Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm

被引:18
作者
Chen, Songlin [1 ]
Wen, Hong [1 ]
Wu, Jinsong [2 ]
Chen, Jie [1 ]
Lin, Wenjie [1 ]
Hu, Lin [3 ]
Chen, Yi [1 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Sichuan, Peoples R China
[2] Univ Chile, Dept Elect Engn, Santiago 8330072, Chile
[3] Chong Qing Univ Post & Telecommun China, Chongqing Key Lab Mobile Commun Technol, Chongqing, Peoples R China
基金
国家重点研发计划;
关键词
WIRELESS NETWORKS; ENHANCEMENT; INTERNET; THINGS;
D O I
10.1155/2018/6039878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By utilizing the radio channel information to detect spoofing attacks, channel based physical layer (PHY-layer) enhanced authentication can be exploited in light-weight securing 5G wireless communications. One major obstacle in the application of the PHY-layer authentication is its detection rate. In this paper, a novel authentication method is developed to detect spoofing attacks without a special test threshold while a trained model is used to determine whether the user is legal or illegal. Unlike the threshold test PHY-layer authenticationmethod, the proposed AdaBoost based PHY-layer authentication algorithm increases the authentication rate with one-dimensional test statistic feature. In addition, a two-dimensional test statistic features authentication model is presented for further improvement of detection rate. To evaluate the feasibility of our algorithm, we implement the PHY-layer spoofing detectors in multiple-input multiple-output (MIMO) system over universal software radio peripherals (USRP). Extensive experiences show that the proposed methods yield the high performance without compromising the computing complexity.
引用
收藏
页数:10
相关论文
共 25 条
[1]   Next Generation 5G Wireless Networks: A Comprehensive Survey [J].
Agiwal, Mamta ;
Roy, Abhishek ;
Saxena, Navrati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1617-1655
[2]  
[Anonymous], P 2006 INT S WORLD W
[3]   SPONGENT: The Design Space of Lightweight Cryptographic Hashing [J].
Bogdanov, Andrey ;
Knezevic, Miroslav ;
Leander, Gregor ;
Toz, Deniz ;
Varici, Kerem ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (10) :2041-2053
[4]   Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G [J].
Chen S. ;
Hu J. ;
Shi Y. ;
Peng Y. ;
Fang J. ;
Zhao R. ;
Zhao L. .
IEEE Communications Standards Magazine, 2017, 1 (02) :70-76
[5]   Detecting and localizing wireless spoofing attacks [J].
Chen, Yingying ;
Trappe, Wade ;
Martin, Richard P. .
2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, :193-+
[6]  
Faria D., 2006, PROC ACM WORKSHOP WI, P43
[7]   Additive logistic regression: A statistical view of boosting - Rejoinder [J].
Friedman, J ;
Hastie, T ;
Tibshirani, R .
ANNALS OF STATISTICS, 2000, 28 (02) :400-407
[8]   Greedy function approximation: A gradient boosting machine [J].
Friedman, JH .
ANNALS OF STATISTICS, 2001, 29 (05) :1189-1232
[9]  
Hao P, 2013, 2013 13TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), P44, DOI 10.1109/CWIT.2013.6621590
[10]   Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers [J].
Hu, Lin ;
Wen, Hong ;
Wu, Bin ;
Tang, Jie ;
Pan, Fei ;
Liao, Run-Fa .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (03) :2108-2117