Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paraly...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2019-02, Vol.14 (2), p.387-402 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 402 |
---|---|
container_issue | 2 |
container_start_page | 387 |
container_title | IEEE transactions on information forensics and security |
container_volume | 14 |
creator | Dongyang Xu Pinyi Ren Ritcey, James A. |
description | In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol. |
doi_str_mv | 10.1109/TIFS.2018.2850334 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2117107119</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8395442</ieee_id><sourcerecordid>2117107119</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhCMEEqXwAIhLJK6keO382NyqlEKloiK1nCPjbFqXYBc7OfTKk5PQqpedkXZmtfqC4BbICICIx9VsuhxRAnxEeUIYi8-CASRJGqWEwvnJA7sMrrzfEhLHkPJB8DszJe6wG0ZhlG9QfWmzDnNb9lJZFy6mk7cw30hjsA5XTmrTb8Zts0HTaCUbbc1T-O5sY5Wtwwl6vTYP4RJV63Sz71wjP3X9b6Up-xMl2qoKx0bWe6_9dXBRydrjzVGHwcf0eZW_RvPFyywfzyPFEtFEWZaCIlzQknAiAFNexZQwKUoKhFEOMkvTjHOaQsYTIZmMOfJE8UQSojiwYXB_uLtz9qdF3xRb27ruCV9QgAxIBiC6FBxSylnvHVbFzulv6fYFkKJHXfSoix51cUTdde4OHY2IpzxnIoljyv4ADbp49A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2117107119</pqid></control><display><type>article</type><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</creator><creatorcontrib>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</creatorcontrib><description>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2018.2850334</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Angle of arrival ; anti-attack ; Channel estimation ; channel training ; Closed form solutions ; Codes ; Coding ; Encoding ; Error analysis ; Estimation ; Exact solutions ; Frequency division multiplexing ; Impulse response ; independence-checking coding ; Jamming ; Linear arrays ; Mathematical analysis ; OFDM ; Optimization ; Orthogonal Frequency Division Multiplexing ; Physical-layer authentication ; Pilot training ; Pilots ; Protocols ; Security ; Spoofing ; Stability ; Stability analysis ; Subcarriers ; Tradeoffs ; Training ; Wireless communications</subject><ispartof>IEEE transactions on information forensics and security, 2019-02, Vol.14 (2), p.387-402</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</citedby><cites>FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</cites><orcidid>0000-0002-6401-0545 ; 0000-0002-0147-3673</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8395442$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8395442$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dongyang Xu</creatorcontrib><creatorcontrib>Pinyi Ren</creatorcontrib><creatorcontrib>Ritcey, James A.</creatorcontrib><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</description><subject>Angle of arrival</subject><subject>anti-attack</subject><subject>Channel estimation</subject><subject>channel training</subject><subject>Closed form solutions</subject><subject>Codes</subject><subject>Coding</subject><subject>Encoding</subject><subject>Error analysis</subject><subject>Estimation</subject><subject>Exact solutions</subject><subject>Frequency division multiplexing</subject><subject>Impulse response</subject><subject>independence-checking coding</subject><subject>Jamming</subject><subject>Linear arrays</subject><subject>Mathematical analysis</subject><subject>OFDM</subject><subject>Optimization</subject><subject>Orthogonal Frequency Division Multiplexing</subject><subject>Physical-layer authentication</subject><subject>Pilot training</subject><subject>Pilots</subject><subject>Protocols</subject><subject>Security</subject><subject>Spoofing</subject><subject>Stability</subject><subject>Stability analysis</subject><subject>Subcarriers</subject><subject>Tradeoffs</subject><subject>Training</subject><subject>Wireless communications</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1OwzAQhCMEEqXwAIhLJK6keO382NyqlEKloiK1nCPjbFqXYBc7OfTKk5PQqpedkXZmtfqC4BbICICIx9VsuhxRAnxEeUIYi8-CASRJGqWEwvnJA7sMrrzfEhLHkPJB8DszJe6wG0ZhlG9QfWmzDnNb9lJZFy6mk7cw30hjsA5XTmrTb8Zts0HTaCUbbc1T-O5sY5Wtwwl6vTYP4RJV63Sz71wjP3X9b6Up-xMl2qoKx0bWe6_9dXBRydrjzVGHwcf0eZW_RvPFyywfzyPFEtFEWZaCIlzQknAiAFNexZQwKUoKhFEOMkvTjHOaQsYTIZmMOfJE8UQSojiwYXB_uLtz9qdF3xRb27ruCV9QgAxIBiC6FBxSylnvHVbFzulv6fYFkKJHXfSoix51cUTdde4OHY2IpzxnIoljyv4ADbp49A</recordid><startdate>20190201</startdate><enddate>20190201</enddate><creator>Dongyang Xu</creator><creator>Pinyi Ren</creator><creator>Ritcey, James A.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6401-0545</orcidid><orcidid>https://orcid.org/0000-0002-0147-3673</orcidid></search><sort><creationdate>20190201</creationdate><title>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</title><author>Dongyang Xu ; Pinyi Ren ; Ritcey, James A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-7761c0892d08091e68f4203a9d2103281a7667882617859a3a48e85c85a00c813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Angle of arrival</topic><topic>anti-attack</topic><topic>Channel estimation</topic><topic>channel training</topic><topic>Closed form solutions</topic><topic>Codes</topic><topic>Coding</topic><topic>Encoding</topic><topic>Error analysis</topic><topic>Estimation</topic><topic>Exact solutions</topic><topic>Frequency division multiplexing</topic><topic>Impulse response</topic><topic>independence-checking coding</topic><topic>Jamming</topic><topic>Linear arrays</topic><topic>Mathematical analysis</topic><topic>OFDM</topic><topic>Optimization</topic><topic>Orthogonal Frequency Division Multiplexing</topic><topic>Physical-layer authentication</topic><topic>Pilot training</topic><topic>Pilots</topic><topic>Protocols</topic><topic>Security</topic><topic>Spoofing</topic><topic>Stability</topic><topic>Stability analysis</topic><topic>Subcarriers</topic><topic>Tradeoffs</topic><topic>Training</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dongyang Xu</creatorcontrib><creatorcontrib>Pinyi Ren</creatorcontrib><creatorcontrib>Ritcey, James A.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dongyang Xu</au><au>Pinyi Ren</au><au>Ritcey, James A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-02-01</date><risdate>2019</risdate><volume>14</volume><issue>2</issue><spage>387</spage><epage>402</epage><pages>387-402</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In wireless orthogonal frequency-division multiplexing communications systems, pilot tones, due to their publicly known and deterministic characteristic, suffer significant jamming/nulling/spoofing risks. Thus, the convectional channel training protocol using pilot tones could be attacked and paralyzed, which raises the issue of anti-attack channel training authentication (CTA), i.e., verifying the claims of identities of pilot tones and channel estimation samples. In this paper, we consider one-ring scattering scenarios with large-scale uniform linear arrays (ULA) and develop an independence-checking coding (ICC) theory to build a secure and stable CTA protocol, namely, ICC-based CTA (ICC-CTA) protocol. In this protocol, the pilot tones are not only merely randomized and inserted into subcarriers but also encoded as diversified subcarrier activation patterns (SAPs) simultaneously. Those encoded SAPs, though camouflaged by malicious signals, can be identified and decoded into original pilots for high-accuracy channel impulse response (CIR) estimation. The CTA security is first characterized by the error probability of identifying legitimate CIR estimation samples. We prove that the identification error probability (IEP) is equal to zero under the continuously distributed mean angle of arrival (AoA) and also derive a closed-form expression of IEP under the discretely distributed case. The CTA instability is formulated as the function of probability of stably estimating CIR against all available diversified SAPs. A realistic tradeoff between the CTA security and instability under the discretely distributed AoA is identified and an optimally stable tradeoff problem is formulated, with the objective of optimizing the code rate to maximize security while maintaining maximum stability for ever. Solving this, we derive the closed-form expression of optimal code rate. Numerical results finally validate the resilience of proposed ICC-CTA protocol.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2018.2850334</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-6401-0545</orcidid><orcidid>https://orcid.org/0000-0002-0147-3673</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2019-02, Vol.14 (2), p.387-402 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_2117107119 |
source | IEEE Electronic Library (IEL) |
subjects | Angle of arrival anti-attack Channel estimation channel training Closed form solutions Codes Coding Encoding Error analysis Estimation Exact solutions Frequency division multiplexing Impulse response independence-checking coding Jamming Linear arrays Mathematical analysis OFDM Optimization Orthogonal Frequency Division Multiplexing Physical-layer authentication Pilot training Pilots Protocols Security Spoofing Stability Stability analysis Subcarriers Tradeoffs Training Wireless communications |
title | Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T13%3A42%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Independence-Checking%20Coding%20for%20OFDM%20Channel%20Training%20Authentication:%20Protocol%20Design,%20Security,%20Stability,%20and%20Tradeoff%20Analysis&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Dongyang%20Xu&rft.date=2019-02-01&rft.volume=14&rft.issue=2&rft.spage=387&rft.epage=402&rft.pages=387-402&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2018.2850334&rft_dat=%3Cproquest_RIE%3E2117107119%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2117107119&rft_id=info:pmid/&rft_ieee_id=8395442&rfr_iscdi=true |