{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T03:49:14Z","timestamp":1648957754379},"reference-count":27,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,3]]},"abstract":"<jats:p> Due to personal privacy, information security is a particularly important issue in wireless body area networks. Although current communication protocol has considered the security, there is still a risk that lapses in physical layer security may be a potential threat in wireless body area networks. In order to achieve the comprehensive security protection, in this article, we propose a cross-layer authentication approach, where the higher layer and physical layer are simultaneously considered. More specifically, different from current literatures, we exploit the sparse representation of the original signal as the basis of physical layer authentication, and a representative selection algorithm is presented to achieve the signal detection. Moreover, based on IEEE Standard 802.15.6, we give a feasible unite authentication scheme, in which physical layer strategy and higher layer strategy are combined to enhance the security of authentication. To verify the effectiveness of the proposed physical layer strategy, we conducted experiments and numerical simulations. Furthermore, the computational complexity of the proposed algorithm and the efficiency of the cross-layer approach are analyzed, respectively. Results showed that the proposed approach can significantly enhance the authentication and the complexity is acceptable (polynomial complexity). <\/jats:p>","DOI":"10.1177\/1550147717692587","type":"journal-article","created":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T10:20:55Z","timestamp":1489486855000},"page":"155014771769258","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A cross-layer approach to message authentication based on sparse representation for wireless body area networks"],"prefix":"10.1177","volume":"13","author":[{"given":"Ning","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Weiwei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Engineering, Hebei University of Engineering, Handan, China"}]},{"given":"Ting","family":"Jiang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2017,3,14]]},"reference":[{"key":"bibr1-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1007\/s12553-014-0083-x"},{"key":"bibr2-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"bibr3-1550147717692587","unstructured":"IEEE Standards Association. IEEE standard for local and metropolitan area networks-part 15.6: wireless body area networks (IEEE standard for information technology, IEEE 802.6). New York: IEEE, 2012, pp.1\u2013271."},{"key":"bibr4-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130913"},{"key":"bibr5-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.040"},{"key":"bibr6-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"bibr7-1550147717692587","first-page":"389","volume-title":"Proceedings of the 9th ACM symposium on information, computer and communications security","author":"Liu H"},{"key":"bibr8-1550147717692587","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.6.471-476"},{"key":"bibr9-1550147717692587","first-page":"538","volume-title":"Proceedings of the 2011-MILCOM 2011 military communications conference","author":"Liu FJ"},{"key":"bibr10-1550147717692587","first-page":"4646","volume-title":"Proceedings of the 2007 IEEE international conference on communications","author":"Xiao L"},{"key":"bibr11-1550147717692587","first-page":"1","volume-title":"Proceedings of the global telecommunications conference (GLOBECOM 2010)","author":"Xiao L"},{"key":"bibr12-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130912"},{"key":"bibr13-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"bibr14-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081544"},{"key":"bibr15-1550147717692587","first-page":"642","volume-title":"Proceedings of the 42nd annual conference on information sciences and systems (CISS 2008)","author":"Xiao L"},{"key":"bibr16-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2535442"},{"key":"bibr17-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"bibr18-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.253"},{"key":"bibr19-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.910281"},{"key":"bibr20-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"bibr21-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909108"},{"key":"bibr22-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.852206"},{"key":"bibr23-1550147717692587","volume-title":"Principal component analysis","author":"Jolliffe I.","year":"2002"},{"issue":"285","key":"bibr24-1550147717692587","first-page":"23","volume":"11","author":"Otsu N.","year":"1975","journal-title":"Automatica"},{"key":"bibr25-1550147717692587","volume-title":"Fundamentals of statistical signal processing, volume II: detection theory","author":"Kay SM.","year":"2011"},{"key":"bibr26-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2005.860075"},{"key":"bibr27-1550147717692587","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450037906X"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717692587","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717692587","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717692587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T17:37:03Z","timestamp":1610645823000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717692587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["10.1177\/1550147717692587"],"URL":"https:\/\/doi.org\/10.1177\/1550147717692587","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}