We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with a single concentrator node. To this end, they are assisted by anchor nodes that are trusted and securely connected with the concentrator node. In this context, we aim at providing a message authentication scheme based on the characteristics of the channel between the source nodes and the anchor nodes. According to this approach, the anchor nodes estimate the channel to source nodes in an initially externally authenticated fashion, while forthcoming messages are authenticated by comparing the current channel estimate with the initial estimate. Moreover, assuming that the anchor nodes have a limited energy availability, we derive suitable scheduling policies for the activation of the anchor nodes for authentication purposes. In particular, we aim at maximizing the anchors lifespan while guaranteeing given false alarm and missed detection probabilities of the authentication process. The performance of the proposed authentication protocols is evaluated in a typical CIoT scenario.
Energy-based anchor node selection for IoT physical layer authentication
M. Centenaro;
2016-01-01
Abstract
We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with a single concentrator node. To this end, they are assisted by anchor nodes that are trusted and securely connected with the concentrator node. In this context, we aim at providing a message authentication scheme based on the characteristics of the channel between the source nodes and the anchor nodes. According to this approach, the anchor nodes estimate the channel to source nodes in an initially externally authenticated fashion, while forthcoming messages are authenticated by comparing the current channel estimate with the initial estimate. Moreover, assuming that the anchor nodes have a limited energy availability, we derive suitable scheduling policies for the activation of the anchor nodes for authentication purposes. In particular, we aim at maximizing the anchors lifespan while guaranteeing given false alarm and missed detection probabilities of the authentication process. The performance of the proposed authentication protocols is evaluated in a typical CIoT scenario.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.