A physical layer authentication scheme for countering primary user emulation attack
- 1 May 2013
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 2935-2939
- https://doi.org/10.1109/icassp.2013.6638195
Abstract
This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.Keywords
This publication has 9 references indexed in Scilit:
- Cryptographic link signatures for spectrum usage authentication in cognitive radioPublished by Association for Computing Machinery (ACM) ,2011
- Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive RadioPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- In-band spectrum sensing in cognitive radio networksPublished by Association for Computing Machinery (ACM) ,2008
- Physical-Layer AuthenticationIEEE Transactions on Information Forensics and Security, 2008
- DVB Detector for Cognitive RadioPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Ensuring Trustworthy Spectrum Sensing in Cognitive Radio NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Fundamentals of Wireless CommunicationPublished by Cambridge University Press (CUP) ,2005
- Cognitive radio: making software radios more personalIEEE Wireless Communications, 1999
- Password authentication with insecure communicationCommunications of the ACM, 1981