Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information

Author:

Song Yubo12ORCID,Chen Bing123,Wu Tianqi12,Zheng Tianyu12,Chen Hongyuan12ORCID,Wang Junbo23

Affiliation:

1. Key Laboratory of Computer Network Technology of Jiangsu Province, School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China

2. Purple Mountain Laboratories, Nanjing 211189, China

3. School of Information Science and Engineering, Southeast University, Nanjing 211189, China

Abstract

Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing authentication technologies rely on complex cryptographic algorithms. However, they cannot be supported well on the devices with limited hardware resources. A fine-grained device authentication technology based on channel state information (CSI) provides a noncryptographic method, which uses the CSI fingerprints for authentication since CSI can uniquely identify the devices. But long-term authentication based on CSI fingerprints is a challenging work. First, the CSI fingerprints are environment-sensitive, which means that the local authenticator should be updated to adapt to the changing channel state. Second, the local authenticator trained with old CSI fingerprints is outdated when users reconnect to the network after being offline for a long time, thus, it needs to be retrained in the access phase with new fingerprints. To tackle these challenges, we propose a CSI-based enhancing Wi-Fi device authentication protocol and an authentication framework. The protocol helps to collect new CSI fingerprints for authenticator’s training in access phase and performs the fingerprints’ dispersion analysis for authentication. In the association phase, it provides packet-level authentication and updates the authenticator with valid CSI fingerprints. The authenticator consists of an ensemble of small-scale autoencoders, which has high enough time efficiency for packet-level authentication and authenticator’s update. Experiments show that the accuracy of the framework is up to 98.7%, and the authenticator updating method can help the framework maintains high accuracy.

Funder

Zhishan Youth Scholar Program of SEU, Nanjing, China

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Reference25 articles.

1. Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles

2. Mac spoofing attack detection based on physical layer characteristics in wireless networks;S. Liu

3. Mac-layer spoofing detection and prevention in IoT systems: randomized moving target approach;P. Madani

4. An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks

5. IoT device fingerprinting for relieving pressure in the access control;Y. Song

Cited by 26 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research on Quantum Encryption Information Security Protection Technology for Distribution Networks;2024 6th International Conference on Energy Systems and Electrical Power (ICESEP);2024-06-21

2. Intelligent Recognition and Classification of IoT Devices via Information Physics-Based Multi-Source Data Association;2024 5th International Conference on Computer Engineering and Application (ICCEA);2024-04-12

3. Privacy Protection of Electrical Data With Scene Differentiation Based on Generative Adversarial Networks;2023 3rd International Conference on Electronic Information Engineering and Computer Communication (EIECC);2023-12-22

4. Traceback of Attack Chains in an Intelligent Power Grid ATT&CK Framework Based on Multi-Labels;International Conference on Mathematics and Machine Learning;2023-11-24

5. Secure Access for Massive Devices in the Industrial Internet of Things (IIoT);2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC);2023-10-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3