TY - GEN
T1 - REAM
T2 - 2010 IEEE Military Communications Conference, MILCOM 2010
AU - He, Fangming
AU - Wang, Wei
AU - Man, Hong
PY - 2010
Y1 - 2010
N2 - The broadcast nature of the wireless medium poses a serious challenge to the security of wireless communications and networks. Traditional computational security strategies always fail to prevent the eavesdropper from overhearing the communications. Recently, the unique characteristics of wireless channel fingerprints, e.g. randomness and reciprocity, have been successfully used to enhance the security of the wireless network. We expand our previous work on exploring particular physical parameters of fingerprints, and focus on a new scheme in which we use the RAKE receiver to differentiate users under low transmission power. RAKE receiver may capture and estimate fingerprints through poor autocorrelation of the spreading coding. As the fingerprint is incomputable and unpredictable, and may only be detected by the pair of transmitter and receiver, it may be fully utilized to design an efficient authentication method. Simulation results strongly verify the efficiency of our proposed method, especially in the case of low SNR.
AB - The broadcast nature of the wireless medium poses a serious challenge to the security of wireless communications and networks. Traditional computational security strategies always fail to prevent the eavesdropper from overhearing the communications. Recently, the unique characteristics of wireless channel fingerprints, e.g. randomness and reciprocity, have been successfully used to enhance the security of the wireless network. We expand our previous work on exploring particular physical parameters of fingerprints, and focus on a new scheme in which we use the RAKE receiver to differentiate users under low transmission power. RAKE receiver may capture and estimate fingerprints through poor autocorrelation of the spreading coding. As the fingerprint is incomputable and unpredictable, and may only be detected by the pair of transmitter and receiver, it may be fully utilized to design an efficient authentication method. Simulation results strongly verify the efficiency of our proposed method, especially in the case of low SNR.
UR - http://www.scopus.com/inward/record.url?scp=79951607531&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79951607531&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2010.5680394
DO - 10.1109/MILCOM.2010.5680394
M3 - Conference contribution
AN - SCOPUS:79951607531
SN - 9781424481804
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 2205
EP - 2210
BT - 2010 IEEE Military Communications Conference, MILCOM 2010
Y2 - 31 October 2010 through 3 November 2010
ER -