Internet DRAFT - draft-linning-authentication-physical-layer
draft-linning-authentication-physical-layer
Internet Engineering Task Force
Internet-Draft
Intended status: Informational Southeast University
Expires: April 11, 2019 October 8, 2018
Authentication by Physical Layer Features
draft-linning-authentication-physical-layer-00
Abstract
This document proposes an authentication method using physical layer
features from terminal unit. This document assumes that the reader
is familiar with some concepts and details regarding physical layer
security.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 11, 2019.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Expires April 11, 2019 [Page 1]
Internet-Draft APLE October 2018
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 2
2. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Physical layer feature extraction . . . . . . . . . . . . 3
2.2. Physical Layer Feature based Authentication . . . . . . . 3
3. Physical Layer Feature Extraction . . . . . . . . . . . . . . 3
4. Physical Layer Feature based Authentication . . . . . . . . . 4
5. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
7. Security Considerations . . . . . . . . . . . . . . . . . . . 6
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
8.1. Normative References . . . . . . . . . . . . . . . . . . 6
8.2. Informative References . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7
1. Introduction
The classical device authentication method includes MAC address, pre-
shared key or digital certificate. However, the MAC address is easy
to be imitated, which can hardly ensure the security. The security
of the pre-shared key and digital certificate is mainly due to the
strength of the digital key and authentication algorithms.
Physical layer feature based device identification provides a
physical layer security protection for networks. Utilizing the
inherent physical layer feature of terminal unit, it is possible to
realize identity authentication via only the received waveform.
It has been demonstrated that physical layer feature owns uniqueness
and persistence, which could be used for terminal unit
identification. The physical layer feature could be obtained via
transient feature extraction, spectrum feature extraction or
modulation feature extraction. [Ref_1] After that, gateway could
identify the identity of the terminal unit via the received signal
waveforms by identification algorithms.
1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Expires April 11, 2019 [Page 2]
Internet-Draft APLE October 2018
2. Applicability
This mechanism authenticates the identity of the terminal unit by
physical layer features, which is suitable for wireless, wired and
optical networks.
When network node transmits message to other network nodes, the
binary message is transformed to analogical signal in physical layer.
This physical layer signal includes the unique physical layer feature
of the transmitter. The receiver utilizes the physical layer
features from the transmitter signal.
The steps are listed below:
2.1. Physical layer feature extraction
The physical layer feature extraction methods can be generally
summarized into three categories, namely transient-based method,
spectrum-based method, and modulation-based method. [Ref_1] The
obtained physical layer features are digitalized to a feature vector,
which is used for authentication.
2.2. Physical Layer Feature based Authentication
The gateway uses the extracted physical layer features to
authenticate the accessing terminal device.
3. Physical Layer Feature Extraction
The physical layer features include transient-based feature,
spectrum-based feature, and modulation-based feature.
The transient-based method measures the turn-on/off transient or
transmitting signal variations for device identification. These
features are extracted by measuring the envelope of the transient
signal. Signal processing methods such as principal component
analysis (PCA) and discrete Fourier transform (DFT) are employed for
further feature process. In addition, statistical methods are also
used for transient-based feature extraction. The standard deviation,
variance, skewness and kurtosis of the transient amplitude, phase and
frequency are extracted for physical layer features. A vector of
these features are directly employed for
authentication.[Ref_1][Ref_2]
Signal spectrum is another important physical layer feature. The
power spectrum density (PSD) is directly extracted from the samples
of the receiver signal. In general, the non-linearity behavior of
the device transmitter is the main source of the signal spectrum
Expires April 11, 2019 [Page 3]
Internet-Draft APLE October 2018
feature. The signal spectrum feature can be quantified by selecting
several significant regions at PSD. The in-band outline and out-of-
band outline of PSD is another important physical layer feature for
authentication. [Ref_1]
Modulation-based methods extract stable features from the received
signal, including auto gain control (AGC) responds, amplifier
nonlinearity characteristics, sampling frequency offset, carrier
frequency offset, differential constellation trace figure (DCTF) and
so on. These modulation-based features can be extracted in the
baseband by specific methods. [Ref_3]
The extracted physical layer features are grouped into a feature
vector. This feature vector is further used for authentication.
4. Physical Layer Feature based Authentication
In physical layer feature based authentication, the gateway has two
process, including a training process and decision process. In
training process, the system works in a secure connection. The
identity of the accessing device is true and known at gateway. The
gateway capture the physical layer signal and extract the physical
layer feature. The obtained physical layer feature is stored in
database for decision process in authentication. In decision
process, the system works in an open network. Gateway receives the
signal of accessing terminal device. Gateway authenticate the
identity of the terminal using the stored features in database.
In terminal identity authentication problem, the gateway is faced
with two situations. The first situation is that the identity of the
terminal device has been registered before, the terminal device
declare its identity in its accessing. In this case, gateway compare
the extracted physical layer feature to the feature vector stored in
the database. The result of the comparison is a degree of similarity
between the accessing terminal device and legitimate device. Gateway
confirm the identity of the accessing terminal device when the degree
of similarity is higher than a threshold. If the identity of the
accessing terminal device is legitimate, gateway opens the connection
of the terminal device to the internal network. The second situation
is that the identity of the terminal device has not been registered
before. In this case, gateway also extracts the physical layer
feature of the accessing terminal device. The gateway compare the
extracted feature to all of the feature vectors stored in the
database. A final result of degree of similarities between the
accessing terminal device and stored features is obtained. Gateway
confirm the new identity of the accessing terminal device when all of
degree of similarities are lower than a threshold. Gateway close the
connection of the terminal device to the internal network.
Expires April 11, 2019 [Page 4]
Internet-Draft APLE October 2018
5. Example
An application example is introduced as follows:
The authentication by physical layer feature system includes four
elements: terminal unit, physical layer feature extraction unit,
internal network unit and accessing control unit. The terminal unit
is connected to the physical layer feature extraction unit and
accessing control unit. The physical layer feature extraction unit
is connected to the accessing control unit. The internal network
unit is connected to the accessing control unit. The signal is
transmitted from terminal unit to physical layer feature extraction
unit. The signal is also transmitted from physical layer feature
extraction unit to accessing control unit. The terminal unit and
accessing control unit have mutual signal exchange. The internal
network unit and accessing control unit also have mutual signal
exchange.
The physical layer feature extraction unit includes three components:
front-end signal capture device and processor. The processor
extracts the physical layer feature using the capture signal from
front-end signal capture device. The accessing control unit includes
two components: storage and processor. The processor authenticates
the accessing terminal device using the physical layer feature. The
authentication rule and identity information are stored in the
database of storage. The extracted physical layer feature is also
stored in the database of storage.
In training process, physical layer feature extraction unit initially
obtains physical layer feature and transmits the physical layer
feature to accessing control unit. Accessing control unit binds the
physical layer feature to the identity of terminal device. The
physical layer feature of the trained device is stored in database at
accessing control unit.
In decision process, physical layer feature extraction unit captures
the signal of accessing terminal device. Physical layer feature
extraction unit further extracts the physical layer feature from the
captured signal. Physical layer feature extraction unit transfers
the physical layer feature to accessing control unit. In decision
process, the authentication has two situations. In the first
situation, the identity of the terminal device has been registered
before in the database. The terminal device declares his identify
when it accesses the network. The accessing control unit compares
the extracted physical layer feature to the stored physical layer
feature in the database with the declared index. This comparison
gets a result of degree of similarity. If this degree of similarity
is higher than a threshold, accessing control unit confirms the
Expires April 11, 2019 [Page 5]
Internet-Draft APLE October 2018
identity of the device and opens the connection of terminal unit to
the internal network unit. If this degree of similarity is lower
than a threshold, accessing control unit rejects the access of the
device and closes the connection of terminal unit to the internal
network unit. In the second situation, the identity of the terminal
device has not been registered before in the database. The terminal
device does not declare his identify when it accesses the network.
The accessing control unit compares the extracted physical layer
feature to all of the stored physical layer feature in the database.
This comparison gets a result of highest value of degree of
similarity. If the highest value of degree of similarity is lower
than a threshold, the accessing control unit confirms the new
identity of the accessing terminal device and closes the connection
of terminal unit to the internal network unit. If the highest value
of degree of similarity is higher than a threshold, the accessing
control unit requires other authentication method to confirm the
identity of the terminal device.
6. IANA Considerations
This document includes no request to IANA.
7. Security Considerations
This section will address only security considerations associated
with the use of physical layer features for authentications. The
similarity of physical layer features between different devices is
relied on the consistency of physical devices, measurement accuracy
of the gateway. If the gateway cannot distinguish the physical layer
features between different devices, authentication methods in higher
layer is required.
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
8.2. Informative References
[Ref_1] Danev, Boris.,
"https://dl.acm.org/citation.cfm?id=2379782", 2012.
[Ref_2] J.Carbino , Timothy.,
"https://ieeexplore.ieee.org/document/7069371/", 2015.
Expires April 11, 2019 [Page 6]
Internet-Draft APLE October 2018
[Ref_3] Peng, Linning.,
"https://ieeexplore.ieee.org/document/7752534/", 2016.
Authors' Addresses
Linning Peng
Southeast University
No.2 SiPaiLou
NanJing, JiangSu 210096
China
Phone: +86 25 52091692
Email: pengln@seu.edu.cn
Aiqun Hu
Southeast University
No.2 SiPaiLou
NanJing, JiangSu 210096
China
Phone: +86 25 52091692
Email: aqhu@seu.edu.cn
Expires April 11, 2019 [Page 7]