Radio-frequency-fingerprint-based challenge-response authentication protocol method

A radio frequency fingerprint and authentication protocol technology, applied in user identity/authority verification, security devices, electrical components, etc., can solve problems such as attacks, and achieve the effect of solving the problem of key leakage detection and disclosure

Inactive Publication Date: 2013-01-30
NANTONG UNIVERSITY
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after many years of operation, it was found to have security flaws
Using a formal method to analyze it, it is found that the authentication protocol has a "man-in-the-middle attack" vulnerability, such as image 3 shown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio-frequency-fingerprint-based challenge-response authentication protocol method
  • Radio-frequency-fingerprint-based challenge-response authentication protocol method
  • Radio-frequency-fingerprint-based challenge-response authentication protocol method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The protocol method of the present invention is divided into two stages of initialization and operation, and the structure and operation process of the protocol can be found in Figure 4 , 5 . This embodiment is a verification experiment of the method of the present invention. The challenger uses IEEE 802.11b / g wireless transmission equipment, and the PLCP (Pysical Layer Convergence Procedure) preamble of the transmitted radio frequency signal is spread by 1Mbit / s with 11chips Barker code (10110111000) The DBPSK modulation method transmits the information to be transmitted, so the transmitted radio frequency signal preamble envelope has a periodicity with a basic period of 1usec and a DSSS (Direct Sequence Spread Spectrum) preamble of IEEE 802.11b.

[0042] During the initialization phase:

[0043]The responding party obtains the radio frequency signal sent by the challenger through the wireless medium, detects the radio frequency fingerprint RFF of the challenger, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a radio-frequency-fingerprint-based challenge-response authentication protocol method. A challenger communicates with a responder through a wireless medium, and the method comprises the following two stages, namely an initial stage and an operational stage, wherein the initial stage comprises the following steps that: the responder acquires a radio frequency signal of the challenger through the wireless medium and detects a challenger radio frequency fingerprint (RFF) in the signal, and the acquired challenger RFF is stored in a memory; and the operational stage comprises the following steps that: after receiving the radio frequency signal of the challenger and detecting the RFF in the signal, the responder reads the stored challenger RFF in the memory, and compares the RFF which is detected currently with the stored RFF, if the RFF which is detected currently is matched with the stored RFF, a protocol continues operating, and if the RFF which is detected currently is not matched with the stored RFF, the protocol stops operating. By the method, high-strength identity authentication of physical layer information of both communication parties is realized, majority of attacks such as pretending, replay, monitoring and denial of service which are cloned by a communication party can be resisted, and the method is favorable for avoiding the phenomena of secret key leakage and public detection.

Description

[0001] technical field [0002] The invention relates to wireless network communication technology, in particular to a challenge-response authentication protocol method based on radio frequency fingerprints. Background technique [0003] Because wireless networks rely on open air media for communication, there are many security risks and are vulnerable to attacks such as cloning, tampering, eavesdropping, impersonation, denial of service, desynchronization, and retransmission. One of the keys to the solution is to realize the high-intensity authentication of both communication parties. Traditional authentication is implemented based on cryptographic systems and security protocols, that is, the two parties to the communication rely on their own secrets and the information of both parties to conduct challenge and response interactions to verify whether the other party is a predetermined real entity. In recent years, non-cryptographic authentication technology using physic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/02
Inventor 袁红林包志华徐晨章国安杨永杰严燕朱海峰邵蔚季彦呈冯军黄勋蒋华孙强罗磊王伟李洪钧谢正光张晓格岳贤军沈学华
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products