kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Worst-Case Detection Performance of Physical Layer Authentication Under Optimal MIMO Attacks
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0003-4961-5973
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0001-9307-484X
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

This paper analyzes the worst-case detection performance of a feature-based physical layer authentication (PLA) scheme subject to optimal multiple-antenna impersonation attacks. The PLA scheme is based on the location-specific channel in the uplink towards a multiple-antenna receiver, and the attacker is using pre-coding with the objective of maximizing the missed detection probability. We solve the optimal attack strategy problem under perfect channel-state information (CSI) at the attacker, imperfect CSI at the attacker, and for a power constrained attacker. As a counter strategy, we propose to reserve a subset of silent receive antennas for reception only, in order to limit the CSI that an attacker can extract from overhearing downlink transmissions. We evaluate the performance under the attack- and counter-strategies, both analytically and for recorded real-world channel traces, and show that the worst-case performance is determined by the feature-energy outside the attacker's channel range and the attack-power constraints. Results indicate that an unconstrained attacker with favorable conditions can achieve a success probability close to 1; however, under more realistic channel constraints, detection performance guarantees in the order of 10(-6) - 10(-4) can be obtained. Moreover, we find that performance can be improved by 1-2 orders of magnitude through the proposed counter strategy.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2021.
Series
IEEE International Conference on Communications, ISSN 1550-3607
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-306517DOI: 10.1109/ICC42927.2021.9500742ISI: 000719386003002Scopus ID: 2-s2.0-85115676001OAI: oai:DiVA.org:kth-306517DiVA, id: diva2:1621706
Conference
IEEE International Conference on Communications (ICC), Date of Conference: 14-23 June 2021, Conference Location: Montreal, QC, Canada
Note

QC 20211220

Part of proceeding: ISBN 978-1-7281-7122-7

Available from: 2021-12-20 Created: 2021-12-20 Last updated: 2023-01-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Forssell, Karl HenrikThobaben, Ragnar

Search in DiVA

By author/editor
Forssell, Karl HenrikThobaben, Ragnar
By organisation
Information Science and Engineering
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 28 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf