Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems

被引:94
作者
Ferdowsi, Aidin [1 ]
Saad, Walid [1 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Wireless VT, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
Authentication; security; massive Internet of Things systems; deep learning; game theory; CLOUD;
D O I
10.1109/TCOMM.2018.2878025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secure signal authentication is arguably one of the most challenging problems in the Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to man-in-the-middle and data-injection attacks. In this paper, a novel watermarking algorithm is proposed for dynamic authentication of IoT signals to detect cyber-attacks. The proposed watermarking algorithm, based on a deep learning long short-term memory structure, enables the IoT devices (IoTDs) to extract a set of stochastic features from their generated signal and dynamically watermark these features into the signal. This method enables the IoT gateway, which collects signals from the IoTDs, to effectively authenticate the reliability of the signals. Moreover, in massive IoT scenarios, since the gateway cannot authenticate all of the IoTDs simultaneously due to computational limitations, a game-theoretic framework is proposed to improve the gateway's decision making process by predicting vulnerable IoTDs. The mixed-strategy Nash equilibrium (MSNE) for this game is derived, and the uniqueness of the expected utility at the equilibrium is proven. In the massive IoT system, due to the large set of available actions for the gateway, the MSNE is shown to be analytically challenging to derive, and thus, a learning algorithm that converges to the MSNE is proposed. Moreover, in order to handle incomplete information scenarios, in which the gateway cannot access the state of the unauthenticated IoTDs, a deep reinforcement learning algorithm is proposed to dynamically predict the state of unauthenticated IoTDs and allow the gateway to decide on which IoTDs to authenticate. Simulation results show that with an attack detection delay of under 1 s, the messages can be transmitted from IoTDs with an almost 100% reliability. The results also show that by optimally predicting the set of vulnerable IoTDs, the proposed deep reinforcement learning algorithm reduces the number of compromised IoTDs by up to 30%, compared to an equal probability baseline.
引用
收藏
页码:1371 / 1387
页数:17
相关论文
共 41 条
[1]  
Aazam M, 2014, INT BHURBAN C APPL S, P414, DOI 10.1109/IBCAST.2014.6778179
[2]   Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things [J].
Abuzainab, Nof ;
Saad, Walid ;
Hong, Choong Seon ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (12) :7687-7702
[3]  
Ali S., 2018, FAST UPLINK GRANT MA
[4]   Game Theory for Networks [J].
Bacci, Giacomo ;
Lasaulce, Samson ;
Saad, Walid ;
Sanguinetti, Luca .
IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (01) :94-119
[5]  
Basar T., 1998, Dynamic Noncooperative Game Theory
[6]   Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags [J].
Bertoncini, Crystal ;
Rudd, Kevin ;
Nousain, Bryan ;
Hinders, Mark .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) :4843-4850
[7]   Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks [J].
Butun, Ismail ;
Erol-Kantarci, Melike ;
Kantarci, Burak ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :47-53
[8]   Proactive Resource Management for LTE in Unlicensed Spectrum: A Deep Learning Perspective [J].
Challita, Ursula ;
Dong, Li ;
Saad, Walid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4674-4689
[9]  
Chen M., 2017, Machine learning for wireless networks with artificial intelligence: A tutorial on neural networks
[10]  
Da Xu L., 2014, IEEE Transactions on industrial informatics, V10, P2233, DOI [DOI 10.1109/TII.2014.2300753, 10.1109/TII.2014.2300753]