4.8 Article

Phase-Assisted Dynamic Tag-Embedding Message Authentication for IoT Networks

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 20, 页码 20620-20629

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3177157

关键词

Authentication; Symbols; Internet of Things; Receivers; Security; Message authentication; Radio transmitters; Authentication; Internet of Things (IoT); message authentication; physical-layer security; tag-embedding authentication

资金

  1. NATO Science for Peace and Security Programme [SPS G5797-PHYSEC]

向作者/读者索取更多资源

Security is a crucial concern for IoT networks, and researchers worldwide have been investigating this issue. Existing security mechanisms are not suitable for IoT networks due to their complexity and resource consumption. A tag-embedding message authentication scheme has been proposed for IoT networks, but it still needs improvement in terms of immunity against nearby eavesdroppers. This article introduces a novel scheme that enhances authentication rate and tag confidentiality without any additional requirements.
Security is a critical issue in Internet of Things (IoT) networks and it has been under investigation by researchers worldwide. Different from other wireless networks, IoT networks suffer from conventional security mechanisms due to complexity and resource consumption which cannot be tolerated in IoT networks. Among the recently proposed security schemes for IoT networks is the tag-embedding message authentication scheme in which a tag is embedded to the modulated message and concurrently sent over the same channel. Although it has avoided significant resource expenditure, its performance still requires improvement especially in terms of immunity against nearby eavesdroppers. In this article, a novel scheme is proposed that is able to enhance the authentication rate and the tag confidentiality without inducing any extra requirements. The proposed scheme implies performing tag puncturing at the transmitter side where only a part of the tag is embedded to the message based on the instantaneous channel phase. The performance of the proposed scheme is mathematically analyzed where the authentication failure probability is derived in closed-form expression, and compared to the conventional tag-embedding scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据