• DocumentCode
    266802
  • Title

    How did you get here? PHY-layer path signatures

  • Author

    Loch, Adrian ; Meier, Daniel ; Hollick, M.

  • Author_Institution
    Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
  • fYear
    2014
  • fDate
    19-19 June 2014
  • Firstpage
    1
  • Lastpage
    3
  • Abstract
    Physical layer techniques enable new security paradigms in wireless networks, such as node authentication based on channel characteristics. However, current approaches are often limited to one-hop scenarios. We investigate how the aforementioned authentication schemes can be extended to the multihop case. In particular, we design mechanisms to provide path signatures, which allow destination nodes to verify the path followed by packets in the network. This enables, for instance, detection of packets not being forwarded along the intended route directly at the physical layer and without the need for per-packet cryptographic schemes. We propose multiple approaches based on the accumulative effect of link CSI along multihop routes. We implement and evaluate them on a software-defined radio testbed. Our preliminary results show that we can successfully identify unauthorized nodes participating in the forwarding of packets up to a path length of six hops.
  • Keywords
    cryptography; radio links; telecommunication network routing; PHY-layer path signatures; link CSI; multihop routes; node authentication; software defined radio testbed; wireless networks; Authentication; Communication system security; MATLAB; Noise; Physical layer; Reliability; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a
  • Conference_Location
    Sydney, NSW
  • Type

    conf

  • DOI
    10.1109/WoWMoM.2014.6919019
  • Filename
    6919019