Game-theoretic physical layer authentication for spoofing detection in internet of things

被引:6
|
作者
Wu, Yue [1 ]
Jing, Tao [1 ]
Gao, Qinghe [1 ]
Wu, Yingzhen [1 ]
Huo, Yan [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Game theory; Physical layer authentication; Nash equilibrium; Spoofing detection; OPTIMIZATION; SECURITY; ATTACKS; GAIN;
D O I
10.1016/j.dcan.2022.12.016
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
引用
收藏
页码:1394 / 1404
页数:11
相关论文
共 50 条
  • [41] A linguistic/game-theoretic approach to detection/explanation of propaganda
    Barfar, Arash
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
  • [42] A game-theoretic approach to credit card fraud detection
    Vatsa, V
    Sural, S
    Majumdar, AK
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 263 - 276
  • [43] A Game-Theoretic Approach for Community Detection in Signed Networks
    Wang, Shuaihui
    Hu, Guyu
    Pan, Zhisong
    Zhang, Jin
    Li, Dong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (06) : 796 - 807
  • [44] A Game-Theoretic Approach for Threats Detection and Intervention in Surveillance
    Ma, Wenjun
    Liu, Weiru
    Miller, Paul
    Luo, Xudong
    AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, : 1565 - 1566
  • [45] Game-Theoretic Lightweight Autoencoder Design for Intrusion Detection
    Rheey, Joohong
    Park, Hyunggon
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [46] A Game-Theoretic Approach to Sequential Detection in Adversarial Environments
    Zhang, Ruizhi
    Zou, Shaofeng
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1153 - 1158
  • [47] Game-Theoretic Resilience Analysis of Cyber-Physical Systems
    He, Fei
    Zhuang, Jun
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    Yau, David K. Y.
    2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), 2013, : 90 - 95
  • [48] Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices
    Khan, Saud
    Thapa, Chandra
    Durrani, Salman
    Camtepe, Seyit
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11312 - 11326
  • [49] Physical-Layer Authentication Based on Hierarchical Variational Autoencoder for Industrial Internet of Things
    Meng, Rui
    Xu, Xiaodong
    Wang, Bizhu
    Sun, Hao
    Xia, Shida
    Han, Shujun
    Zhang, Ping
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 2528 - 2544
  • [50] Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy
    Baldini, Gianmarco
    Giuliani, Raimondo
    Steri, Gary
    Neisse, Ricardo
    2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 367 - 372