咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >An area based physical layer a... 收藏

An area based physical layer authentication framework to detect spoofing attacks

An area based physical layer authentication framework to detect spoofing attacks

作     者:Na LI Shida XIA Xiaofeng TAO Zhiyuan ZHANG Xiaohui WANG Na LI;Shida XIA;Xiaofeng TAO;Zhiyuan ZHANG;Xiaohui WANG

作者机构:National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and Telecommunications 

出 版 物:《Science China(Information Sciences)》 (中国科学:信息科学(英文版))

年 卷 期:2020年第63卷第12期

页      面:197-210页

核心收录:

学科分类:0810[工学-信息与通信工程] 0808[工学-电气工程] 0839[工学-网络空间安全] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:supported by National Natural Science Foundation of China (Grant Nos. 61941114, 61601051) Beijing Municipal Science and Technology Project (Grant No. Z181100003218005) the 111 Project of China (Grant No. B16006) 

主  题:physical layer authentication light weight authentication security situation distribution spoofing area authentication 

摘      要:In this paper, we propose an area-oriented authentication framework, which aims to provide a light-weight first authentication by reducing the complexity in acquiring and maintaining many different reference vectors as in the traditional one-by-one authentication framework. Under the proposed framework,we first derive the missing detection probability and the false alarm probability, respectively. Then we quantitatively evaluate the average risks that a spoofer is successfully detected or a legitimate user is falsely alarmed, at any position in a certain area. And correspondingly three kinds of areas are defined as the clear area where the spoofers prefer not to attack, the danger area where the spoofers have pretty high probabilities to attack successfully, and the warning area where the legitimate users are much likely to be falsely reported as attackers. These results depict the security situation distribution of a region, and provide useful insights for network operators to take proper following strategies. Finally, simulations are given to verify our analytical derivations and show the impacts of system parameters.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分