructural and key management overhead. Exploiting non-cryptographic based techniques grounded on physical layer properties to perform user authentication appears promising. In this work, the use of channel state information (CSI), which is available from off-the-shelf WiFi devices, to perform fine-grained user authentication is explored. Particularly, a user-authentication framework that can work with both stationary and mobile users is proposed. When the user is stationary, the proposed framework builds a user profile for user authentication that is resilient to the presence of a spoofer. The proposed machine learning based user-authentication techniques can distinguish between two users even when they possess similar signal fingerprints and detect the existence of a spoofer. When the user is mobile, it is proposed to detect the presence of a spoofer by examining the temporal correlation of CSI measurements. Both office building and apartment environments show that the proposed framework can filter out signal outliers and achieve higher authentication accuracy compared with existing approaches using received signal strength (RSS)
Providing Physical Layer Security for Mission Critical Machine Type Communication
The design of wireless systems for Mission Critical Machine Type
Communication (MC-MTC) is currently a hot research topic. Wireless systems are
considered to provide numerous advantages over wired systems in industrial
applications for example. However, due to the broadcast nature of the wireless
channel, such systems are prone to a wide range of cyber attacks. These range
from passive eavesdropping attacks to active attacks like data manipulation or
masquerade attacks. Therefore it is necessary to provide reliable and efficient
security mechanisms. One of the most important security issue in such a system
is to ensure integrity as well as authenticity of exchanged messages over the
air between communicating devices in order to prohibit active attacks. In the
present work, an approach on how to achieve this goal in MC-MTC systems based
on Physical Layer Security (PHYSEC), especially a new method based on keeping
track of channel variations, will be presented and a proof-of-concept
evaluation is given
- …