Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication

Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies...

Full description

Bibliographic Details
Main Authors: Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Xiaoyan Hu, Jing Yang, Liang Jin
Format: Article
Language:English
Published: MDPI AG 2022-03-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/24/4/488
_version_ 1797434789626642432
author Shaoyu Wang
Kaizhi Huang
Xiaoming Xu
Xiaoyan Hu
Jing Yang
Liang Jin
author_facet Shaoyu Wang
Kaizhi Huang
Xiaoming Xu
Xiaoyan Hu
Jing Yang
Liang Jin
author_sort Shaoyu Wang
collection DOAJ
description Authentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>2</mn><mrow><mo>−</mo><mfrac><mn>1</mn><mn>2</mn></mfrac><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></msup></semantics></math></inline-formula>, where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></semantics></math></inline-formula> is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.
first_indexed 2024-03-09T10:37:41Z
format Article
id doaj.art-56cdba1759c8484b9f0ea8110e70847f
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T10:37:41Z
publishDate 2022-03-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-56cdba1759c8484b9f0ea8110e70847f2023-12-01T20:50:11ZengMDPI AGEntropy1099-43002022-03-0124448810.3390/e24040488Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless CommunicationShaoyu Wang0Kaizhi Huang1Xiaoming Xu2Xiaoyan Hu3Jing Yang4Liang Jin5Wireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaWireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaWireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaWireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaWireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaWireless Communication Technology Office, Information Engineering University, Zhengzhou 450002, ChinaAuthentication is a critical issue in wireless communication due to the impersonation and substitution attacks from the vulnerable air interface launched by the malicious node. There are currently two kinds of authentication research in wireless communication. One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. In this paper, we develop a wireless unconditional authentication framework based on one-time keys generated from wireless channel. The proposed unconditional authentication framework provides a new perspective to resist infinite computing power attackers. We study the performance of the unconditional authentication framework in this paper. First, a physical layer offered chain key (PHYLOCK) structure is proposed, which can provide one-time keys for unconditional authentication. The physical layer offered chain keys are generated by XORing the physical layer updated keys extracted from the current channel state information (CSI) and the previous chain keys. The security of PHYLOCK is analyzed from the perspective of information theory. Then, the boundary of the deception probability is conducted. It is shown that unconditional authentication can achieve a probability of deception <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>2</mn><mrow><mo>−</mo><mfrac><mn>1</mn><mn>2</mn></mfrac><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></msup></semantics></math></inline-formula>, where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>H</mi><mfenced open="(" close=")"><mi>k</mi></mfenced></mrow></semantics></math></inline-formula> is the entropy of the one-time key used for one message. Finally, the conditions for unconditional authentication are listed. Our analysis shows that the length of the key and the authentication code need to be twice the length of the message and the encoding rules of the authentication code need to satisfy the restrictions we listed.https://www.mdpi.com/1099-4300/24/4/488unconditional authenticationphysical layer key generationwireless communication
spellingShingle Shaoyu Wang
Kaizhi Huang
Xiaoming Xu
Xiaoyan Hu
Jing Yang
Liang Jin
Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
Entropy
unconditional authentication
physical layer key generation
wireless communication
title Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_full Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_fullStr Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_full_unstemmed Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_short Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
title_sort unconditional authentication based on physical layer offered chain key in wireless communication
topic unconditional authentication
physical layer key generation
wireless communication
url https://www.mdpi.com/1099-4300/24/4/488
work_keys_str_mv AT shaoyuwang unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT kaizhihuang unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT xiaomingxu unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT xiaoyanhu unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT jingyang unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication
AT liangjin unconditionalauthenticationbasedonphysicallayerofferedchainkeyinwirelesscommunication