On Physical-Layer Authentication via Triple Pool Convolutional Neural Network

被引:5
作者
Chen, Yi [1 ,2 ]
Real, Shahriar [2 ]
Wen, Hong [1 ]
Cheng, Boyang [2 ]
Wang, Wei [2 ]
Ho, Pin-Han [2 ]
Chang, Shih Yu [3 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA 95192 USA
来源
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2020年
关键词
Edge computing; convolutional neural network (CNN); physical-layer authentication; channel state information (CSI); CHANNEL ESTIMATION;
D O I
10.1109/GCWkshps50303.2020.9367391
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper introduces a novel physical-layer authentication scheme, called Triple Pool Convolutional Neural Network physical-layer authentication (TP-CNN-PHA), aiming to enable a lightweight user authentication mechanism based on physical-layer channel state information (CSI). We first introduce the TP-Net, which is characterized by jointly utilizing maximum pooling, average pooling, and global pooling on a globally connected CNN architecture. To assess its performance, we conduct two sets of experiments, including the one using simulated channel data, and the other one utilizing real experiment data generated from our wireless testbed. The result demonstrates the superiority of the proposed TP-CNN-PHA in terms of authentication accuracy and valid complexity reduction compared with all the considered counterparts, including the threshold-based authentication method.
引用
收藏
页数:6
相关论文
共 25 条
  • [1] Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
    Borle, Kapil M.
    Chen, Biao
    Du, Wenliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2225 - 2235
  • [2] Chanerjee B, 2018, PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P205, DOI 10.1109/HST.2018.8383916
  • [3] Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
    Chen, Yi
    Wen, Hong
    Wu, Jinsong
    Song, Huanhuan
    Xu, Aidong
    Jiang, Yixin
    Zhang, Tengyue
    Wang, Zhen
    [J]. SENSORS, 2019, 19 (08):
  • [4] Chen Z, 2018, 2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN)
  • [5] A STATISTICAL THEORY OF MOBILE-RADIO RECEPTION
    CLARKE, RH
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1968, 47 (06): : 957 - +
  • [6] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [7] Joint symbol timing and channel estimation for OFDM based WLANs
    Larsson, EG
    Liu, GQ
    Li, J
    Giannakis, GB
    [J]. IEEE COMMUNICATIONS LETTERS, 2001, 5 (08) : 325 - 327
  • [8] Robust channel estimation for OFDM systems with rapid dispersive fading channels
    Li, Y
    Cimini, LJ
    Sollenberger, NR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1998, 46 (07) : 902 - 915
  • [9] Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation
    Liao, Run-Fa
    Wen, Hong
    Chen, Songlin
    Xie, Feiyi
    Pan, Fei
    Tang, Jie
    Song, Huanhuan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2077 - 2088
  • [10] Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication
    Liao, Run-Fa
    Wen, Hong
    Wu, Jinsong
    Pan, Fei
    Xu, Aidong
    Song, Huanhuan
    Xie, Feiyi
    Jiang, Yixin
    Cao, Minggui
    [J]. IEEE ACCESS, 2019, 7 : 116390 - 116401