A physical layer authentication scheme for countering primary user emulation attack

Kapil M. Borle, Biao Chen, Wenliang Du

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Abstract

This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.

Original languageEnglish (US)
Title of host publicationICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Pages2935-2939
Number of pages5
DOIs
StatePublished - Oct 18 2013
Event2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Vancouver, BC, Canada
Duration: May 26 2013May 31 2013

Other

Other2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013
CountryCanada
CityVancouver, BC
Period5/26/135/31/13

Fingerprint

Authentication
Cognitive radio
Degradation

Keywords

  • authentication
  • cognitive radio
  • physical layer
  • primary user emulation attack
  • security

ASJC Scopus subject areas

  • Signal Processing
  • Software
  • Electrical and Electronic Engineering

Cite this

Borle, K. M., Chen, B., & Du, W. (2013). A physical layer authentication scheme for countering primary user emulation attack. In ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings (pp. 2935-2939). [6638195] https://doi.org/10.1109/ICASSP.2013.6638195

A physical layer authentication scheme for countering primary user emulation attack. / Borle, Kapil M.; Chen, Biao; Du, Wenliang.

ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. 2013. p. 2935-2939 6638195.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Borle, KM, Chen, B & Du, W 2013, A physical layer authentication scheme for countering primary user emulation attack. in ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings., 6638195, pp. 2935-2939, 2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 5/26/13. https://doi.org/10.1109/ICASSP.2013.6638195
Borle KM, Chen B, Du W. A physical layer authentication scheme for countering primary user emulation attack. In ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. 2013. p. 2935-2939. 6638195 https://doi.org/10.1109/ICASSP.2013.6638195
Borle, Kapil M. ; Chen, Biao ; Du, Wenliang. / A physical layer authentication scheme for countering primary user emulation attack. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. 2013. pp. 2935-2939
@inproceedings{fefd29c303d14785b88e207870893a00,
title = "A physical layer authentication scheme for countering primary user emulation attack",
abstract = "This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.",
keywords = "authentication, cognitive radio, physical layer, primary user emulation attack, security",
author = "Borle, {Kapil M.} and Biao Chen and Wenliang Du",
year = "2013",
month = "10",
day = "18",
doi = "10.1109/ICASSP.2013.6638195",
language = "English (US)",
isbn = "9781479903566",
pages = "2935--2939",
booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings",

}

TY - GEN

T1 - A physical layer authentication scheme for countering primary user emulation attack

AU - Borle, Kapil M.

AU - Chen, Biao

AU - Du, Wenliang

PY - 2013/10/18

Y1 - 2013/10/18

N2 - This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.

AB - This paper develops a physical layer user authentication scheme for wireless systems. The approach can be used as an effective counter measure against the primary user emulation attack in cognitive radios. The developed scheme applies to general digital constellations and we establish its optimality in terms of error probability for user authentication. Trade-off analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved at the price of an almost negligible performance degradation for the primary user under realistic system settings.

KW - authentication

KW - cognitive radio

KW - physical layer

KW - primary user emulation attack

KW - security

UR - http://www.scopus.com/inward/record.url?scp=84890537838&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84890537838&partnerID=8YFLogxK

U2 - 10.1109/ICASSP.2013.6638195

DO - 10.1109/ICASSP.2013.6638195

M3 - Conference contribution

AN - SCOPUS:84890537838

SN - 9781479903566

SP - 2935

EP - 2939

BT - ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

ER -