PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

被引:213
作者
Xiao, Liang [1 ,2 ]
Li, Yan [1 ]
Han, Guoan [1 ]
Liu, Guolong [1 ]
Zhuang, Weihua [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing 100093, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Game theory; PHY-layer authentication; reinforcement learning; spoofing detection; PHYSICAL-LAYER; AUTHENTICATION; GAME;
D O I
10.1109/TVT.2016.2524258
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the PHY-layer authentication that exploits radio channel information (such as received signal strength indicators) to detect spoofing attacks in wireless networks. The interactions between a legitimate receiver and spoofers are formulated as a zero-sum authentication game. The receiver chooses the test threshold in the hypothesis test to maximize its utility based on the Bayesian risk in the spoofing detection, whereas the spoofers determine their attack frequencies to minimize the utility of the receiver. The Nash equilibrium of the static authentication game is derived, and its uniqueness is discussed. We also investigate a repeated PHY-layer authentication game for a dynamic radio environment. As it is challenging for the radio nodes to obtain the exact channel parameters in advance, we propose spoofing detection schemes based on Q-learning and Dyna-Q, which achieve the optimal test threshold in the spoofing detection via reinforcement learning. We implement the PHY-layer spoofing detectors over universal software radio peripherals and evaluate their performance via experiments in indoor environments. Both simulation and experimental results have validated the efficiency of the proposed strategies.
引用
收藏
页码:10037 / 10047
页数:11
相关论文
共 24 条
[1]  
[Anonymous], 1991, Game Theory
[2]   CR-Honeynet: A learning & decoy based Sustenance Mechanism Against Jamming Attack in CRN [J].
Bhunia, Suman ;
Sengupta, Shamik ;
Vazquez-Abad, Felisa .
2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, :1173-1180
[3]   Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks [J].
Conley, William G. ;
Miller, Adam J. .
2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, :1176-1182
[4]   RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks [J].
Dong, Mianxiong ;
Ota, Kaoru ;
Li, He ;
Du, Suguo ;
Zhu, Haojin ;
Guo, Song .
COMPUTING, 2014, 96 (10) :995-1010
[5]  
Gwon Y, 2013, IEEE CONF COMM NETW, P28, DOI 10.1109/CNS.2013.6682689
[6]   Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets [J].
Hou, Weikun ;
Wang, Xianbin ;
Chouinard, Jean-Yves ;
Refaey, Ahmed .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (05) :1658-1667
[7]  
Jiang ZP, 2013, IEEE INFOCOM SER, P2544
[8]  
Kalamandeen Andre., 2010, Proc. of MobiSys '10, P331, DOI DOI 10.1145/1814433.1814466
[9]  
Liu FJ, 2013, IEEE ICC, P4724, DOI 10.1109/ICC.2013.6655319
[10]  
Liu FJZ, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P538, DOI 10.1109/MILCOM.2011.6127727