This application is related to wireless communications.
In typical wireless communications two wireless transmit/receive units (WTRUs), Alice and Bob, communicate with each other on a channel. To exclude an illegitimate entity, Eve, Alice and Bob cryptographically protect their communications. Traditional cryptographic techniques, which rely on computational difficulty, are increasingly ineffective as the availability of computing power increases. In addition, an Eve may use a spoofing to disrupt legitimate communications in variety of ways, such as through denial of service or signals by impersonating a legitimate communicating entity.
Information-theoretically secure cryptographic techniques eliminate the reliance on computational difficulty. For example, Alice and Bob may employ the reciprocity of a wireless channel to extract secret keys. These techniques usually rely on exchanging signals, or probing, the wireless channel, such as in a time division duplex (TDD) manner, to collect correlated information from which common secret bits are obtained. During the probing, it may be difficult for Alice and Bob to be sure that the signals they received originated from a legitimate source. Thus a method an apparatus for providing authentication for secure wireless communication would be advantageous.
A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication may be performed.
A more detailed understanding may be had from the following description, given by way of example in conjunction with the accompanying drawings wherein:
When referred to hereafter, the terminology “wireless transmit/receive unit (WTRU)” includes but is not limited to a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a computer, or any other type of user device capable of operating in a wireless environment. When referred to hereafter, the terminology “base station” includes but is not limited to a Node-B, a site controller, an access point (AP), or any other type of interfacing device capable of operating in a wireless environment. The terms “WTRU” and “base station” are not mutually exclusive. For example, a WTRU may be an enhanced Home Node-B (H(e)NB).
When referred to hereafter, the term “Alice” includes a WTRU or a base station that is a legitimate communicating entity. When referred to hereafter, the term “Bob” includes a WTRU or a base station that is a legitimate communicating entity. When referred to hereafter, the term “information-theoretically secure” includes but is not limited to perfectly secure, unconditionally secure, and nearly information-theoretically secure. When referred to hereafter, the terms “trust”, “trusted”, and “trustworthy”, as well as variations thereof, indicate a quantifiable and observable manner of assessing whether a unit will function in a particular manner.
Although shown as a WTRU for simplicity, Alice may be a base station, or any other apparatus capable of performing wireless communication. Although shown as a base station for simplicity, Bob may be a WTRU, or any other apparatus capable of performing wireless communication. In addition, it should be apparent that any combination of wireless and wired devices may be included in the wireless communication network 100.
In addition to the components that may be found in a typical WTRU, the WTRU 110 includes a processor 211 with an optional linked memory 213, at least one transceiver 215, an optional battery 217, and an antenna 219. The processor 211 is configured to perform a method of authentication for secure wireless communication. The transceiver 215 is in communication with the processor 211 and the antenna 219 to facilitate the transmission and reception of wireless communications. In case a battery 217 is used in the WTRU 110, it powers the transceiver 215 and the processor 211.
In addition to the components that may be found in a typical base station, the base station 120 includes a processor 221 with an optional linked memory 223, transceivers 225, and antennas 227. The processor 221 is configured to perform a method of authentication for secure wireless communication. The transceivers 225 are in communication with the processor 221 and antennas 227 to facilitate the transmission and reception of wireless communications.
In a typical rich scattering environment, the radio channel response decorrelates rapidly in space. A physical-layer, channel-based, method that combines channel probing, M complex frequency response samples over a bandwidth W, with hypothesis testing may be used to determine whether current and prior communication attempts are made by the same communicating entity. In this way, legitimate entities can be authenticated and illegitimate entities can be detected.
In response to a spoofing attack, the receiver may fail to detect a certain percentage of illegitimate signals, called the miss rate, and accept the spoofed messages as valid. Once an attack is missed, the receiver may generate a certain percentage of false rejections, called the false alarm rate, when the legitimate communicating entity attempts to authenticate. To counteract the non-zero probabilities of false alarm and missed detection, and the possibility of decorrelation due to missed or lost signals, a one-way hash chain that relies on purely cryptographic properties of hash functions and provides cryptographic protections based on the computational difficulty of inverting a one-way function, F(.), may be combined with the channel-based method.
If the FP method does not detect a possible attack (I(k)=0), or if no CIR reference data exists (I(k)=2), Bob performs higher layer processing, such as MAC layer authentication, at 440. Optionally, the higher lay processing may be nominal, such that I2(k)=0, or may be omitted. If the CIR reference data is authenticated, it is recorded in the reference table.
A CIR measurement may become stale over time. For example, after a period equal to the channel coherence time has passed, a CIR may completely decorrelate. The use of stale channel data may lead to false alarms. Accordingly, the CIR reference table includes a timer for each CIR record. When the timer reaches the maximum lifetime, NT, the CIR record expires and, optionally, is deleted. The maximum lifetime of the CIR record, NT, is set such that each CIR record expires within the relevant channel coherence time.
Referring back to
The test statistic function approximately represents a generalized likelihood ratio test based on a time-invariant channel model. The channel parameters, such as channel coherence time, may vary significantly over time, and may depend on environment changes. It should be apparent that other functions may be implemented depending on the particular channel model without exceeding the scope of the present application. Table 1 shows several exemplary applications of the test statistic function.
As shown in Table 1, the test statistics, L1, L3, and L5, process CIR data in the time domain, while their counterparts, L2, L4, and L8, process the channel frequency responses. In addition, L1-L6 and L8 utilize a complex scalar, ejArg(H H)0 1, to counteract the phase drifting of the channel response due to the changes of the receiver's local oscillator.
A CIR Post-Process (CPP) method may be used to align the channel impulse response in the time domain where two CIR vectors shift in time to increase the overlap in shape. The CPP method may reduce the affect of timing errors in channel estimation, and may reduce the false alarm rate. To support time shifting, the CPP method may optionally include, for example, CIR shape pruning, up sampling, and normalization of power.
The threshold, Thre, may be a pre-assigned threshold. For example, a fixed threshold based on empirical data may be used. Alternatively, an adaptive threshold may be used. To establish an adaptive threshold, Alice sends Ntrain training messages to Bob, so as to teach Bob the range of the test statistics. Bob determines a percentile value of the test statistic as the test threshold. For example, Bob may select a low threshold for a channel that exhibits low time variation in order to balance between a false alarm rate and miss rate.
Referring again to
Where the integer N denotes a predetermined number of signals, the one-way hash chain may be expressed as:
X
1
→X
2
=F(X1)→X3=F(X2)→ . . . . →XN=F(XN−1). Equation (2)
As shown in
Alice successively computes and stores N hash function values based on X1 at 520. For example, the hash of X1 may be expressed as X2=F(X1), and the hash of X2 may be expressed as X3=F(F(X1)). Optionally, the one-way hash chain may be pre-computed and stored.
Alice transmits a series of N signals including her MAC address and the calculated hash values to Bob beginning at 530. For example, Alice includes the element XN in the first signal A1 at 530, the element XN−1 in the second signal A2 at 540, and so on at 560-570. Thus the elements of the chain are revealed in reverse order. Bob receives the first signal A1 and the second signal A2 and validates them at 532, 542 using the FP method.
Eve attempts to spoof Alice by sending a signal E1 including Alice's MAC address to Bob at 545. Anyone receiving the signals may compute the hash of the element contained in a signal using the publicly known function F(.) to verify that it equals the element contained in the previous signal, thereby being confident that the signal was sent by the same entity that transmitted the previous signal. Moreover, since the hash function F(.) is one-way, knowledge of hash elements contained in received signals, t=t0, cannot be used to predict the hash elements contained in later received signals, such as signals arriving at t>t0. Therefore, Bob receives Eve's signal E1, computes the hash value, and determines that CIR and hash values do not match, and rejects Eve's spoofing attempt at 547.
Alice transmits a third signal A3 containing the one-way hash chain element XN−2 at 550. However, Bob does not receive the third signal. Alice transmits a fourth signal A4, containing the one-way hash chain element XN−3, at 560. Bob receives the fourth signal A4 and recognizes that a signal has been missed at 562.
If a signal is lost, the legitimacy of the next received signal may be ascertained by recursively computing the hash of the element in the latest received signal. Thus, at 564, Bob determines the number of missed signals, m, based on the rate at which he and Alice have agreed to send signals on the channel. Bob computes the hash F(F(F . . . F(Xn))) . . . ) where Xn is the hash element in the latest signal, and the hash function is applied m times at 566. Bob compares the new hash value with the hash value contained in the previous correctly received signal A2, and validates the signal A4 at 568.
Authentication based on one-way hash chains does not depend upon the wireless channel and does not reveal any part of any secret keys derived between Alice and Bob. For example, if Alice and Bob derive secret encryption keys based on common randomness of a wireless channel, these keys are not publicly revealed during one-way hash chain authentication and are preserved for use during encryption. Since the number of signals that need to be exchanged in order to extract a key of a certain length may be conservatively upper bounded by a constant number N, a constant amount of memory is used to store the one-way hash chain.
Optionally, to protect against a simple substitution attack, wherein Eve reads the hash element from a signal and uses those numbers to spoof a signal, a Message Authentication Code of each signal including the preamble bits, the hash element disclosed, and a sequence number, may be attached at the end of the signal. The Message Authentication Code is computed using the next hash element to be revealed in the next signal as a key.
In some embodiments, the one-way hash chain is extended to protect further signals by cascading a second one-way hash chain after the first. Elements from the start of the second chain are included with elements from the end of the first chain. This effectively authenticates the start of the second chain before the first chain has ended.
It should be apparent that the combination of channel-based and one-way chain based data-origin consistency may be used in a number of ways, by attributing an appropriate amount of importance to the outcome of the hypothesis test computed for each received probe. For example, one-way chain authentication or channel-based authentication may be performed for a subset of the messages.
Regardless of the higher layer processing method used, the result may be denoted I2(k)=0 if Alice is authenticated, and I2(k)=1 if a possible attack is detected. Thus, the overall authentication determination Ia(k), may be expressed as:
Where H1(k) is the CIR derived from a signal received at time k, H0(k) may be expressed as:
Where Bob has a reliable reference channel response, resulting from a message sent by Alice for which the timer has not expired, the source of the CIR vector H may be designated S(H). For example, S(H0(k))=Alice and I(k)<2. The false alarm rate, Pfa, and miss rate, Pm, may be denoted as:
P
fa
=P{I(k)=1|S(H1(k))=S(H0(k))}
P
m
=P{I(k)=0|S(H1(k)≠S(H0(k))}. Equation (5)
Where Bob does not have a reliable reference channel response the false alarm rate, PFA, and miss rate, PM, may be denoted as:
P
FA
=P{I(k)=1|S(H1(k))=Alice}
P
M
=P{I(k)≠1|S(H1(k))=Eve}. Equation (6)
Where Pfa2 and Pm2 denote the false alarm rate and the miss rate of the higher layer processing respectively, the overall false alarm rate, PFAA, may be denoted as:
PMA=PMPm2
P
FAA
=P
FA+(1−PFA)Pfa2. Equation (7)
The performance of the overall false alarm rate depends more on PFA and PM, than Pfa, and Pm; however, the evaluation of PFA and PM, takes more effort due to the dependence on the timer limit, NT, higher layer processing, and transmission pattern of both Alice and Eve. For example, if Eve sends spoofing messages more frequently, both PFA and PM increase, even though everything else including Pfa, and Pm remains relatively constant. Since the generalized closed-form expressions of PFA and PM are hard to obtain, they may be bound as functions of Pfa, and Pm, which are much easier to evaluate.
For example, if Bob receives one signal from either Alice, Pa, or Eve, Pe, every time unit, and the source of the message is time independent, the identically distributed signals may be expressed as:
Where the CIR timer NT is less than the channel coherence time, and the correlation of any two CIR vectors of the same channel is constant within the channel coherence time, the lower-bound of the overall false alarm rate and miss rate the FP method may be expressed as:
P
FA
=P
fa
−P
fa(1−Pa+PaPFA)N
P
M
=P
m+(1−Pm)(1−Pa(1−PFA))N
Alice sends a second signal A2 to Bob at 620. Bob receives the signal A2, generates a CIR measurement based on the received signal, locates the stored CIR reference data, performs the FP method, and authenticates Alice at 622.
Eve attempts to gain illegitimate access using a spoofed signal E1 including Alice's MAC address at 630. Bob receives Eve's signal E1, generates a CIR measurement based on the received signal, locates the stored CIR reference data, and detects the spoofed signal at 632.
The timer T1 expires at 640. Alice sends a third signal A3 to Bob at 650. Bob receives the signal A3, generates a CIR measurement based on the received signal, looks for, but does not locates stored CIR reference data, authenticates the signal A3 using higher layer processing, and stores Alice's CIR reference data, including a timer T2 at 652. For example, Bob may authenticate the signal A3 using the one-way hash chain method described in reference to
Eve attempts to gain illegitimate access using a spoofed signal E2 including Alice's MAC address at 660. Bob receives Eve's signal E2, generates a CIR measurement based on the received signal, locates the stored CIR reference data, and detects the spoofed signal at 662.
Although features and elements are described above in particular combinations, each feature or element can be used alone without the other features and elements or in various combinations with or without other features and elements. The methods or flow charts provided herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable storage medium for execution by a general purpose computer or a processor. Examples of computer-readable storage mediums include a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
Suitable processors include, by way of example, a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs); Field Programmable Gate Arrays (FPGAs) circuits, any other type of integrated circuit (IC), and/or a state machine.
A processor in association with software may be used to implement a radio frequency transceiver for use in a wireless transmit receive unit (WTRU), user equipment (UE), terminal, base station, Mobility Management Entity (MME) or Evolved Packet Core (EPC), or any host computer. The WTRU may be used in conjunction with modules, implemented in hardware and/or software including a Software Defined Radio (SDR), and other components such as a camera, a video camera module, a videophone, a speakerphone, a vibration device, a speaker, a microphone, a television transceiver, a hands free headset, a keyboard, a Bluetooth® module, a frequency modulated (FM) radio unit, a Near Field Communication (NFC) Module, a liquid crystal display (LCD) display unit, an organic light-emitting diode (OLED) display unit, a digital music player, a media player, a video game player module, an Internet browser, and/or any Wireless Local Area Network (WLAN) or Ultra Wide Band (UWB) module.
receiving a signal indicating a transmission rate for the plurality of signals.
This application is a continuation of National Stage Application Ser. No. 13/121,190 filed on Dec. 16, 2013 which is a 371 of International Application PCT/US2009/057477 filed on Sep. 18, 2009 which claims the benefit of provisional application 61/098,480 filed on Sep. 19, 2008, the disclosures of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61098480 | Sep 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13121190 | Dec 2013 | US |
Child | 15455412 | US |