4.8 Article

Phase-Assisted Dynamic Tag-Embedding Message Authentication for IoT Networks

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 20, Pages 20620-20629

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3177157

Keywords

Authentication; Symbols; Internet of Things; Receivers; Security; Message authentication; Radio transmitters; Authentication; Internet of Things (IoT); message authentication; physical-layer security; tag-embedding authentication

Funding

  1. NATO Science for Peace and Security Programme [SPS G5797-PHYSEC]

Ask authors/readers for more resources

Security is a crucial concern for IoT networks, and researchers worldwide have been investigating this issue. Existing security mechanisms are not suitable for IoT networks due to their complexity and resource consumption. A tag-embedding message authentication scheme has been proposed for IoT networks, but it still needs improvement in terms of immunity against nearby eavesdroppers. This article introduces a novel scheme that enhances authentication rate and tag confidentiality without any additional requirements.
Security is a critical issue in Internet of Things (IoT) networks and it has been under investigation by researchers worldwide. Different from other wireless networks, IoT networks suffer from conventional security mechanisms due to complexity and resource consumption which cannot be tolerated in IoT networks. Among the recently proposed security schemes for IoT networks is the tag-embedding message authentication scheme in which a tag is embedded to the modulated message and concurrently sent over the same channel. Although it has avoided significant resource expenditure, its performance still requires improvement especially in terms of immunity against nearby eavesdroppers. In this article, a novel scheme is proposed that is able to enhance the authentication rate and the tag confidentiality without inducing any extra requirements. The proposed scheme implies performing tag puncturing at the transmitter side where only a part of the tag is embedded to the message based on the instantaneous channel phase. The performance of the proposed scheme is mathematically analyzed where the authentication failure probability is derived in closed-form expression, and compared to the conventional tag-embedding scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available