On Physical-Layer Authentication via Triple Pool Convolutional Neural Network

被引:6
作者
Chen, Yi [1 ,2 ]
Real, Shahriar [2 ]
Wen, Hong [1 ]
Cheng, Boyang [2 ]
Wang, Wei [2 ]
Ho, Pin-Han [2 ]
Chang, Shih Yu [3 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA 95192 USA
来源
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2020年
关键词
Edge computing; convolutional neural network (CNN); physical-layer authentication; channel state information (CSI); CHANNEL ESTIMATION;
D O I
10.1109/GCWkshps50303.2020.9367391
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper introduces a novel physical-layer authentication scheme, called Triple Pool Convolutional Neural Network physical-layer authentication (TP-CNN-PHA), aiming to enable a lightweight user authentication mechanism based on physical-layer channel state information (CSI). We first introduce the TP-Net, which is characterized by jointly utilizing maximum pooling, average pooling, and global pooling on a globally connected CNN architecture. To assess its performance, we conduct two sets of experiments, including the one using simulated channel data, and the other one utilizing real experiment data generated from our wireless testbed. The result demonstrates the superiority of the proposed TP-CNN-PHA in terms of authentication accuracy and valid complexity reduction compared with all the considered counterparts, including the threshold-based authentication method.
引用
收藏
页数:6
相关论文
共 25 条
[1]   Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation [J].
Borle, Kapil M. ;
Chen, Biao ;
Du, Wenliang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2225-2235
[2]  
Chanerjee B, 2018, PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P205, DOI 10.1109/HST.2018.8383916
[3]   Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources [J].
Chen, Yi ;
Wen, Hong ;
Wu, Jinsong ;
Song, Huanhuan ;
Xu, Aidong ;
Jiang, Yixin ;
Zhang, Tengyue ;
Wang, Zhen .
SENSORS, 2019, 19 (08)
[4]  
Chen Z, 2018, 2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN)
[5]   A STATISTICAL THEORY OF MOBILE-RADIO RECEPTION [J].
CLARKE, RH .
BELL SYSTEM TECHNICAL JOURNAL, 1968, 47 (06) :957-+
[6]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[7]   Joint symbol timing and channel estimation for OFDM based WLANs [J].
Larsson, EG ;
Liu, GQ ;
Li, J ;
Giannakis, GB .
IEEE COMMUNICATIONS LETTERS, 2001, 5 (08) :325-327
[8]   Robust channel estimation for OFDM systems with rapid dispersive fading channels [J].
Li, Y ;
Cimini, LJ ;
Sollenberger, NR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1998, 46 (07) :902-915
[9]   Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation [J].
Liao, Run-Fa ;
Wen, Hong ;
Chen, Songlin ;
Xie, Feiyi ;
Pan, Fei ;
Tang, Jie ;
Song, Huanhuan .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03) :2077-2088
[10]   Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication [J].
Liao, Run-Fa ;
Wen, Hong ;
Wu, Jinsong ;
Pan, Fei ;
Xu, Aidong ;
Song, Huanhuan ;
Xie, Feiyi ;
Jiang, Yixin ;
Cao, Minggui .
IEEE ACCESS, 2019, 7 :116390-116401