Cross-layer authentication method based on radio frequency fingerprint
First Claim
1. A cross layer authentication method based on radio frequency (RF) fingerprint, wherein the method includes the following steps:
- step 1, in a first time slot, a legitimate sender A sends a first packet to a legitimate receiver B, and then B identifies the first data packet by an upper layer authentication;
if the upper layer authentication is successful, the legitimate sender A and the legitimate receiver B will establish a trust connection between them, and go to step 2;
if the upper layer authentication is failed, repeat step 1;
step 2, the legitimate receiver B extracts a RF fingerprint eigenvector of the legitimate sender A, and stores it in a memory of the legitimate receiver B;
step 3, in the next time slot, a sender X sends a second packet to the legitimate receiver B, and the legitimate receiver B extracts the RF fingerprint eigenvector of the sender X;
step 4, set a sample of the RF fingerprint eigenvector;
step 5, the legitimate receiver B carries out a RF fingerprint authentication to the RF fingerprint eigenvector of the sender X in step 3 according to the RF fingerprint eigenvector, and estimates the similarity between the RF fingerprint eigenvector of the sender X and the sample of the RF fingerprint eigenvector;
if the similarity is greater than or equal to a set threshold, then the RF fingerprint authentication will be successful;
the sender X is the legitimate sender A, and the RF fingerprint eigenvector of the sender X will be stored in the memory of the legitimate receiver B, then go to step 3;
if the similarity is less than the threshold, then the RF fingerprint authentication will be failed;
the sender X is an attacker E, and the legitimate receiver B drops the second packet, then go back to step 1;
wherein a test algorithm of the RF fingerprint authentication in the step 5 is a likelihood ratio test method or a sequential probability ratio test method.
1 Assignment
0 Petitions
Accused Products
Abstract
A cross layer authentication method based on radio frequency fingerprint, it includes the following steps: S1. In the first time slot, the legitimate transmitter A sends the first packet to the legitimate receiver B, and then B identifies the first data packet by the upper layer authentication; S2. The legitimate recipient B extracts the RF fingerprint eigenvector of the legitimate sender A, and stores it in the memory of the legitimate receiver B; S3. In the next time slot, the sender X sends the second packet to the legitimate receiver B, and the legitimate recipient B extracts the RF fingerprint eigenvector of the sender X; S4. Set sample of the RF fingerprint eigenvector; S5. legitimate receiver B estimates the similarity between the RF fingerprint eigenvector of the sender X and sample of the RF fingerprint eigenvector. This invention is in advantage of low computational complexity, small delay and high precision.
6 Citations
7 Claims
-
1. A cross layer authentication method based on radio frequency (RF) fingerprint, wherein the method includes the following steps:
-
step 1, in a first time slot, a legitimate sender A sends a first packet to a legitimate receiver B, and then B identifies the first data packet by an upper layer authentication; if the upper layer authentication is successful, the legitimate sender A and the legitimate receiver B will establish a trust connection between them, and go to step 2; if the upper layer authentication is failed, repeat step 1; step 2, the legitimate receiver B extracts a RF fingerprint eigenvector of the legitimate sender A, and stores it in a memory of the legitimate receiver B; step 3, in the next time slot, a sender X sends a second packet to the legitimate receiver B, and the legitimate receiver B extracts the RF fingerprint eigenvector of the sender X; step 4, set a sample of the RF fingerprint eigenvector; step 5, the legitimate receiver B carries out a RF fingerprint authentication to the RF fingerprint eigenvector of the sender X in step 3 according to the RF fingerprint eigenvector, and estimates the similarity between the RF fingerprint eigenvector of the sender X and the sample of the RF fingerprint eigenvector; if the similarity is greater than or equal to a set threshold, then the RF fingerprint authentication will be successful;
the sender X is the legitimate sender A, and the RF fingerprint eigenvector of the sender X will be stored in the memory of the legitimate receiver B, then go to step 3;if the similarity is less than the threshold, then the RF fingerprint authentication will be failed;
the sender X is an attacker E, and the legitimate receiver B drops the second packet, then go back to step 1;wherein a test algorithm of the RF fingerprint authentication in the step 5 is a likelihood ratio test method or a sequential probability ratio test method. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification