Abstract
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modeled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density whose covariance matrices can be obtained by solving a constrained optimization problem. We propose an iterative algorithm for its solution: starting from the closed-form solution of a relaxed problem, we obtain, by projection, an initial feasible solution; then, by an iterative procedure, we look for the fixed-point solution of the problem. Numerical results show that for cases of interest the iterative approach converges, and perturbation analysis shows that the found solution is a local minimum.
Original language | English (US) |
---|---|
Article number | 7010914 |
Pages (from-to) | 941-952 |
Number of pages | 12 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 10 |
Issue number | 5 |
DOIs | |
State | Published - May 1 2015 |
Keywords
- Authentication
- Hypothesis testing
- Physical layer security
- Rayleigh fading channels
ASJC Scopus subject areas
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications