Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis

In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paraly...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2019-02, Vol.14 (2), p.387-402
Hauptverfasser: Dongyang Xu, Pinyi Ren, Ritcey, James A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 402
container_issue 2
container_start_page 387
container_title IEEE transactions on information forensics and security
container_volume 14
creator Dongyang Xu
Pinyi Ren
Ritcey, James A.
description In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.
doi_str_mv 10.1109/TIFS.2018.2850334
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2117107119</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8395442</ieee_id><sourcerecordid>2117107119</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhCMEEqXwAIhLJK6keO382NyqlEKloiK1nCPjbFqXYBc7OfTKk5PQqpedkXZmtfqC4BbICICIx9VsuhxRAnxEeUIYi8-CASRJGqWEwvnJA7sMrrzfEhLHkPJB8DszJe6wG0ZhlG9QfWmzDnNb9lJZFy6mk7cw30hjsA5XTmrTb8Zts0HTaCUbbc1T-O5sY5Wtwwl6vTYP4RJV63Sz71wjP3X9b6Up-xMl2qoKx0bWe6_9dXBRydrjzVGHwcf0eZW_RvPFyywfzyPFEtFEWZaCIlzQknAiAFNexZQwKUoKhFEOMkvTjHOaQsYTIZmMOfJE8UQSojiwYXB_uLtz9qdF3xRb27ruCV9QgAxIBiC6FBxSylnvHVbFzulv6fYFkKJHXfSoix51cUTdde4OHY2IpzxnIoljyv4ADbp49A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2117107119</pqid></control><display><type>article</type><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</creator><creatorcontrib>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</creatorcontrib><description>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2850334</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Angle of arrival ; anti-attack ; Channel estimation ; channel training ; Closed form solutions ; Codes ; Coding ; Encoding ; Error analysis ; Estimation ; Exact solutions ; Frequency division multiplexing ; Impulse response ; independence-checking coding ; Jamming ; Linear arrays ; Mathematical analysis ; OFDM ; Optimization ; Orthogonal Frequency Division Multiplexing ; Physical-layer authentication ; Pilot training ; Pilots ; Protocols ; Security ; Spoofing ; Stability ; Stability analysis ; Subcarriers ; Tradeoffs ; Training ; Wireless communications</subject><ispartof>IEEE transactions on information forensics and security, 2019-02, Vol.14 (2), p.387-402</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</citedby><cites>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</cites><orcidid>0000-0002-6401-0545 ; 0000-0002-0147-3673</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8395442$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8395442$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dongyang Xu</creatorcontrib><creatorcontrib>Pinyi Ren</creatorcontrib><creatorcontrib>Ritcey, James A.</creatorcontrib><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</description><subject>Angle of arrival</subject><subject>anti-attack</subject><subject>Channel estimation</subject><subject>channel training</subject><subject>Closed form solutions</subject><subject>Codes</subject><subject>Coding</subject><subject>Encoding</subject><subject>Error analysis</subject><subject>Estimation</subject><subject>Exact solutions</subject><subject>Frequency division multiplexing</subject><subject>Impulse response</subject><subject>independence-checking coding</subject><subject>Jamming</subject><subject>Linear arrays</subject><subject>Mathematical analysis</subject><subject>OFDM</subject><subject>Optimization</subject><subject>Orthogonal Frequency Division Multiplexing</subject><subject>Physical-layer authentication</subject><subject>Pilot training</subject><subject>Pilots</subject><subject>Protocols</subject><subject>Security</subject><subject>Spoofing</subject><subject>Stability</subject><subject>Stability analysis</subject><subject>Subcarriers</subject><subject>Tradeoffs</subject><subject>Training</subject><subject>Wireless communications</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhCMEEqXwAIhLJK6keO382NyqlEKloiK1nCPjbFqXYBc7OfTKk5PQqpedkXZmtfqC4BbICICIx9VsuhxRAnxEeUIYi8-CASRJGqWEwvnJA7sMrrzfEhLHkPJB8DszJe6wG0ZhlG9QfWmzDnNb9lJZFy6mk7cw30hjsA5XTmrTb8Zts0HTaCUbbc1T-O5sY5Wtwwl6vTYP4RJV63Sz71wjP3X9b6Up-xMl2qoKx0bWe6_9dXBRydrjzVGHwcf0eZW_RvPFyywfzyPFEtFEWZaCIlzQknAiAFNexZQwKUoKhFEOMkvTjHOaQsYTIZmMOfJE8UQSojiwYXB_uLtz9qdF3xRb27ruCV9QgAxIBiC6FBxSylnvHVbFzulv6fYFkKJHXfSoix51cUTdde4OHY2IpzxnIoljyv4ADbp49A</recordid><startdate>20190201</startdate><enddate>20190201</enddate><creator>Dongyang Xu</creator><creator>Pinyi Ren</creator><creator>Ritcey, James A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6401-0545</orcidid><orcidid>https://orcid.org/0000-0002-0147-3673</orcidid></search><sort><creationdate>20190201</creationdate><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><author>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Angle of arrival</topic><topic>anti-attack</topic><topic>Channel estimation</topic><topic>channel training</topic><topic>Closed form solutions</topic><topic>Codes</topic><topic>Coding</topic><topic>Encoding</topic><topic>Error analysis</topic><topic>Estimation</topic><topic>Exact solutions</topic><topic>Frequency division multiplexing</topic><topic>Impulse response</topic><topic>independence-checking coding</topic><topic>Jamming</topic><topic>Linear arrays</topic><topic>Mathematical analysis</topic><topic>OFDM</topic><topic>Optimization</topic><topic>Orthogonal Frequency Division Multiplexing</topic><topic>Physical-layer authentication</topic><topic>Pilot training</topic><topic>Pilots</topic><topic>Protocols</topic><topic>Security</topic><topic>Spoofing</topic><topic>Stability</topic><topic>Stability analysis</topic><topic>Subcarriers</topic><topic>Tradeoffs</topic><topic>Training</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dongyang Xu</creatorcontrib><creatorcontrib>Pinyi Ren</creatorcontrib><creatorcontrib>Ritcey, James A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dongyang Xu</au><au>Pinyi Ren</au><au>Ritcey, James A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-02-01</date><risdate>2019</risdate><volume>14</volume><issue>2</issue><spage>387</spage><epage>402</epage><pages>387-402</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2018.2850334</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-6401-0545</orcidid><orcidid>https://orcid.org/0000-0002-0147-3673</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2019-02, Vol.14 (2), p.387-402
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_2117107119
source IEEE Electronic Library (IEL)
subjects Angle of arrival
anti-attack
Channel estimation
channel training
Closed form solutions
Codes
Coding
Encoding
Error analysis
Estimation
Exact solutions
Frequency division multiplexing
Impulse response
independence-checking coding
Jamming
Linear arrays
Mathematical analysis
OFDM
Optimization
Orthogonal Frequency Division Multiplexing
Physical-layer authentication
Pilot training
Pilots
Protocols
Security
Spoofing
Stability
Stability analysis
Subcarriers
Tradeoffs
Training
Wireless communications
title Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T13%3A42%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Independence-Checking%20Coding%20for%20OFDM%20Channel%20Training%20Authentication:%20Protocol%20Design,%20Security,%20Stability,%20and%20Tradeoff%20Analysis&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Dongyang%20Xu&rft.date=2019-02-01&rft.volume=14&rft.issue=2&rft.spage=387&rft.epage=402&rft.pages=387-402&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2850334&rft_dat=%3Cproquest_RIE%3E2117107119%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2117107119&rft_id=info:pmid/&rft_ieee_id=8395442&rfr_iscdi=true