Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

被引:69
作者
Liao, Run-Fa [1 ]
Wen, Hong [2 ]
Chen, Songlin [1 ]
Xie, Feiyi [1 ]
Pan, Fei [3 ]
Tang, Jie [2 ]
Song, Huanhuan [2 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Aeronaut & Astronaut, Chengdu 611731, Peoples R China
[3] Sichuan Agr Univ, Sch Informat & Engn, Yaan 625000, Peoples R China
关键词
Data augmentation; deep neural network (DNN); mobile-edge computing (MEC); physical (PHY) layer authentication; WIRELESS; EDGE; SECURITY;
D O I
10.1109/JIOT.2019.2960099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer authentication takes advantages of channel impulse response from wireless propagation to identify transmitted packages with low-resource consumption, and machine learning methods are effective ways to improve its implementation. However, the training of the machine-learning-based PHY-layer authentication requires a large number of training samples, which makes the training process time consuming and computationally resource intensive. In this article, we propose a data augmented multiuser PHY-layer authentication scheme to enhance the security of mobile-edge computing system, an emergent architecture in the Internet of Things (IoT). Three data augmentation algorithms are proposed to speed up the establishment of the authentication model and improve the authentication success rate. By combining the deep neural network with data augmentation methods, the performance of the proposed multiuser PHY-layer authentication scheme is improved and the training speed is accelerated, even with fewer training samples. Extensive simulations are conducted under the real industry IoT environment and the figures illustrate the effectiveness of our approach.
引用
收藏
页码:2077 / 2088
页数:12
相关论文
共 38 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]  
[Anonymous], 2006, INT J NETW SECURITY
[3]  
[Anonymous], MULT PROP PAR ITS CH
[4]  
Bishop C.M., 2006, Pattern recognition and machine learning
[5]  
Candell R., 2016, Tech. Rep. 1951, DOI [10.18434/T44S3N, DOI 10.18434/T44S3N]
[6]   Internet of Things Based Smart Grids Supported by Intelligent Edge Computing [J].
Chen, Songlin ;
Wen, Hong ;
Wu, Jinsong ;
Lei, Wenxin ;
Hou, Wenjing ;
Liu, Wenjie ;
Xu, Aidong ;
Jiang, Yixin .
IEEE ACCESS, 2019, 7 :74089-74102
[7]   Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks [J].
Chen, Yingying ;
Yang, Jie ;
Trappe, Wade ;
Martin, Richard P. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2418-2434
[8]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864
[9]   Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective [J].
Esposito, Christian ;
Castiglione, Aniello ;
Pop, Florin ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2017, 4 (02) :13-17
[10]   The statistical utilization of multiple measurements [J].
Fisher, RA .
ANNALS OF EUGENICS, 1938, 8 :376-386