Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication

被引:59
作者
Liao, Run-Fa [1 ]
Wen, Hong [2 ]
Wu, Jinsong [3 ]
Pan, Fei [4 ]
Xu, Aidong [4 ,5 ]
Song, Huanhuan [2 ]
Xie, Feiyi [1 ]
Jiang, Yixin [5 ]
Cao, Minggui [2 ]
机构
[1] UESTC, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Sichuan, Peoples R China
[2] UESTC, Sch Aeronaut & Astronaut, Chengdu 611731, Sichuan, Peoples R China
[3] Univ Chile, Dept Elect Engn, Santiago 8370451, Chile
[4] Sichuan Agr Univ, Sch Informat & Engn, Yaan 625014, Peoples R China
[5] China Southern Power Grid Co Ltd, Guangzhou 510530, Guangdong, Peoples R China
关键词
Mobile edge computing (MEC); the Internet of things (IoT); PHY-layer authentication; deep neural network (DNN); multi-user; WIRELESS; INTERNET;
D O I
10.1109/ACCESS.2019.2934122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication scheme which exploits channel state information (CSI) to enhance the security of MEC system via detecting spoofing attacks in wireless networks. Moreover, three gradient descent algorithms are adopted to accelerate the training of deep neural networks, which enables smaller computation overheads and lower energy consumptions. In addition, the maximum likelihood function of multi-user authentication method is derived, which explains why cross entropy is chosen as the loss function. The vectorization cost function is also derived. The mini batch scheme and l(2) regularization are adopted to improve training accuracy and avoid over-fitting, respectively. Moreover, the simulation and experimental results show that the DL-based PHY-layer authentication approaches can distinguish multiple legitimate edge nodes from malicious nodes and attacker by CSIs, effectively. Our proposed method supports a better performance compared with the traditional hypothesis test based method.
引用
收藏
页码:116390 / 116401
页数:12
相关论文
共 33 条
[1]   A collaborative mobile edge computing and user solution for service composition in 5G systems [J].
Al Ridhawi, Ismaeel ;
Aloqaily, Moayad ;
Kotb, Yehia ;
Al Ridhawi, Yousif ;
Jararweh, Yaser .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (11)
[2]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[3]  
[Anonymous], ARXIV180105915
[4]  
[Anonymous], 2017, EUR C APPL FERR
[5]   Big Data Meet Cyber-Physical Systems: A Panoramic Survey [J].
Atat, Rachad ;
Liu, Lingjia ;
Wu, Jinsong ;
Li, Guangyu ;
Ye, Chunxuan ;
Yi, Yang .
IEEE ACCESS, 2018, 6 :73603-73636
[6]   Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security [J].
Atat, Rachad ;
Liu, Lingjia ;
Chen, Hao ;
Wu, Jinsong ;
Li, Hongxiang ;
Yi, Yang .
IET Cyber-Physical Systems: Theory and Applications, 2017, 2 (01) :49-54
[7]  
Chatterjee B., 2018, ARXIV180501048
[8]   Lightweight one-time password authentication scheme based on radio-frequency fingerprinting [J].
Chen, Yi ;
Wen, Hong ;
Song, Huanhuan ;
Chen, Songlin ;
Xie, Feiyi ;
Yang, Qing ;
Hu, Lin .
IET COMMUNICATIONS, 2018, 12 (12) :1477-1484
[9]   Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks [J].
Chen, Yingying ;
Yang, Jie ;
Trappe, Wade ;
Martin, Richard P. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2418-2434
[10]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864