An Improved Wireless Channel Authentication using Multi-Channel Safety Link Signature for Wireless Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-50 Number-2
Year of Publication : 2017
Authors : Prof. P.Gnanasekaran, B.Karthika
DOI :  10.14445/22312803/IJCTT-V50P113

MLA

Prof. P.Gnanasekaran, B.Karthika "An Improved Wireless Channel Authentication using Multi-Channel Safety Link Signature for Wireless Networks". International Journal of Computer Trends and Technology (IJCTT) V50(2):77-82, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The wireless channel authentication is important for many application areas. The secure authentication mechanisms in wireless networks in order to assistant a node to a secure channel communication is not an easy task due to the limitations of network channel congestion. In exiting wireless link signature techniques used in physical layer authentication mechanism, which uses the unique wireless channel characteristics between a sender and a receiver to provide authentication of wireless channels Wireless multi-channel safety link signature is a physical layer authentication mechanism, which uses the unique wireless channel.

References
[1] N. Patwari and S. K. Kasera, “Robust location distinction using temporal link signatures,” in Proc. of ACM MobiCom ?07, September 2007, pp. 111–122.
[2] J. Zhang, M. H. Firooz, N. Patwari, and S. K. Kasera, “Advancing wireless link signatures for location distinction,” in Proc. of ACM MobiCom ?08, September 2008, pp. 26–37.
[3] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Channel based detection of sybil attacks in wireless networks,” IEEE Trans. Information Forensics and Security, vol. 4, no. 3, pp. 492 – 503, 2009.
[4] Y. Liu and P. Ning, “Enhanced wireless channel authentication using time-synched link signature,” in Proc. of IEEE INFOCOM ?12, March 2012.
[5] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proc. of ACM WiSe ?06, September 2006, pp. 33–42
[6] Y. Liu, P. Ning, and H. Dai, “Authenticating primary users? signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” in Proc. of IEEE S&P ?10, May 2010, pp. 286–301.
[7] X. He, H. Dai, W. Shen, and P. Ning, “Is link signature dependable for wireless security?” in Proc. of IEEE INFOCOM ?13, April 2013.
[8] R. Safaya, “A multipath channel estimation algorithm using a kalman filter,” Thesis, University of Kansas, 2000.
[9] M. Biguesh and A. B. Gershman, “Training-based mimo channel estimation: A study of estimator tradeoffs and optimal training signals,” IEEE Trans. Signal Processing, vol. 54, no. 3, pp. 884–893, March 2006.
[10] M. Edman, A. Kiayias, and B. Yener, “On passive inference attacks against physical-layer key extraction,” in Proceedings of the Fourth European Workshop on System Security, 2011.
[11] Y. Liu and P. Ning, “Poster: Mimicry attacks against wireless link signature,” in Proc. of ACM CCS?11, 2011.
[12] J. Xiong and K. Jamieson, “Securearray: Improving wifi security with fine-grained physical-layer information,” in Proc. of ACM MobiCom ?13, 2013, pp. 441–452.
[13] Y. Liu and P. Ning. Mimicry attacks against wireless link signature and defense using time-synched link signature. Technical Report TR-2011- 17, NC State University, Computer Science Department, July 2011.
[14] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radiotelepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom ?08), 2008.
[15] B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ?07), pages 401–410, 2007.

Keywords
secure authentication mechanisms; Wireless link signature; safety link signature; multi-hop channel authentication.