A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

被引:1
作者
Meng, Rui [1 ]
Xu, Bingxuan [1 ]
Xu, Xiaodong [1 ,2 ]
Sun, Mengying [1 ]
Wang, Bizhu [1 ]
Han, Shujun [1 ]
Lv, Suyu [3 ]
Zhang, Ping [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Peng Cheng Lab, Dept Broadband Commun, Shenzhen 518066, Guangdong, Peoples R China
[3] Beijing Univ Technol, Sch Informat Sci & Technol, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Physical-layer authentication; Machine learning; Identity security; FREQUENCY FINGERPRINT IDENTIFICATION; AUTOMATIC MODULATION CLASSIFICATION; EMITTER IDENTIFICATION; OPEN-SET; SPOOFING DETECTION; DATA AUGMENTATION; RF FINGERPRINTS; NEURAL-NETWORKS; CHANNEL; SECURITY;
D O I
10.1016/j.jnca.2024.104085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.
引用
收藏
页数:36
相关论文
共 50 条
  • [41] Physical-Layer Authentication Based on Hierarchical Variational Autoencoder for Industrial Internet of Things
    Meng, Rui
    Xu, Xiaodong
    Wang, Bizhu
    Sun, Hao
    Xia, Shida
    Han, Shujun
    Zhang, Ping
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 2528 - 2544
  • [42] Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
    Chen, Yi
    Wen, Hong
    Wu, Jinsong
    Song, Huanhuan
    Xu, Aidong
    Jiang, Yixin
    Zhang, Tengyue
    Wang, Zhen
    SENSORS, 2019, 19 (08):
  • [43] Machine learning for wireless communications in the Internet of Things: A comprehensive survey
    Jagannath, Jithin
    Polosky, Nicholas
    Jagannath, Anu
    Restuccia, Francesco
    Melodia, Tommaso
    AD HOC NETWORKS, 2019, 93
  • [44] Machine learning-based physical layer security: techniques, open challenges, and applications
    Anil Kumar Kamboj
    Poonam Jindal
    Pankaj Verma
    Wireless Networks, 2021, 27 : 5351 - 5383
  • [45] A survey on machine learning-based routing for VLSI physical design
    Li, Lin
    Cai, Yici
    Zhou, Qiang
    INTEGRATION-THE VLSI JOURNAL, 2022, 86 : 51 - 56
  • [46] Physical Layer Authentication Techniques based on Machine Learning with Data Compression
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [47] Physical-Layer Authentication via a Dynamic Scaling
    LI Min
    JIANG Shaoquan
    LIAO Yongjian
    Chinese Journal of Electronics, 2020, 29 (04) : 651 - 659
  • [48] Intrinsic Physical-Layer Authentication of Integrated Circuits
    Cobb, William E.
    Laspe, Eric D.
    Baldwin, Rusty O.
    Temple, Michael A.
    Kim, Yong C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 14 - 24
  • [49] A Channel Coding Approach for Physical-Layer Authentication
    Wu, Xiaofu
    Ling, Cong
    2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,
  • [50] Uniquely Decodable Codes for Physical-Layer Network Coding in Wireless Cooperative Communications
    Yu, Qi-Yue
    Li, Ya-Tian
    Meng, Wei-Xiao
    Xiang, Wei
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3956 - 3967