Comparison Between Asymmetric and Symmetric Channel-Based Authentication for MIMO Systems

Konferenz: WSA 2017 - 21th International ITG Workshop on Smart Antennas
15.03.2017 - 17.03.2017 in Berlin, Deutschland

Tagungsband: WSA 2017

Seiten: 5Sprache: EnglischTyp: PDF

Persönliche VDE-Mitglieder erhalten auf diesen Artikel 10% Rabatt

Autoren:
Tomasin, Stefano (Department of Information Engineering, University of Padova, Italy)

Inhalt:
Authentication is a key element of security, by which a receiver confirms the sender identity of a message. Typical approaches include either key-based authentication at the application layer or physical layer authentication (PLA), where a message is authentic if it appears to have gone through the legitimate channel. In both cases a source of randomness is needed, whereas for PLA the random nature of the communication channel is exploited. In this paper we compare the various approaches using in all cases the channel as a source of randomness. We consider a multiple-input multiple-output (MIMO) system with a finite number of antennas. Simple autoregressive (AR) models for its evolution as well as the relation of the legitimate and attacker channel. In this setting the attacker can either predict the key used for key-based authentication or forge the channel estimated at the receiver for PLA. The analysis includes both symmetric and asymmetric key-based authentication. We compare the schemes in terms of false alarm and missed detection probability and we outline best attack strategies.