Physical-Layer Authentication Based on Extreme Learning Machine

被引:82
作者
Wang, Ning [1 ]
Jiang, Ting [1 ]
Lv, Shichao [2 ]
Xiao, Liang [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Universal Wireless Commun, Beijing 100088, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing 100864, Peoples R China
[3] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical layer authentication; wireless security; extreme learning machine; SPOOFING DETECTION;
D O I
10.1109/LCOMM.2017.2690437
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most physical-layer authentication techniques use hypothesis tests to compare the radio channel information with the channel record of Alice to detect spoofer Eve in wireless networks. However, the test threshold in the hypothesis test is not always available, especially in dynamic networks. In this letter, we propose a physical-layer authentication scheme based on extreme learning machine that exploit multi-dimensional characters of radio channels and use the training data generated from the spoofing model to improve the spoofing detection accuracy. Simulation results show that our proposed technique can significantly improve the authentication accuracy compared with the state-of-the-art method.
引用
收藏
页码:1557 / 1560
页数:4
相关论文
共 10 条
  • [1] [Anonymous], MATH STAT 2
  • [2] Semi-Supervised and Unsupervised Extreme Learning Machines
    Huang, Gao
    Song, Shiji
    Gupta, Jatinder N. D.
    Wu, Cheng
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (12) : 2405 - 2417
  • [3] Jakes W. C., 1994, Microwave Mobile Communications
  • [4] Wireless User Authentication via Comparison of Power Spectral Densities
    Tugnait, Jitendra K.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1791 - 1802
  • [5] Wan XY, 2017, IEEE ICC
  • [6] Wang XB, 2016, IEEE COMMUN MAG, V54, P151
  • [7] Game Theoretic Study on Channel-Based Authentication in MIMO Systems
    Xiao, Liang
    Chen, Tianhua
    Han, Guoan
    Zhuang, Weihua
    Sun, Limin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) : 7474 - 7484
  • [8] PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
    Xiao, Liang
    Li, Yan
    Han, Guoan
    Liu, Guolong
    Zhuang, Weihua
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 10037 - 10047
  • [9] Channel-Based Spoofing Detection in Frequency-Selective Rayleigh Channels
    Xiao, Liang
    Greenstein, Larry J.
    Mandayam, Narayan B.
    Trappe, Wade
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (12) : 5948 - 5956
  • [10] Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    Cheng, Jerry
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 44 - 58