DocumentCode
1484070
Title
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer
Author
Yu, Paul L. ; Sadler, Brian M.
Author_Institution
Army Res. Lab., Adelphi, MD, USA
Volume
6
Issue
3
fYear
2011
Firstpage
606
Lastpage
615
Abstract
We consider authentication of a wireless multiple-input-multiple-output (MIMO) system by deliberately introducing a stealthy fingerprint at the physical layer. The fingerprint is superimposed onto the data and uniquely conveys an authentication message as a function of the transmitted data and a shared secret key. A symbol synchronous approach to fingerprint embedding provides low complexity operation. In comparison with a conventional tag-based authentication approach, fingerprinting conveys much less information on the secret key to an eavesdropper. We study the trade-offs between stealth, security, and robustness, and show that very good operating points exist. We consider the cases when deterministic or statistical channel state information is available to the transmitter, and show how precoding and channel mode power allocation can be applied to both the data and the fingerprint in combination to enhance the authentication process.
Keywords
MIMO communication; message authentication; telecommunication security; MIMO authentication; authentication message; authentication process; channel mode power allocation; eavesdropper; fingerprint embedding; fingerprinting; shared secret key; statistical channel state information; stealthy fingerprint; tag-based authentication; wireless multiple-input-multiple-output system; Authentication; Channel estimation; Equations; MIMO; Receivers; Resource management; Transmitters; Authentication; fingerprinting; modulation; multiple-input–multiple-output (MIMO); superimposed signaling;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2011.2134850
Filename
5740593
Link To Document