Identification of Active Attacks in Internet of Things: Joint Model- and Data-Driven Automatic Modulation Classification Approach

被引:46
作者
Huang, Sai [1 ]
Lin, Chunsheng [1 ]
Xu, Wenjun [1 ]
Gao, Yue [2 ]
Feng, Zhiyong [1 ]
Zhu, Fusheng [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing 100876, Peoples R China
[2] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[3] Guangdong Commun & Networks Inst, Guangzhou 510700, Guangdong, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Feature extraction; Modulation; Machine learning; Internet of Things; Jamming; Training; Reliability; Automatic modulation classification (AMC); cyclic correntropy spectral density; deep learning (DL); Internet of Things (IoT); physical-layer security;
D O I
10.1109/JIOT.2020.3016125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) pervades every aspect of our daily lives and industrial productions since billions of interconnected devices are deployed everywhere of the globe. However, the seamless IoT unveils a number of physical-layer threats, such as jamming and spoofing that decrease the communication performance and the reliability of the IoT systems. As the process of identifying the modulation format of signals corrupted by noise and fading, automatic modulation classification (AMC) plays a vital role in physical-layer security as it can detect and identify the pilot jamming, deceptive jamming, and sybil attacks. In this article, we propose a novel cyclic correntropy vector (CCV)-based AMC method using long short-term memory densely connected network (LSMD). Specifically, cyclic correntropy model-driven feature CCV is first extracted using the received signals as it contains both the second-order and the higher order characteristics of cyclostationary. Then, the extracted CCV feature is put into the data-driven LSMD which mainly consists of long short-term memory (LSTM) network and dense network (DenseNet). Moreover, an additive cosine loss is utilized to train the LSMD for maximizing the interclass feature differences and minimizing the intraclass feature variations. Simulations demonstrate that the proposed CCV-LSMD method yields superior performance than other recent schemes.
引用
收藏
页码:2051 / 2065
页数:15
相关论文
共 58 条
  • [1] Applications of Blockchains in the Internet of Things: A Comprehensive Survey
    Ali, Muhammad Salek
    Vecchio, Massimo
    Pincheira, Miguel
    Dolui, Koustabh
    Antonelli, Fabio
    Rehmani, Mubashir Husain
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1676 - 1717
  • [2] [Anonymous], 2016, 2016 IEEE INT C COMM
  • [3] [Anonymous], 2008, 2008 4 INT C WIR COM
  • [4] Automatic Modulation Classification Using Combination of Genetic Programming and KNN
    Aslam, Muhammad Waqar
    Zhu, Zhechen
    Nandi, Asoke Kumar
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (08) : 2742 - 2750
  • [5] Deep Learning-Based Multiple Object Visual Tracking on Embedded System for IoT and Mobile Edge Computing Applications
    Blanco-Filgueira, Beatriz
    Garcia-Lesta, Daniel
    Fernandez-Sanjurjo, Mauro
    Manuel Brea, Victor
    Lopez, Paula
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5423 - 5431
  • [6] Survey of automatic modulation classification techniques: classical approaches and new trends
    Dobre, O. A.
    Abdi, A.
    Bar-Ness, Y.
    Su, W.
    [J]. IET COMMUNICATIONS, 2007, 1 (02) : 137 - 156
  • [7] A Survey on the Application of Genetic Programming to Classification
    Espejo, Pedro G.
    Ventura, Sebastian
    Herrera, Francisco
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (02): : 121 - 144
  • [8] Cyclostationary correntropy: Definition and applications
    Fontes, Aluisio I. R.
    Rego, Joilson B. A.
    Martins, Allan de M.
    Silveira, Luiz F. Q.
    Principe, J. C.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 69 : 110 - 117
  • [9] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
    Fragkiadakis, Alexandros G.
    Tragos, Elias Z.
    Askoxylakis, Ioannis G.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 428 - 445
  • [10] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312