kth.sePublications
Change search
Link to record
Permanent link

Direct link
Forssell, Karl HenrikORCID iD iconorcid.org/0000-0003-4961-5973
Publications (10 of 12) Show all publications
Forssell, K. H. & Thobaben, R. (2022). Worst-Case Detection Performance for Distributed SIMO Physical Layer Authentication. IEEE Transactions on Communications, 70(1), 485-499
Open this publication in new window or tab >>Worst-Case Detection Performance for Distributed SIMO Physical Layer Authentication
2022 (English)In: IEEE Transactions on Communications, ISSN 0090-6778, E-ISSN 1558-0857, Vol. 70, no 1, p. 485-499Article in journal (Refereed) Published
Abstract [en]

Feature-based physical layer authentication (PLA) schemes, using position-specific channel characteristics as identifying features, can provide lightweight protection against impersonation attacks in overhead-limited applications like e.g., mission-critical and low-latency scenarios. However, with PLA-aware attack strategies, an attacker can maximize the probability of successfully impersonating the legitimate devices. In this paper, we provide worst-case detection performance bounds under such strategies for a distributed PLA scheme that is based on the channel-state information (CSI) observed at multiple distributed remote radio-heads. This distributed setup exploits the multiple-channel diversity for enhanced detection performance and mimics distributed antenna architectures considered for 4G and 5G radio access networks. We consider (i) a power manipulation attack, in which a single-antenna attacker adopts optimal transmit power and phase; and (ii) an optimal spatial position attack. Interestingly, our results show that the attacker can achieve close-to-optimal success probability with only statistical CSI, which significantly strengthens the relevance of our results for practical scenarios. Furthermore, our results show that, by distributing antennas to multiple radio-heads, the worst-case missed detection probability can be reduced by 4 orders of magnitude without increasing the total number of antennas, illustrating the superiority of distributed PLA over a co-located antenna setup. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
distributed physical layer authentication, optimal attack strategies, Wireless physical layer security, 4G mobile communication systems, Antennas, Authentication, Channel capacity, Channel state information, Physical layer, Probability, Radio access networks, Channel characteristics, Detection performance, Distributed antennas, Impersonation attack, Lightweight protection, Missed detection probabilities, Orders of magnitude, Remote radio heads, 5G mobile communication systems
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:kth:diva-308862 (URN)10.1109/TCOMM.2021.3073002 (DOI)000742731500039 ()2-s2.0-85104253969 (Scopus ID)
Note

QC 20220216

Available from: 2022-02-16 Created: 2022-02-16 Last updated: 2022-06-25Bibliographically approved
Saritas, S., Forssell, K., Thobaben, R., Sandberg, H. & Dán, G. (2021). Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study. In: ICC 2021 - IEEE International Conference on Communications: . Paper presented at IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study
Show others...
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

5G and beyond 5G low power wireless networks make Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications capable of serving massive amounts of devices and machines. Due to the broadcast nature of wireless networks, it is crucial to secure the communication between these devices and machines from spoofing and interception attacks. This paper is concerned with the security of carrier frequency offset (CFO) based continuous physical layer authentication. The interaction between an attacker and a defender is modeled as a dynamic discrete leader-follower game with imperfect information. In the considered model, a legitimate user (Alice) communicates with the defender/operator (Bob) and is authorized by her CFO continuously. The attacker (Eve), by listening/eavesdropping the communication between Alice and Bob, tries to learn the CFO characteristics of Alice and aims to inject malicious packets to Bob by impersonating Alice. First, by showing that the optimal attacker strategy is a threshold policy, an optimization problem of the attacker with exponentially growing action space is reduced to a tractable integer optimization problem with a single parameter, then the corresponding defender cost is derived. Extensive simulations illustrate the characteristics of optimal strategies/utilities of the players depending on the actions, and show that the defender's optimal false positive rate causes attack success probabilities to be in the order of 0.99. The results show the importance of the parameters while finding the balance between system security and efficiency.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE International Conference on Communications, ISSN 1550-3607
Keywords
physical layer authentication, carrier frequency offset, continuous authentication, adversarial learning, threshold policy, binary hypothesis testing
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-306518 (URN)10.1109/ICC42927.2021.9500824 (DOI)000719386003084 ()2-s2.0-85115698633 (Scopus ID)
Conference
IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada
Note

QC 20211221

Part of proceeding: ISBN 978-172817122-7

Available from: 2021-12-21 Created: 2021-12-21 Last updated: 2022-06-25Bibliographically approved
Forssell, K. H., Thobaben, R. & Gross, J. (2021). Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks. In: ICC 2021 - IEEE International Conference on Communications: . Paper presented at IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

Physical layer authentication (PLA) has recently been discussed in the context of URLLC due to its low complexity and low overhead. Nevertheless, these schemes also introduce additional sources of error through missed detections and false alarms. The trade-offs of these characteristics are strongly dependent on the deployment scenario as well as the processing architecture. Thus, considering a feature-based PLA scheme utilizing channel-state information at multiple distributed radio-heads, we study these trade-offs analytically. We model and analyze different scenarios of centralized and decentralized decision-making and decoding, as well as the impacts of a single-antenna attacker launching a Sybil attack. Based on stochastic network calculus, we provide worst-case performance bounds on the system-level delay for the considered distributed scenarios under a Sybil attack. Results show that the arrival-rate capacity for a given latency deadline is increased for the distributed scenarios. For a clustered sensor deployment, we find that the distributed approach provides 23% higher capacity when compared to the centralized scenario.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE International Conference on Communications, ISSN 1550-3607
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-306519 (URN)10.1109/ICC42927.2021.9501002 (DOI)000719386004093 ()2-s2.0-85115718948 (Scopus ID)
Conference
IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada
Note

QC 20211221

Part of proceeding: ISBN 978-1-7281-7122-7

Available from: 2021-12-21 Created: 2021-12-21 Last updated: 2022-06-25Bibliographically approved
Forssell, K. H. & Thobaben, R. (2021). Worst-Case Detection Performance of Physical Layer Authentication Under Optimal MIMO Attacks. In: ICC 2021 - IEEE International Conference on Communications: . Paper presented at IEEE International Conference on Communications (ICC), Date of Conference: 14-23 June 2021, Conference Location: Montreal, QC, Canada. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Worst-Case Detection Performance of Physical Layer Authentication Under Optimal MIMO Attacks
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

This paper analyzes the worst-case detection performance of a feature-based physical layer authentication (PLA) scheme subject to optimal multiple-antenna impersonation attacks. The PLA scheme is based on the location-specific channel in the uplink towards a multiple-antenna receiver, and the attacker is using pre-coding with the objective of maximizing the missed detection probability. We solve the optimal attack strategy problem under perfect channel-state information (CSI) at the attacker, imperfect CSI at the attacker, and for a power constrained attacker. As a counter strategy, we propose to reserve a subset of silent receive antennas for reception only, in order to limit the CSI that an attacker can extract from overhearing downlink transmissions. We evaluate the performance under the attack- and counter-strategies, both analytically and for recorded real-world channel traces, and show that the worst-case performance is determined by the feature-energy outside the attacker's channel range and the attack-power constraints. Results indicate that an unconstrained attacker with favorable conditions can achieve a success probability close to 1; however, under more realistic channel constraints, detection performance guarantees in the order of 10(-6) - 10(-4) can be obtained. Moreover, we find that performance can be improved by 1-2 orders of magnitude through the proposed counter strategy.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE International Conference on Communications, ISSN 1550-3607
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-306517 (URN)10.1109/ICC42927.2021.9500742 (DOI)000719386003002 ()2-s2.0-85115676001 (Scopus ID)
Conference
IEEE International Conference on Communications (ICC), Date of Conference: 14-23 June 2021, Conference Location: Montreal, QC, Canada
Note

QC 20211220

Part of proceeding: ISBN 978-1-7281-7122-7

Available from: 2021-12-20 Created: 2021-12-20 Last updated: 2023-01-18Bibliographically approved
Mouris, B. A., Forssell, K. H. & Thobaben, R. (2020). A Novel Low-Complexity Power-Allocation Algorithm for Multi-Tone Signals for Wireless Power Transfer. In: IEEE Conference on Wireless Communications and Networking: . Paper presented at 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, South Korea, 25-28 May 2020. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Novel Low-Complexity Power-Allocation Algorithm for Multi-Tone Signals for Wireless Power Transfer
2020 (English)In: IEEE Conference on Wireless Communications and Networking, Institute of Electrical and Electronics Engineers (IEEE) , 2020, p. -6Conference paper, Published paper (Refereed)
Abstract [en]

Recent studies proved that optimized multi-tone signals can significantly enhance the performance of wireless power transfer (WPT) systems. However, optimizing the power allocation for multi-tone signals in order to maximize the efficiency of WPT is a computationally complex task. In this paper, a novel low-complexity algorithm, the truncated maximum-ratio transmission (TMRT) algorithm, for allocating power to multitone signals for WPT is proposed. The algorithm exploits the fact that optimal algorithms tend to allocate power to tones having the strongest channels and no power to weaker channels, and therefore, performs maximum ratio transmission power allocation on the subset of the m strongest channels. In this way, the power allocation problem is reduced to finding the optimal m that maximizes the efficiency. Simulation results confirm that the proposed TMRT algorithm achieves a performance very close to the optimal power allocation, despite its very low complexity, and significantly outperforms other low-complexity solutions.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-280453 (URN)10.1109/WCNC45663.2020.9120666 (DOI)000569342900211 ()2-s2.0-85087274238 (Scopus ID)
Conference
2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, South Korea, 25-28 May 2020
Note

QC 20200923

Available from: 2020-09-08 Created: 2020-09-08 Last updated: 2023-03-30Bibliographically approved
Forssell, K. H., Thobaben, R. & Gross, J. (2019). Performance Analysis of Distributed SIMO Physical Layer Authentication. In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC): . Paper presented at 2019 IEEE International Conference on Communications, ICC 2019; Shanghai International Convention Center, Shanghai; China; 20-24 May 2019. Institute of Electrical and Electronics Engineers (IEEE), Article ID 8761666.
Open this publication in new window or tab >>Performance Analysis of Distributed SIMO Physical Layer Authentication
2019 (English)In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Institute of Electrical and Electronics Engineers (IEEE), 2019, article id 8761666Conference paper, Published paper (Refereed)
Abstract [en]

This paper proposes a new approach for physical layer authentication where transmissions are authenticated based on the single-input/multiple-output channel-states observed at multiple distributed antenna-arrays. The receiver operating characteristics (ROC) are derived in terms of closed form expressions for the false alarm and missed detection probability in order to evaluate the effectiveness compared to single-array authentication. To this end, we study the worst-case missed detection probability based on the optimal attacker position. Finally, we apply our previously developed queueing analytical tools, based on stochastic network calculus, in order to assess the delay performance impacts of the physical layer authentication scheme in a mission-critical communication scenario. Our results show that the distributed approach significantly outperforms single-array authentication in terms of worst-case missed detection probability and that this can help mitigating the delay performance impacts of authentication false alarms.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2019
Series
IEEE International Conference on Communications, ISSN 1550-3607 ; 8761666
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-258169 (URN)10.1109/ICC.2019.8761666 (DOI)000492038803139 ()2-s2.0-85070211836 (Scopus ID)
Conference
2019 IEEE International Conference on Communications, ICC 2019; Shanghai International Convention Center, Shanghai; China; 20-24 May 2019
Projects
CERCES
Note

QC 20190910

Part of ISBN 9781538680889

Available from: 2019-09-10 Created: 2019-09-10 Last updated: 2024-10-22Bibliographically approved
Forssell, H., Thobaben, R., Al-Zubaidy, H. & Gross, J. (2019). Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis. IEEE Journal on Selected Areas in Communications, 37(4), 795-808
Open this publication in new window or tab >>Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis
2019 (English)In: IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, E-ISSN 1558-0008, Vol. 37, no 4, p. 795-808Article in journal (Refereed) Published
Abstract [en]

We study the detection and delay performance impacts of a feature-based physical layer authentication (PLA) protocol in mission-critical machine-type communication (MTC) networks. The PLA protocol uses generalized likelihood-ratio testing based on the line-of-sight (LOS), single-input multiple- output channel-state information in order to mitigate imper- sonation attempts from an adversary node. We study the de- tection performance, develop a queueing model that captures the delay impacts of erroneous decisions in the PLA (i.e., the false alarms and missed detections), and model three different adversary strategies: data injection, disassociation, and Sybil attacks. Our main contribution is the derivation of analytical delay performance bounds that allow us to quantify the delay introduced by PLA that potentially can degrade the performance in mission-critical MTC networks. For the delay analysis, we utilize tools from stochastic network calculus. Our results show that with a sufficient number of receive antennas (approx. 4-8) and sufficiently strong LOS components from legitimate devices, PLA is a viable option for securing mission-critical MTC systems, despite the low latency requirements associated to corresponding use cases. Furthermore, we find that PLA can be very effective in detecting the considered attacks, and in particular, it can significantly reduce the delay impacts of disassociation and Sybil attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2019
National Category
Communication Systems
Research subject
Telecommunication
Identifiers
urn:nbn:se:kth:diva-245235 (URN)10.1109/JSAC.2019.2899421 (DOI)000461853500008 ()2-s2.0-85061989373 (Scopus ID)
Projects
CERCES
Note

QC 20191120

Available from: 2019-03-07 Created: 2019-03-07 Last updated: 2024-03-15Bibliographically approved
Forssell, H., Thobaben, R., Al-Zubaidy, H. & Gross, J. (2017). On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance. In: Globecom 2017 - 2017 IEEE Global Communications Conference: . Paper presented at IEEE Global Communications Conference (GLOBECOM), DEC 04-08, 2017, Your, Singapore. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance
2017 (English)In: Globecom 2017 - 2017 IEEE Global Communications Conference, Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper, Published paper (Refereed)
Abstract [en]

Feature-based authentication schemes that verify wireless transmitter identities based on physical-layer features allow for fast and efficient authentication with minimal overhead. Hence, they are interesting to consider for safety-critical applications where low latency and high reliability is required. However, as erroneous authentication decisions will introduce delays, we propose to study the impact of feature-based schemes on the system-level performance. In this paper, we therefore study the queuing performance of a line-of-sight wireless link that employs a feature-based authentication scheme based on the complex channel gain. Using stochastic networks calculus, we provide bounds on the delay performance which are validated by numerical simulations. The results show that the delay and authentication performance is highly dependent on the SNR and Rice factor. However, under good channel conditions, a missed-detection rate of 10(-8) can be achieved without introducing excessive delays in the system.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Series
IEEE Global Communications Conference, ISSN 2334-0983
National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-226848 (URN)10.1109/GLOCOM.2017.8254003 (DOI)000428054300083 ()2-s2.0-85046437823 (Scopus ID)978-1-5090-5019-2 (ISBN)
Conference
IEEE Global Communications Conference (GLOBECOM), DEC 04-08, 2017, Your, Singapore
Projects
CERCES
Funder
Swedish Civil Contingencies Agency
Note

QC 20180507

Available from: 2018-05-07 Created: 2018-05-07 Last updated: 2024-03-15Bibliographically approved
Forssell, H., Thobaben, R., Gross, J. & Skoglund, M. (2016). Feature-Based Multi-User Authentication for Parallel Uplink Transmissions. In: 2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC): . Paper presented at 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), SEP 05-09, 2016, Brest, FRANCE (pp. 355-359). IEEE
Open this publication in new window or tab >>Feature-Based Multi-User Authentication for Parallel Uplink Transmissions
2016 (English)In: 2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC), IEEE, 2016, p. 355-359Conference paper, Published paper (Refereed)
Abstract [en]

We study a multi-user up-link scenario where an attacker tries to impersonate the legitimate transmitters. We present a new framework for deriving a posteriori attack probabilities from the channel observations at the access point, which enables fast intrusion detection and authentication at the physical layer and can be exploited to reduce the security overhead by offtoading higher-layer authentication schemes. This is highly relevant for delay-sensitive applications that are targeted in 5G where the security overhead may limit the real-time performance. We take a factor-graph approach that can easily be extended to take into account other features, channel models, and radio access schemes. While related works only consider single-link scenarios, the multi-user approach in this paper allows us to exploit the cross-channel correlation of the large-scale fading parameters that is due to the propagation environment for improving the detection performance. As numerical results show, especially for slowly changing channels with high correlation our approach provides significant performance gains.

Place, publisher, year, edition, pages
IEEE, 2016
Series
International Symposium on Turbo Codes and Iterative Information Processing, ISSN 2165-4700
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-197023 (URN)10.1109/ISTC.2016.7593136 (DOI)000386655300072 ()2-s2.0-84994415945 (Scopus ID)978-1-5090-3401-7 (ISBN)
Conference
9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), SEP 05-09, 2016, Brest, FRANCE
Projects
CERCES
Note

QC 20161209

Available from: 2016-12-09 Created: 2016-11-28 Last updated: 2024-03-15Bibliographically approved
Forssell, K. H., Thobaben, R. & Gross, J.Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks.
Open this publication in new window or tab >>Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Physical layer authentication (PLA) has recently been discussed in the context of URLLC due to its low complexity and low overhead. Nevertheless, these schemes also introduce additional sources of error through missed de- tections and false alarms. The trade-offs of these characteristics are strongly dependent on the deployment scenario as well as the processing architec- ture. Thus, considering a feature-based PLA scheme utilizing channel-state information at multiple distributed radio-heads, we study these trade-offs analytically. We model and analyze different scenarios of centralized and de- centralized decision-making and decoding, as well as the impacts of a single- antenna attacker launching a Sybil attack. Based on stochastic network cal- culus, we provide worst-case performance bounds on the system-level delay for the considered distributed scenarios under a Sybil attack. Results show that the arrival-rate capacity for a given latency deadline is increased for the distributed scenarios. For a clustered sensor deployment, we find that the distributed approach provides 23% higher capacity when compared to the centralized scenario.

National Category
Communication Systems
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-287164 (URN)
Projects
CERCES
Note

Under review for IEEE ICC, 2021, QC 20201208

Available from: 2020-12-03 Created: 2020-12-03 Last updated: 2022-06-25Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4961-5973

Search in DiVA

Show all publications