Physical-layer authentication is a popular alternative to the conventional key-based authentication for internet of things (IoT) devices due to their limited computational capacity and battery power. However, this approach has limitations due to poor robustness under channel fluctuations, reconciliation overhead, and no clear safeguard distance to ensure the secrecy of the generated authentication keys. In this regard, we propose a novel, secure, and lightweight continuous authentication scheme for IoT device authentication. Our scheme utilizes the inherent properties of the IoT devices transmission model as its source for seed generation and device authentication. Specifically, our proposed scheme provides continuous authentication by checking the access time slots and spreading sequences of the IoT devices instead of repeatedly generating and verifying shared keys. Due to this, access to a coherent key is not required in our proposed scheme, resulting in the concealment of the seed information from attackers. Our proposed authentication scheme for IoT devices demonstrates improved performance compared to the benchmark schemes relying on physical-channel. Our empirical results find a near threefold decrease in misdetection rate of illegitimate devices and close to zero false alarm rate in various system settings with varied numbers of active devices up to 200 and signal-to-noise ratio from 0 dB to 30 dB. Our proposed authentication scheme also has a lower computational complexity of at least half the computational cost of the benchmark schemes based on support vector machine and binary hypothesis testing in our studies. This further corroborates the practicality of our scheme for IoT deployments.
翻译:物理认证是常用的互联网物质(IoT)装置基于常规关键认证的常用替代方法,因为其计算能力和电池功率有限。然而,这一方法由于频道波动、调节管理费和没有明确的保障距离以确保生成的认证钥匙的保密性而不够稳健,因而具有局限性。 在这方面,我们提议为IoT装置认证建立一个新颖、安全和轻度的连续认证机制。我们的计划利用IoT装置传输模型的固有特性作为种子生成和装置认证的来源。具体地说,我们提议的计划通过检查IoT装置的接入时间档和传播序列,而不是反复生成和核查共享钥匙,不断提供认证。因此,我们提议的计划不需要获得一致的钥匙,从而无法确保生成的认证钥匙的保密性。我们提议的IoT装置认证机制的绩效比基准计划要好。我们的经验结果表明,非法装置的误读率和装置在各种系统环境中接近零误差的警报率下降近三倍,而实际部署装置的数目又不一而反复生成和核实共享的钥匙序列序列序列序列,而不是反复生成和核实共享的钥匙。因此,我们拟议计划不需要使用一个统一的钥匙键基基比标准,根据我们的30号的系统测试计划,在20号的精确的计算中,我们的标准计算中,我们的标准计算方法的基数从20的计算方法的基数为20的计算方法的基比为20的基比。</s>