Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2012, Article ID 545783, 11 pages
http://dx.doi.org/10.1155/2012/545783
Research Article

A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks

Department of Electrical and Computer Engineering, Drexel University, Philadelphia, PA 19104, USA

Received 17 October 2011; Accepted 10 January 2012

Academic Editor: Karim Y. Kabalan

Copyright © 2012 Prathaban Mookiah and Kapil R. Dandekar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. K. Nichols and P. C. Lekkas, Wireless Security: Models, Threats, and Solutions, McGraw-Hill Professional, New York, NY, USA, 2001.
  2. N. Borisov, I. Goldberg, and D. Wagner, “Intercepting mobile communications: the insecurity of 802.11,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, July 2001. View at Scopus
  3. W. A. Arbaugh, N. Shankar, and Y. C. J. Wan, “Your 802.11 wireless network has no clothes,” in Proceedings of the IEEE Wireless Communications, vol. 9, pp. 44–51, 2001.
  4. K. Beaver and P. T. Davis, Understanding WEP Weaknesses, 2011.
  5. M. Debbah, H. El-Gamal, H. V. Poor, and S. Shamai, “Editorial: wireless physical layer security,” Eurasip Journal on Wireless Communications and Networking, vol. 2009, Article ID 404061, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, Article ID 4543070, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Amplify-and-forward based cooperation for secure wireless communications,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '09), pp. 2613–2616, April 2009. View at Scopus
  8. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Cooperative jamming for wireless physical layer security,” in Proceedings of the IEEE 15th Workshop on Statistical Signal Processing (SSP '09), pp. 417–420, Cardiff, UK, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. P. L. Yu, J. S. Baras, and B. M. Sadler, “Physical-layer authentication,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 38–51, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette, “Radio frequency watermarking for OFDM wireless networks,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), pp. V-397–V-400, May 2004. View at Scopus
  11. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, “Robust key generation from signal envelopes in wireless networks,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 401–410, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in Proceedings of the 15th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '09), pp. 321–332, Beijing, China, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Kitaura and H. Sasaoka, “A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio,” Electronics and Communications in Japan, Part III, vol. 88, no. 9, pp. 1–10, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Yasukawa, H. Iwai, and H. Sasaoka, “Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM,” in Proceedings of the International Symposium on Information Theory and Its Applications, Auckland, New Zealand, December 2008.
  15. D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the 5th ACM Workshop on Wireless Security (WiSE '06), pp. 43–52, Los Angeles, Calif, USA, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  16. N. Patwari and S. K. Kasera, “Robust location distinction using temporal link signatures,” in Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '07), pp. 111–122, Los Angeles, Calif, USA, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Fingerprints in the ether: using the physical layer for wireless authentication,” in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 4646–4651, Glasgow, Scotland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Using the physical layer for wireless authentication in time-variant channels,” IEEE Transactions on Wireless Communications, vol. 7, no. 7, Article ID 4570223, pp. 2571–2579, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Channel-based spoofing detection in frequency-selective Rayleigh channels,” IEEE Transactions on Wireless Communications, vol. 8, no. 12, Article ID 5351714, pp. 5948–5956, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “MIMO-assisted channel-based authentication in wireless networks,” in Proceedings of the 42nd Annual Conference on Information Sciences and Systems (CISS '08), pp. 642–646, Princeton, NJ, USA, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Demirbas and Y. Song, “An RSSI-based scheme for sybil attack detection in wireless sensor networks,” in Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM '06), pp. 564–568, Buffalo, NY, USA, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. J. T. Bernhard and C. Balanis, Reconfigurable Antennas (Synthesis Lectures on Antennas and Propagation), Morgan and Claypool, San Rafael, Calif, USA, 2006.
  23. A. Forenza and J. R. W. Heath, “Benefit of pattern diversity via two-element array of circular patch antennas in indoor clustered MIMO channels,” IEEE Transactions on Communications, vol. 54, no. 5, pp. 943–954, 2006. View at Google Scholar
  24. J. Medbo, J. E. Berg, and F. Harrysson, “Temporal radio channel variations with stationary terminal,” in Proceedings of the IEEE Vehicular Technology Conference, May 2004.
  25. P. Pagani and P. Pajusco, “Characterization and modeling of temporal variations on an ultrawideband radio link,” IEEE Transactions on Antennas and Propagation, vol. 54, no. 11, pp. 3198–3206, 2006. View at Google Scholar
  26. C. Oestges, D. Vanhoenacker-Janvier, and B. Clerckx, “Channel characterization of indoor wireless personal area networks,” IEEE Transactions on Antennas and Propagation, vol. 54, no. 11, pp. 3143–3150, 2006. View at Google Scholar
  27. D. Piazza, M. D'Amico, and K. Dandekar, “Performance improvement of a wideband MIMO system by using two-port RLWA,” IEEE Antennas and Wireless Propagation Letters, vol. 8, pp. 830–834, 2009. View at Google Scholar
  28. H. Nakabayashi and S. Kozono, “Theoretical analysis of frequency-correlation coefficient for received signal level in mobile communications,” IEEE Transactions on Vehicular Technology, vol. 51, no. 4, pp. 729–737, 2002. View at Google Scholar
  29. D. Piazza, P. Mookiah, M. D'Amico, and K. Dandekar, “Experimental analysis of pattern and polarization reconfigurable circular patch antennas for MIMO systems,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2352–2362, 2010. View at Google Scholar