A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

被引:2
作者
Meng, Rui [1 ]
Xu, Bingxuan [1 ]
Xu, Xiaodong [1 ,2 ]
Sun, Mengying [1 ]
Wang, Bizhu [1 ]
Han, Shujun [1 ]
Lv, Suyu [3 ]
Zhang, Ping [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Peng Cheng Lab, Dept Broadband Commun, Shenzhen 518066, Guangdong, Peoples R China
[3] Beijing Univ Technol, Sch Informat Sci & Technol, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Physical-layer authentication; Machine learning; Identity security; FREQUENCY FINGERPRINT IDENTIFICATION; AUTOMATIC MODULATION CLASSIFICATION; EMITTER IDENTIFICATION; OPEN-SET; SPOOFING DETECTION; DATA AUGMENTATION; RF FINGERPRINTS; NEURAL-NETWORKS; CHANNEL; SECURITY;
D O I
10.1016/j.jnca.2024.104085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.
引用
收藏
页数:36
相关论文
共 277 条
[1]  
3GPP, 2020, Tech. Rep. TR 38.901 V16.1.0
[2]  
3GPP, 2020, Technical Specification (TS) 3GPP TS 33.501 V17. 0.0 (2020-2012)
[3]   Enhanced Authentication Based on Angle of Signal Arrivals [J].
Abdelaziz, Amr ;
Burton, Ron ;
Barickman, Frank ;
Martin, John ;
Weston, Josh ;
Koksal, Can Emre .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :4602-4614
[4]  
Abdrabou Mohammed, 2022, 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), P277, DOI 10.1109/COMNETSAT56033.2022.9994421
[5]   Adaptive Physical Layer Authentication Using Machine Learning With Antenna Diversity [J].
Abdrabou, Mohammed ;
Gulliver, T. Aaron .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (10) :6604-6614
[6]  
Agadakos I, 2019, Arxiv, DOI arXiv:1909.08703
[7]   Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting [J].
Agadakos, Ioannis ;
Agadakos, Nikolaos ;
Polakis, Jason ;
Amer, Mohamed R. .
2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, :322-338
[8]   Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks [J].
Ahmed, Amjed Abbas ;
Hasan, Mohammad Kamrul ;
Memon, Imran ;
Aman, Azana Hafizah Mohd ;
Islam, Shayla ;
Gadekallu, Thippa Reddy ;
Memon, Sufyan Ali .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) :3951-3959
[9]  
Al-Shawabka A, 2020, IEEE INFOCOM SER, P646, DOI [10.1109/infocom41043.2020.9155259, 10.1109/INFOCOM41043.2020.9155259]
[10]  
Alkhateeb A, 2019, Arxiv, DOI [arXiv:1902.06435, DOI 10.48550/ARXIV.1902.06435]