TY - JOUR
T1 - Asynchronous Tag-based Physical-Layer Authentication in Wireless Communications
AU - Tan, Haijun
AU - Xu, Yuntao
AU - Du, Jiewei
AU - Xie, Ning
AU - Li, Hongbin
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional tag-based PLA schemes often require strict synchronization between the tag and the source message before transmission, which may limit their practicality and effectiveness. To address this limitation, we propose an asynchronous tag-based PLA scheme, where the tag and the source message are transmitted asynchronously with an intentional time delay introduced at the transmitter. The proposed scheme enhances both compatibility and security without compromising robustness. We provide a theoretical analysis of the proposed scheme, and derive closed-form expressions to characterize its performance. Furthermore, theoretical comparisons with existing methods yield insightful conclusions regarding the advantages of the proposed approach. The scheme is implemented and extensively evaluated through simulations, where the theoretical results exhibit strong agreement with the simulation outcomes, thereby validating its effectiveness.
AB - Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional tag-based PLA schemes often require strict synchronization between the tag and the source message before transmission, which may limit their practicality and effectiveness. To address this limitation, we propose an asynchronous tag-based PLA scheme, where the tag and the source message are transmitted asynchronously with an intentional time delay introduced at the transmitter. The proposed scheme enhances both compatibility and security without compromising robustness. We provide a theoretical analysis of the proposed scheme, and derive closed-form expressions to characterize its performance. Furthermore, theoretical comparisons with existing methods yield insightful conclusions regarding the advantages of the proposed approach. The scheme is implemented and extensively evaluated through simulations, where the theoretical results exhibit strong agreement with the simulation outcomes, thereby validating its effectiveness.
KW - asynchronous
KW - closed form
KW - intentional timing delay
KW - Physical-layer authentication
KW - tag-based
UR - http://www.scopus.com/inward/record.url?scp=105004074769&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=105004074769&partnerID=8YFLogxK
U2 - 10.1109/TWC.2025.3563097
DO - 10.1109/TWC.2025.3563097
M3 - Article
AN - SCOPUS:105004074769
SN - 1536-1276
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
ER -