Sciweavers

Share
ICC
2007
IEEE

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

9 years 4 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, we describe a physical-layer algorithm that combines channel probing (M complex frequency response samples over a bandwidth W) with hypothesis testing to determine whether current and prior communication attempts are made by the same user (same channel response). In this way, legitimate users can be reliably authenticated and false users can be reliably detected. To evaluate the feasibility of our algorithm, we simulate spatially variable channel responses in real environments using the WiSE ray-tracing tool; and we analyze the ability of a receiver to discriminate between transmitters (users) based on their channel frequency responses in a given office environment....
Liang Xiao, Larry J. Greenstein, Narayan B. Manday
Added 02 Jun 2010
Updated 02 Jun 2010
Type Conference
Year 2007
Where ICC
Authors Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe
Comments (0)
books