A LSTM-Based Channel Fingerprinting Method for Intrusion Detection

被引:6
|
作者
Ma, Ting [1 ]
Hu, Feng [2 ]
Ma, Maode [3 ]
机构
[1] Southwest Petroluem Univ, Sch Elect & Informat Engn, Chengdu, Peoples R China
[2] Suzhou Vocat Univ, Sch Elect & Informat Engn, Suzhou, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
关键词
LSTM; physical layer security; detection; 5G; new radio; PHYSICAL LAYER AUTHENTICATION;
D O I
10.1109/CSP51677.2021.9357494
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is a crucial issue for 5th generation (5G) access networks to securely support various services. Traditional cryptographic key-based solutions are not suitable for severe resources-constrained networks, such as the Internet of Things (IoT). In this paper, we propose a lightweight intrusion detection mechanism by exploring physical layer attributes that are unique and difficult to impersonate. Specifically, a long-short memory network (LSTM) is employed as an intelligent classifier to distinguish different transmitters based on channel state information (CSI) features. Then we develop a comprehensive 5G NR channel detection model based on LSTM under dynamic channel conditions to identify malicious attacks by intelligently analyzing CSI. The simulation results demonstrate that the proposed solution improves detection accuracy and successfully prevent systems from spoofing attacks.
引用
收藏
页码:113 / 116
页数:4
相关论文
共 50 条
  • [21] Fake News Detection on the Web: An LSTM-based Approach
    Vyas, Piyush
    Liu, Jun
    El-Gayar, Omar
    DIGITAL INNOVATION AND ENTREPRENEURSHIP (AMCIS 2021), 2021,
  • [22] An AutoEncoder and LSTM-Based Traffic Flow Prediction Method
    Wei, Wangyang
    Wu, Honghai
    Ma, Huadong
    SENSORS, 2019, 19 (13)
  • [23] LSTM-based spectral confocal signal processing method
    Wang, Yuhang
    Qin, Yufu
    Zhang, Tao
    Qin, Hao
    Wang, Jixiang
    Ding, Wanyun
    APPLIED OPTICS, 2024, 63 (28) : 7396 - 7401
  • [24] Method for LSTM-Based Cascade Hydropower Plant Scheduling
    Cai, Zhi
    Zhang, Guofang
    Lu, Yi
    Li, Yuxuan
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 140 - 144
  • [25] Hunting for Insider Threats Using LSTM-Based Anomaly Detection
    Villarreal-Vasquez, Miguel
    Modelo-Howard, Gaspar
    Dube, Simant
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 451 - 462
  • [26] LSTM-Based Anomaly Detection of Process Instances: Benchmark and Tweaks
    Lahann, Johannes
    Pfeiffer, Peter
    Fettke, Peter
    PROCESS MINING WORKSHOPS, ICPM 2022, 2023, 468 : 229 - 241
  • [27] An LSTM-based anomaly detection model for the deformation of concrete dams
    Liu, Changwei
    Pan, Jianwen
    Wang, Jinting
    STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL, 2024, 23 (03): : 1914 - 1925
  • [28] Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System
    Thakkar, Ankit
    Kikani, Nandish
    Geddam, Rebakah
    APPLIED SOFT COMPUTING, 2024, 154
  • [29] An LSTM-based novel near-real-time multiclass network intrusion detection system for complex cloud environments
    Vibhute, Amol D.
    Khan, Minhaj
    Kanade, Anuradha
    Patil, Chandrashekhar H.
    Gaikwad, Sandeep V.
    Patel, Kanubhai K.
    Saini, Jatinderkumar R.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (11):
  • [30] Sybil Attack Detection in VANETs: An LSTM-Based BiGAN Approach
    Zhong, Yongchao
    Yang, Haonan
    Li, Ying
    Yang, Bo
    Li, Xiaoqi
    Yue, Qiuling
    Hu, Jinglu
    Zhang, Yuqing
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 113 - 120