Authenticating Mobile Wireless Device Through Per-packet Channel State Information

被引:3
作者
Chen, Bing [1 ,2 ,3 ,4 ]
Song, Yubo [1 ,3 ,4 ]
Zhu, Zhenchao [1 ,3 ,4 ]
Gao, Shang [5 ]
Wang, Junbo [2 ,4 ]
Hu, Aiqun [2 ,4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Southeast Univ, Sch Informat Sci & Engn, Nanjing, Peoples R China
[3] Key Lab Comp Network Technol Jiangsu Prov, Nanjing, Peoples R China
[4] Purple Mt Labs, Nanjing, Peoples R China
[5] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
来源
51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN-W 2021) | 2021年
关键词
Packet-level mobile device authentication; channel state information; physical layer signature; autoencoder; ensemble learning;
D O I
10.1109/DSN-W52860.2021.00024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Non-cryptographic mobile wireless device authentication based on channel signature has aroused extensive attention. This technology uses the mobile device's physical characteristics to mark and verify its identity, and can be used to detect impersonation attacks and information forgery attacks. Channel State Information (CSI) has been used to generate fine-grained channel signatures. However, there are two sticking points in using CSI-based signature for authentication in association phase. The first is that the channel state will change as the device moves, which means that the local authenticator should be updated in real time to adapts to the latest channel state. The second is that the time complexity of authentication should be small enough to do packet-level authentication in association phase and detect attackers in time. In this paper, we propose a CSI-based authentication scheme, which can authenticate mobile devices at the packet level. Further, we provide an packet-level authentication framework based on neural networks. It uses a simple real-time authenticator update method to keep the authenticator valid. What's more, an ensemble of small-scale autoencoders are used to build the authenticator. It has been shown to significantly reduce the authentication's time complexity while maintaining the accuracy, providing the possibility for packet-level authentication. The evaluation shows that the packet-level framework can authenticate legitimate mobile devices with 95.19% accuracy and filter out attackers with even greater accuracy, which has higher time efficiency than traditional large-scale neural networks.
引用
收藏
页码:78 / 84
页数:7
相关论文
共 13 条
[1]   A Survey of Self Organisation in Future Cellular Networks [J].
Aliu, Osianoh Glenn ;
Imran, Ali ;
Imran, Muhammad Ali ;
Evans, Barry .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :336-361
[2]   Z-IOT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices [J].
Babun, Leonardo ;
Aksu, Hidayet ;
Ryan, Lucas ;
Akkaya, Kemal ;
Bentley, Elizabeth S. ;
Uluagac, A. Selcuk .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[3]  
Germain K. S., 2020, arXiv preprint arXiv:2006.03695, P1
[4]   Decoding Neural Responses in Mouse Visual Cortex through a Deep Neural Network [J].
Iqbal, Asim ;
Dong, Phil ;
Kim, Christopher M. ;
Jang, Heeun .
2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
[5]   Authenticating Users Through Fine-Grained Channel Information [J].
Liu, Hongbo ;
Wang, Yan ;
Liu, Jian ;
Yang, Jie ;
Chen, Yingying ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (02) :251-264
[6]  
RazaCheema A., 2018, 2018 IEEE Canadian Conference on Electrical Computer Engineering (CCECE), P1, DOI 10.1109/CCECE.2018.8447756
[7]  
Runfa Liao, 2019, 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), P231, DOI 10.1109/ICAICA.2019.8873460
[8]  
Song R, 2018, IEEE GLOB COMM CONF
[9]   Release the Kraken: New KRACKs in the 802.11 Standard [J].
Vanhoef, Mathy ;
Piessens, Frank .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :299-314
[10]   Physical-Layer Authentication Using Multiple Channel-Based Features [J].
Xie, Ning ;
Chen, Junjie ;
Huang, Lei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :2356-2366