Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

被引:51
作者
Chen, Songlin [1 ]
Pang, Zhibo [2 ]
Wen, Hong [3 ]
Yu, Kan [4 ]
Zhang, Tengyue [3 ]
Lu, Yueming [5 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[2] ABB Corp Res, Dept Automot Solut, S-72226 Vasteras, Sweden
[3] Univ Elect Sci & Technol China UESTC, Dept Aeronaut & Astronaut, Chengdu 611731, Peoples R China
[4] La Trobe Univ, Bundoora, Vic 3086, Australia
[5] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; Cloning; Wireless communication; Communication system security; Wireless sensor networks; Authentication; Physical layer; Cyber physical security; physical layer authentication; supervised machine learning; RESOURCE-ALLOCATION; SECURITY; INTERNET;
D O I
10.1109/TII.2020.2963962
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a scheme to detect both clone and Sybil attacks by using channel-based machine learning is proposed. To identify malicious attacks, channel responses between sensor peers have been explored as a form of fingerprints with spatial and temporal uniqueness. Moreover, the machine-learning-based method is applied to provide a more accurate authentication rate. Specifically, by combining with edge devices, we apply a threshold detection method based on channel differences to provide offline training sample sets with labels for the machine learning algorithm, which avoids manually generating labels. Therefore, our proposed scheme is lightweight for resource constrained industrial wireless devices, since only an online-decision making is required. Extensive simulations and experiments were conducted in real industrial environments. Both results show that the authentication accuracy rate of our strategy with an appropriate threshold can achieve 84% without manual labeling.
引用
收藏
页码:2041 / 2051
页数:11
相关论文
共 21 条
[1]   Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model [J].
Aazam, Mohammad ;
Harras, Khaled A. ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :3085-3092
[2]  
[Anonymous], 2013, Pattern Recognition and Machine Learning, DOI [DOI 10.18637/JSS.V017.B05, 10.1117/1.2819119]
[3]  
Candell R., Radio frequency measurements for selected manufacturing and industrial environments, DOI [10.18434/T44S3N, DOI 10.18434/T44S3N]
[4]   Industrial IoT Data Scheduling Based on Hierarchical Fog Computing: A Key for Enabling Smart Factory [J].
Chekired, Djabir Abdeldjalil ;
Khoukhi, Lyes ;
Mouftah, Hussein T. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4590-4602
[5]   Adaptive Fog Configuration for the Industrial Internet of Things [J].
Chen, Lixing ;
Zhou, Pan ;
Gao, Liang ;
Xu, Jie .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4656-4664
[6]   Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm [J].
Chen, Songlin ;
Wen, Hong ;
Wu, Jinsong ;
Chen, Jie ;
Lin, Wenjie ;
Hu, Lin ;
Chen, Yi .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[7]   Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis [J].
Forssell, Henrik ;
Thobaben, Ragnar ;
Al-Zubaidy, Hussein ;
Gross, James .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (04) :795-808
[8]   Physical Layer Key Generation in 5G Wireless Networks [J].
Jiao, Long ;
Wang, Ning ;
Wang, Pu ;
Alipour-Fanid, Amir ;
Tang, Jie ;
Zeng, Kai .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) :48-54
[9]   Cost-Efficient Deployment of Fog Computing Systems at Logistics Centers in Industry 4.0 [J].
Lin, Chun-Cheng ;
Yang, Jhih-Wun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4603-4611
[10]   Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications [J].
Mishra, Sambit Kumar ;
Puthal, Deepak ;
Rodrigues, Joel J. P. C. ;
Sahoo, Bibhudatta ;
Dutkiewicz, Eryk .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4497-4506