A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

被引:2
作者
Meng, Rui [1 ]
Xu, Bingxuan [1 ]
Xu, Xiaodong [1 ,2 ]
Sun, Mengying [1 ]
Wang, Bizhu [1 ]
Han, Shujun [1 ]
Lv, Suyu [3 ]
Zhang, Ping [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Peng Cheng Lab, Dept Broadband Commun, Shenzhen 518066, Guangdong, Peoples R China
[3] Beijing Univ Technol, Sch Informat Sci & Technol, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Physical-layer authentication; Machine learning; Identity security; FREQUENCY FINGERPRINT IDENTIFICATION; AUTOMATIC MODULATION CLASSIFICATION; EMITTER IDENTIFICATION; OPEN-SET; SPOOFING DETECTION; DATA AUGMENTATION; RF FINGERPRINTS; NEURAL-NETWORKS; CHANNEL; SECURITY;
D O I
10.1016/j.jnca.2024.104085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.
引用
收藏
页数:36
相关论文
共 277 条
[31]  
CHOE HC, 1995, P SOC PHOTO-OPT INS, V2491, P504, DOI 10.1117/12.205415
[32]   Passive classification of wireless NICs during rate switching [J].
Corbett, Cherita L. ;
Beyah, Raheem A. ;
Copeland, John A. .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2008, 2008 (1)
[33]   Fingerprinting Smartphones Remotely via ICMP Timestamps [J].
Cristea, Marius ;
Groza, Bogdan .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (06) :1081-1083
[34]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564
[35]  
Dolatshahi S, 2010, CONF REC ASILOMAR C, P1553, DOI 10.1109/ACSSC.2010.5757798
[36]   SSRCNN: A Semi-Supervised Learning Framework for Signal Recognition [J].
Dong, Yihong ;
Jiang, Xiaohan ;
Cheng, Lei ;
Shi, Qingjiang .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (03) :780-789
[37]   Variational Mode Decomposition [J].
Dragomiretskiy, Konstantin ;
Zosso, Dominique .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (03) :531-544
[38]   Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios [J].
Du, Ruizhong ;
Zhen, Lin ;
Liu, Yan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) :6154-6164
[39]  
Dubendorfer CK, 2012, IEEE MILIT COMMUN C
[40]  
Elmaghbub A, 2020, Arxiv, DOI [arXiv:2004.11126, DOI 10.48550/ARXIV.2004.11126]