Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

被引:69
作者
Liao, Run-Fa [1 ]
Wen, Hong [2 ]
Chen, Songlin [1 ]
Xie, Feiyi [1 ]
Pan, Fei [3 ]
Tang, Jie [2 ]
Song, Huanhuan [2 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Aeronaut & Astronaut, Chengdu 611731, Peoples R China
[3] Sichuan Agr Univ, Sch Informat & Engn, Yaan 625000, Peoples R China
关键词
Data augmentation; deep neural network (DNN); mobile-edge computing (MEC); physical (PHY) layer authentication; WIRELESS; EDGE; SECURITY;
D O I
10.1109/JIOT.2019.2960099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer authentication takes advantages of channel impulse response from wireless propagation to identify transmitted packages with low-resource consumption, and machine learning methods are effective ways to improve its implementation. However, the training of the machine-learning-based PHY-layer authentication requires a large number of training samples, which makes the training process time consuming and computationally resource intensive. In this article, we propose a data augmented multiuser PHY-layer authentication scheme to enhance the security of mobile-edge computing system, an emergent architecture in the Internet of Things (IoT). Three data augmentation algorithms are proposed to speed up the establishment of the authentication model and improve the authentication success rate. By combining the deep neural network with data augmentation methods, the performance of the proposed multiuser PHY-layer authentication scheme is improved and the training speed is accelerated, even with fewer training samples. Extensive simulations are conducted under the real industry IoT environment and the figures illustrate the effectiveness of our approach.
引用
收藏
页码:2077 / 2088
页数:12
相关论文
共 38 条
[21]   Mobile-Edge Computing Architecture The role of MEC in the Internet of Things [J].
Sabella, Dario ;
Vaillant, Alessandro ;
Kuure, Pekka ;
Rauschenbach, Uwe ;
Giust, Fabio .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2016, 5 (04) :84-91
[22]   Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification [J].
Salamon, Justin ;
Bello, Juan Pablo .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (03) :279-283
[23]   Edge Computing: Vision and Challenges [J].
Shi, Weisong ;
Cao, Jie ;
Zhang, Quan ;
Li, Youhuizi ;
Xu, Lanyu .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :637-646
[24]   Mobile Edge Computing Potential in Making Cities Smarter [J].
Taleb, Tarik ;
Dutta, Sunny ;
Ksentini, Adlen ;
Iqbal, Muddesar ;
Flinck, Hannu .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :38-43
[25]   Physical-Layer Authentication Based on Extreme Learning Machine [J].
Wang, Ning ;
Jiang, Ting ;
Lv, Shichao ;
Xiao, Liang .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) :1557-1560
[26]   CSI-Based Fingerprinting for Indoor Localization: A Deep Learning Approach [J].
Wang, Xuyu ;
Gao, Lingjun ;
Mao, Shiwen ;
Pandey, Santosh .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (01) :763-776
[27]   Physical layer assist authentication technique for smart meter system [J].
Wen, Hong ;
Wang, Yifan ;
Zhu, Xiping ;
Li, Jianqiang ;
Zhou, Liang .
IET COMMUNICATIONS, 2013, 7 (03) :189-197
[28]   Data Augmentation Computing Model Based on Generative Adversarial Network [J].
Weng, Yu ;
Zhou, Haiwen .
IEEE ACCESS, 2019, 7 :64223-64233
[29]   Physical-Layer Authentication for Multi-Carrier Transmission [J].
Wu, Xiaofu ;
Yang, Zhen .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (01) :74-77
[30]   Using the physical layer for wireless authentication in time-variant channels [J].
Xiao, Liang ;
Greenstein, Larry J. ;
Mandayam, Narayan B. ;
Trappe, Wade .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (07) :2571-2579