Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications

被引:12
作者
Yoon, Jiseok [1 ]
Lee, Younggu [2 ]
Hwang, Euiseok [1 ]
机构
[1] Gwangju Inst Sci & Tech, Sch Mechatron, Gwangju, South Korea
[2] Gwangju Inst Sci & Tech, Res Inst Solar & Sustainable Energies, Gwangju, South Korea
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE | 2019年
关键词
physical layer authentication; machine learning; feature selection; neighborhood component analysis;
D O I
10.1109/ictc46691.2019.8939862
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a machine learning (ML)based physical layer authentication scheme in the multi-input multi-output (MIMO) wireless communication environment. In the proposed scheme, a neighborhood component analysis (NCA) based feature selection method is imployed to improve authentication performance. In particular, NCA based selection mitigates performance degradation even in the worst case scenario, where an intruder replaces the legitimate transmitter by using the feature selection. The selected features are classified using a radial basis function (RBF) kernel-based support vector machine (SVM). Through simulation results, it is shown that the proposed scheme obtains better authentication performance compared to the conventional approaches. Furthermore, it can achieve the average of area under the receiver operating characteristic curve of 0.9965 or higher even for worst cases of authentication scenarios.
引用
收藏
页码:63 / 65
页数:3
相关论文
共 11 条
[1]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[2]  
Gibbons J. D., 2011, Nonparametric Statistical Inference, DOI DOI 10.1007/978-3-642-04898-2_420
[3]   A Unified Approach for Compression and Authentication of Smart Meter Reading in AMI [J].
Lee, Yonggu ;
Hwang, Euiseok ;
Choi, Jinho .
IEEE ACCESS, 2019, 7 :34383-34394
[4]  
Liu H, 2008, CH CRC DATA MIN KNOW, P3
[5]  
Maas D., 2012, 2012 4 INT C COMM SY
[6]  
Marsaglia G., 2003, J STAT SOFTW, V8, DOI [DOI 10.18637/JSS.V008.I18, 10.18637/jss.v008.i18]
[7]  
Pei C., 2014, 2014 IEEE GLOB COMM
[8]   PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS: A TUTORIAL [J].
Shiu, Yi-Sheng ;
Chang, Shih Yu ;
Wu, Hsiao-Chun ;
Huang, Scott C. -H. ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2011, 18 (02) :66-74
[9]   Physical-Layer Authentication Based on Extreme Learning Machine [J].
Wang, Ning ;
Jiang, Ting ;
Lv, Shichao ;
Xiao, Liang .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) :1557-1560
[10]  
Wang X., 2014, IEEE COMMUNICATIONS