Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

被引:63
|
作者
Liao, Run-Fa [1 ]
Wen, Hong [2 ]
Chen, Songlin [1 ]
Xie, Feiyi [1 ]
Pan, Fei [3 ]
Tang, Jie [2 ]
Song, Huanhuan [2 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Aeronaut & Astronaut, Chengdu 611731, Peoples R China
[3] Sichuan Agr Univ, Sch Informat & Engn, Yaan 625000, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 03期
关键词
Data augmentation; deep neural network (DNN); mobile-edge computing (MEC); physical (PHY) layer authentication; WIRELESS; EDGE; SECURITY;
D O I
10.1109/JIOT.2019.2960099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer authentication takes advantages of channel impulse response from wireless propagation to identify transmitted packages with low-resource consumption, and machine learning methods are effective ways to improve its implementation. However, the training of the machine-learning-based PHY-layer authentication requires a large number of training samples, which makes the training process time consuming and computationally resource intensive. In this article, we propose a data augmented multiuser PHY-layer authentication scheme to enhance the security of mobile-edge computing system, an emergent architecture in the Internet of Things (IoT). Three data augmentation algorithms are proposed to speed up the establishment of the authentication model and improve the authentication success rate. By combining the deep neural network with data augmentation methods, the performance of the proposed multiuser PHY-layer authentication scheme is improved and the training speed is accelerated, even with fewer training samples. Extensive simulations are conducted under the real industry IoT environment and the figures illustrate the effectiveness of our approach.
引用
收藏
页码:2077 / 2088
页数:12
相关论文
共 50 条
  • [21] Generative Adversarial Network-Based Data Augmentation for Enhancing Wireless Physical Layer Authentication
    Alhoraibi, Lamia
    Alghazzawi, Daniyal
    Alhebshi, Reemah
    SENSORS, 2024, 24 (02)
  • [22] An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things
    Ye, Ning
    Zhu, Yan
    Wang, Ru-chuan
    Malekian, Reza
    Lin Qiao-min
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (04): : 1617 - 1624
  • [23] Internet of Things Data Analytics for User Authentication and Activity Recognition
    Batool, Samera
    Saqib, Nazar A.
    Khan, Muazzam A.
    2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2017, : 183 - 187
  • [24] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [25] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [26] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [27] On the Authentication of Devices in the Internet of Things
    Sharaf-Dabbagh, Yaman
    Saad, Walid
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [28] Improving the Physical Layer Security of the Internet of Things (IoT)
    Alsadi, Ali
    Mohan, Seshadri
    2018 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2018,
  • [29] Improving the Physical Layer Security of the Internet of Things (IoT)
    Alsadi, Ali
    Mohan, Seshadri
    2018 IEEE INTERNATIONAL SMART CITIES CONFERENCE (ISC2), 2018,
  • [30] Internet of Things and Wireless Physical Layer Security: A Survey
    Soni, Ankit
    Upadhyay, Raksha
    Jain, Anjana
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 115 - 123