Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1998412.1998429acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Short paper: ACE: authenticating the channel estimation process in wireless communication systems

Published:14 June 2011Publication History

ABSTRACT

Accurate channel estimation is essential to modern wireless communication. Pilot waveforms are susceptible to attacks that can severely degrade performance. Thus, it is important to protect channel estimation. Related research focuses on transmitter authentication rather than channel estimate authentication, and results rely heavily upon correlated estimates that occur within the channel coherence time in multipath-rich environments and/or sacrifice system throughput. We propose a methodology to authenticate channel estimation by leveraging physical layer properties of the wireless channel without any coherence time dependence or overhead. Our methods inherently provide data authentication, work in any environment, and provide error inference. We focus on general multi-antenna, multicarrier communication schemes and relate our results to existing protocols such as 802.11g/n and WiMAX.

References

  1. T. Clancy and N. Goergen, Security in Cognitive Radio Networks: Threats and Mitigation, Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom) (2008).Google ScholarGoogle ScholarCross RefCross Ref
  2. N. Goergen, W.S. Lin, K.J.R. Liu, and T.C. Clancy, Authenticating MIMO Transmissions Using Channel-Like Fingerprinting, IEEE Global Communications Conference (GLOBECOM) (2010).Google ScholarGoogle ScholarCross RefCross Ref
  3. M. Hsieh and C. Wei, Channel Estimation for OFDM Systems Based on Comb-Type Pilot Arrangement in Frequency Selective Fading Channels, IEEE Transactions on Consumer Electronics (1998), 217--225. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Miller and W. Trappe, Subverting MIMO wireless systems by jamming the channel estimation procedure, Proceedings of the third ACM conference on Wireless network security (2010), 19--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T.S. Rappaport, Wireless Communications: Principles and practice, Prentice Hall, Upper Saddle River, NJ, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S.Y. Seidel, T.S. Rappaport, S. Jain, M.L. Lord, and R. Singh, Path Loss, Scattering, and Multipath Delay Statistics in Four European Cities for Digital Cellular and Microcellular Radiotelephone, IEEE Transactions on Vehicular Technology 40 (1991), no. 4, 721--730.Google ScholarGoogle ScholarCross RefCross Ref
  7. R. Tesi, M. Hamalainen, and J. Iinatti, Channel Estimation Algorithms Comparison for Multiband-OFDM, The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2006).Google ScholarGoogle ScholarCross RefCross Ref
  8. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, MIMO-Assisted Channel-Based Authentication in Wireless Networks, IEEE Conf. on Information Sciences and Systems (CISS) (2008), 642--646.Google ScholarGoogle ScholarCross RefCross Ref
  9. L. Xiao, L.J. Greenstein, N. Mandayam, and W. Trappe, Using the Physical Layer for Wireless Authentication in Time-Variant Channels, IEEE Transactions on Wireless Communications (2008), 2571--2579. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, A Physical-Layer Technique to Enhance Authentication for Mobile Terminals, IEEE International Conference on Communications (ICC) (2008), 1520--1524.Google ScholarGoogle ScholarCross RefCross Ref
  11. P. Yu, J. Baras, and B. Sadler, An Implementation of Physical Layer Authentication Using Software Radios, Report No. ARL-TR-4888 (2009).Google ScholarGoogle Scholar
  1. Short paper: ACE: authenticating the channel estimation process in wireless communication systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '11: Proceedings of the fourth ACM conference on Wireless network security
        June 2011
        186 pages
        ISBN:9781450306928
        DOI:10.1145/1998412

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader