Research Article
Security Analysis of Authentication Overlaying Tag Signal
151 downloads
@INPROCEEDINGS{10.1007/978-3-319-90802-1_15, author={Song Huawei and Liang Jin and Shengjun Zhang}, title={Security Analysis of Authentication Overlaying Tag Signal}, proceedings={Wireless Internet. 10th International Conference, WiCON 2017, Tianjin, China, December 16-17, 2017, Proceedings}, proceedings_a={WICON}, year={2018}, month={5}, keywords={Tag signal Authentication Physical layer security}, doi={10.1007/978-3-319-90802-1_15} }
- Song Huawei
Liang Jin
Shengjun Zhang
Year: 2018
Security Analysis of Authentication Overlaying Tag Signal
WICON
Springer
DOI: 10.1007/978-3-319-90802-1_15
Abstract
This paper presents a new method for authentication based on overlaying tag signal. The tag signal and communication signal are superimposed to form the signal “watermark”. From the point of view of signal transmission, the tag signal can achieve the dual “binding” of shared key and channel. Security analysis and simulation results indicate that it can achieve high authentication success rate and low failure rate. This method does not require complex cryptographic algorithms. So it can achieve security under the premise of reduce the computational amount in the communication process.
Copyright © 2017–2024 EAI