Font Size: a A A

Research On Access Authentication Technology Based On Channel Information In Wireless Network

Posted on:2018-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZhangFull Text:PDF
GTID:2348330512988017Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile Internet,micro-terminal equipment is widely used in cellular networks,sensor networks,Internet of Things and other resourceconstrained environments,which needs low power consumption and low cost security measures including encryption and decryption,physical authentication and malicious or failure node identification measures to meet the security requirements of the network.Due to the tight computing and storage resources,the micro-terminal equipment faces the problem of the inapplicability of the traditional security technology.It can not afford the classical cryptographic algorithm and the authentication algorithm based on the classical password which has higher computational complexity than the encryption algorithm.The future 5G communication has proposed intensive node applications,low latency and high security access needs.When the number of the nodes is huge,that each node has a unique public key certificate can not be satisfied,which hinders the application of the passwordbased authentication algorithms and protocols to the future 5G wireless communication terminals,sensor networks,Internet of Things and other resource-constrained application scenarios.Physical layer authentication takes the advantage of temporal and spatial uniqueness of the wireless channel information and performs the message identity authentication by comparing the similarity of the channel information between the continuous data frames.Physical layer authentication directly uses the demodulated signal to extracts the channel information without complex upper layer encryption and decryption operations,which has the advantages of speediness and efficiency and is very suitable for continuous realtime authentication between resource-limited wireless interconnection equipment.This thesis takes the physical layer authentication technology as the research object,and three aspects of the work is completed as follows:1.A physical layer authentication scheme based on channel information is proposed,which is combined with the upper layer authentication technology to form a cross-layer authentication scheme.The scheme selects the channel estimation algorithm based on the basis expansion model to detect the time-varying channel information and improve the success rate of the physical layer authentication under the time-varying channel.The simulation results also show that the detection performance of the physical layer authentication scheme based on channel information improves with the increase of the signal-to-noise ratio and when the Doppler frequency shift is high,the authentication performance is still good which indicates that this scheme is applicable to time-varying environments.2.In view of the security flaws of the authentication and key agreement protocols which are adopted in the current 3G / 4G system,this paper presents two schemes applying the lightweight physical layer authentication to the 5G system.Both of the two schemes require the upper authentication and key agreement protocol to authenticate the first data frame.In scheme one,subsequent data frames select physical layer authentication program to perform the integrity protection.Scheme two simultaneously adopts the upper layer authentication and the physical layer authentication in duplexing authentication.The two schemes meet the requirements of authentication in different scenarios.3.Physical layer authentication also can be applied to spoofing detection in the MIMO-OFDM system.To solve the problem that the detection threshold is difficult to be determined,this paper proposed a scheme of determining the detection threshold based on the ?-greedy strategy.Finally,an environment for spoofing detection is set up on the universal software radio peripheral platform to detect the effectiveness of the scheme using physical layer authentication for spoofing attacks detection in MIMO-OFDM system.
Keywords/Search Tags:physical layer authentication, authentication and key agreement, base extension model, channel estimation, spoofing detection
PDF Full Text Request
Related items