Game Theoretic Spoofing Detection for Space Information Networks Using Physical Attributes

被引:2
作者
Abdrabou, Mohammed [1 ]
Gulliver, T. Aaron [2 ]
机构
[1] Tech Res Ctr, Cairo 11765, Egypt
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
Programmable logic arrays; Games; Satellite broadcasting; Satellites; Low earth orbit satellites; Authentication; Trajectory; Game theory; physical layer authentication (PLA); space information network (SIN); low Earth orbit (LEO) satellite; Doppler frequency spread (DS); received power (RP); sixth generation (6G) networks; LAYER SECURITY; AUTHENTICATION; SCHEME;
D O I
10.1109/TCOMM.2024.3370433
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Space information networks (SINs) have the potential to overcome the coverage and reliability limitations of cellular networks. As a result, SINs have received considerable attention as an enabling technology for sixth-generation (6G) networks to support global connectivity. SINs often employ a large number of low Earth orbit (LEO) satellites which are vulnerable to spoofing attacks. Thus, game theoretic physical layer authentication (PLA) based on Doppler frequency spread (DS) and received power (RP) attributes is proposed to provide effective authentication for these satellites. Hypothesis testing with a threshold is used to distinguish between legitimate and illegitimate (spoofer) satellites. Then, a zero-sum PLA game in which the ground station (GS) chooses the optimal detection threshold (tau*) to maximize its utility and a spoofing satellite (s) chooses the optimal attack probability (k*) to maximize its utility. Numerical results are presented to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:3947 / 3956
页数:10
相关论文
共 31 条
[1]  
Abdrabou Mohammed, 2022, 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), P289, DOI 10.1109/COMNETSAT56033.2022.9994445
[2]  
Abdrabou M. A., 2015, P INT C AER SCI AV T
[3]   Physical Layer Authentication for Satellite Communication Systems Using Machine Learning [J].
Abdrabou, Mohammed ;
Gulliver, T. Aaron .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :2380-2389
[4]  
Abdrabou MA, 2017, 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), P331, DOI 10.1109/ICENCO.2017.8289809
[5]   A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems [J].
Altaf, Izwa ;
Saleem, Muhammad Asad ;
Mahmood, Khalid ;
Kumari, Saru ;
Chaudhary, Pradeep ;
Chen, Chien-Ming .
IEEE ACCESS, 2020, 8 :46278-46287
[6]  
[Anonymous], 2009, Int. J. Satell. Commun. Netw., V27, P103
[7]  
[Anonymous], 2023, IEEE Open J. Veh.Technol., V4, P48
[8]  
[Anonymous], 2019, IEEE Internet Things J., V6, P5485
[9]   Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks [J].
Arain, Qasim Ali ;
Deng Zhongliang ;
Memon, Imran ;
Arain, Salman ;
Shaikh, Faisal Kareem ;
Zubedi, Asma ;
Unar, Mukhtiar Ali ;
Ashraf, Aisha ;
Shaikh, Roshan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) :505-521
[10]  
Ayg M.A, 2020, P IEEE INT C COMM DU