Channel Prediction-Based Security Authentication for Artificial Intelligence of Things

被引:0
作者
Qiu, Xiaoying [1 ]
Yu, Jinwei [2 ]
Zhuang, Wenying [1 ]
Li, Guangda [1 ]
Sun, Xuan [1 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Informat & Management, Beijing 100192, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
关键词
artificial intelligence of things; edge computing; security authentication; intrusion detection; SPOOFING ATTACK DETECTION; KEY GENERATION SCHEME; PRIVACY; 6G; ARCHITECTURE;
D O I
10.3390/s23156711
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky-Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%.
引用
收藏
页数:18
相关论文
共 45 条
  • [1] Adversarial Attacks Against IoT Networks using Conditional GAN based Learning
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    Amhoud, El Mehdi
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2788 - 2793
  • [2] Candell R., 2016, NISTTech. Rep, DOI [10.18434/T44S3N, DOI 10.18434/T44S3N]
  • [3] Attack Detection and Mitigation in MEC-Enabled 5G Networks for AIoT
    Cheng S.-M.
    Hong B.-K.
    Hung C.-F.
    [J]. IEEE Internet of Things Magazine, 2022, 5 (03): : 76 - 81
  • [4] Lightweight Flexible Group Authentication Utilizing Historical Collaboration Process Information
    Fang, He
    Xiao, Zhenlong
    Wang, Xianbin
    Al-Dhahir, Naofal
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (04) : 2260 - 2273
  • [5] Lightweight Group Authentication for Decentralized Edge Collaboration
    Fang, He
    Wang, Xianbin
    Tomasin, Stefano
    Al-Dhahir, Naofal
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (12) : 124 - 129
  • [6] Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems
    Ferdowsi, Aidin
    Saad, Walid
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 1371 - 1387
  • [7] Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks
    Gao, Ning
    Qin, Zhijin
    Jing, Xiaojun
    Ni, Qiang
    Jin, Shi
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 569 - 581
  • [8] Physical layer authentication under intelligent spoofing in wireless sensor networks
    Gao, Ning
    Ni, Qiang
    Feng, Daquan
    Jing, Xiaojun
    Cao, Yue
    [J]. SIGNAL PROCESSING, 2020, 166
  • [9] Joint Channel Estimation and Coding Over Channels With Memory Using Polar Codes
    Ghaddar, Nadim
    Kim, Young-Han
    Milstein, Laurence B.
    Ma, Liangping
    Yi, Byung K.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (10) : 6575 - 6589
  • [10] A Lightweight Key Generation Scheme for the Internet of Things
    Guo, Dengke
    Cao, Kuo
    Xiong, Jun
    Ma, Dongtang
    Zhao, Haitao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 12137 - 12149