Font Size: a A A

Research On Plysical Layer Security Authentication Technology In Mobile Communication

Posted on:2019-01-30Degree:DoctorType:Dissertation
Country:ChinaCandidate:H W SongFull Text:PDF
GTID:1368330566970875Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Authentication is an important component of wireless communication security.The purpose of authentication is to identify sender's identity and messages.The traditional authentication mechanism is implemented at the application level.The cryptographic algorithm is used to generate numerical results which are difficult to counterfeit by third party.With the emergence of new scenarios such as high speed,large connection and low delay in the future mobile communication network,new challenges to traditional information security technologies are put forward.Different from wired channel,wireless channel has diversity and time-varying characteristics.The channel characteristics of both sides of communication are reciprocal and unique.The physical layer security technology aims at mining the security potential at the signal level,and it is an endogenous safety mechanism.technology,As a new idea of implementing security authentication,physical layer authentication has attracted some researchers' interest.However,there are still the following deficiencies in the existing physical layer authentication research: 1)In the identity authentication mechanism,there is a lack of effective preventive measures against malicious relay attacks from man-in-the-middle.2)There is still lack of signalling authentication methods that are suitable for large connections and high reliable transmission.;and 3)There is still no idea and method of lightweight authentication of traffic data from the perspective of the right to use channels.In view of the above problems,this paper relies on the National 863 project " Research on Future Wireless Access Physical Layer and System Secure Communication Technology(SS2015AA011306)" and the National Natural Science Foundation project " Lightweight Physical Layer Key Generation based on Random Characteristics of Receiving Signal(61601514)".This paper launches special research on wireless physical layer security authentication technology.From the perspective of improving the security of authentication mechanism and reducing the computational complexity of authentication mechanism,this paper clarifies the mechanism of physical layer authentication's security superiority.The effective physical layer authentication method is proposed from three aspects: channel estimation,signal authentication and signal transmission path.It can be used as a security enhancement and lightweight authentication mechanism of existing authentication mechanisms.The innovation points of this paper are as follows:(1)In this paper,the mechanism of physical layer authentication's security superiority is analyzed,and the bounds of security performance are proved.The high correlation and privacy of channel information between legitimate parties are natural safety advantages.Based on the theory of the typical set and wire-tap channel model,the upper and lower bounds of the attack performance are theoretically analyzed by using the joint coding of the channel feature sequence and the message sequence.It is found that the upper and lower bounds tend to be consistent after the increase of codebook length.It provides theoretical basis for the physical layer authentication method proposed in this paper.(2)A method of security enhancement for identity authentication based on channel signature generation is proposed.The authentication mechanism of traditional mobile communication system is implemented between user equipment and network authentication entities.And the change of wireless transmission path is not concerned.An important threat is the parallel conversation attack of man in the middle,which has serious harm to decrypt and tamper with communication data.To solve this problem,the reciprocity channel feature is used to extract the physical layer key.And the position stamp is gernarated which is closely related to the location.The authentication & key agreement protocol in mobile communication system is improved.Security analysis shows that it can effectively prevent multiple authentication attacks.Finally,numerical analysis is made for the case of channel characteristic leakage and the rate of different key generation.(3)A message authentication method based on overlay tag signal is proposed.Traditional message authentication relies on the difficulty of deciphering cryptographic algorithm.It requires a large amount of computation and is hard to fully guarantee the authentication security.On the basis of not affecting the transmission of the communication signal,a tag signal is generated to make it certified by the pre-allocated key.It makes the tag signal easy to detect and is difficult to imitate.The tag signal need good self correlation and cross-correlation,and it should be generated quickly under very low computational complexity.The Gold sequence is used to expand the channel eigenvalues of the reciprocal to generate tag signals.And the covert transmission and identification of label signal is achieved after superimposed with communication signal.The simulation is carried out in a typical SNR environment.The results show that a very low bit error rate can be achieved.At the same time,it can achieve very low false alarm rate and false alarm rate.(4)A method of high-speed traffic data authentication based on private pilot sequence is proposed.Considering high real-time and high speed requirements of traffic data,there is no corresponding authentication mechanism in the existing mobile communication system.Starting from the right to use the wireless channel,the characteristics that wireless channel can be utilized and cannot be changed are studied.Strong coordination in channel estimation is used to authenticate channel users.By privacy pilot signal,hypothesis testing method is used to identify the sender.The process and method of generating and updating private pilot are put forward.Theoretical analysis of the security of high-speed data authentication is derived from the perspective of information theory.And the simulation verification is carried out in the typical environment.The results show that it can achieve good authentication performance.
Keywords/Search Tags:Authentication, Physical Layer Security, Secret Pilot, Tag Signal, Channel Reciprocity
PDF Full Text Request
Related items