Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks

被引:27
作者
Li, Weiwei [1 ]
Wang, Ning [2 ]
Jiao, Long [3 ]
Zeng, Kai [3 ]
机构
[1] Hebei Univ Engn, Sch Informat & Elect Engn, Handan 056001, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
关键词
Physical layer security; spoofing attack detection; mmWave communication; virtual channel; WIRELESS NETWORKS; AUTHENTICATION; CHALLENGES; SECURITY;
D O I
10.1109/ACCESS.2021.3073115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity spoofing attacks pose one of the most serious threats to wireless networks, where the attacker can masquerade as legitimate users by modifying its own identity. Channel-based physical-layer security is a promising technology to counter identity spoofing attacks. Although various channel-based security technologies have been proposed, the study of channel-based spoofing attack detection in 5G networks is largely open. This paper introduces a new channel-based spoofing attack detection scheme based on channel virtual (or called beamspace) representation in millimeter wave (mmWave) massive multiple-input and multiple-output (MIMO) 5G networks. The principal components of channel virtual representation (PC-CVR) are extracted as a new channel feature. Compared with traditional channel features, the proposed features can be more sensitive to the location of transmitters and more suitable to mmWave 5G networks. Based on PC-CVR, we offer two detection strategies to achieve the spoofing attack detection tackling static and dynamic radio environments, respectively. For the static radio environment where the channel correlation is stable, Neyman-Pearson (NP) testing-based spoofing attack detection is provided depending on the `2-norm of PC-CVR. For the dynamic radio environment where the channel correlation is changing, the problem of spoofing attack detection is transformed into a one-class classification problem. To efficiently handle this problem, an online detection framework based on a feedforward neural network with a single hidden layer is presented. Simulation results evaluate and confirm the effectiveness of the proposed detection schemes. For the static radio environment, the detection rate can be improved around 25% with the help of PC-CVR under the NP testing-based detection, and the detection accuracy can reach 99% with the machine learning-based scheme under the dynamic radio environment.
引用
收藏
页码:60419 / 60432
页数:14
相关论文
共 36 条
[1]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[2]   Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems [J].
Alkhateeb, Ahmed ;
El Ayach, Omar ;
Leus, Geert ;
Heath, Robert W., Jr. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2014, 8 (05) :831-846
[3]   Survey of Cellular Mobile Radio Localization Methods: From 1G to 5G [J].
del Peral-Rosado, Jose A. ;
Raulefs, Ronald ;
Lopez-Salcedo, Jose A. ;
Seco-Granados, Gonzalo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02) :1124-1148
[4]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[5]   An Overview of Signal Processing Techniques for Millimeter Wave MIMO Systems [J].
Heath, Robert W., Jr. ;
Gonzalez-Prelcic, Nuria ;
Rangan, Sundeep ;
Roh, Wonil ;
Sayeed, Akbar M. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (03) :436-453
[6]  
Jakes W. C., 1994, MICROWAVE MOBILE COM
[7]   A deep learning method with wrapper based feature extraction for wireless intrusion detection system [J].
Kasongo, Sydney Mambwe ;
Sun, Yanxia .
COMPUTERS & SECURITY, 2020, 92 (92)
[8]  
Kim T, 2015, IEEE INT WORK SIGN P, P146, DOI 10.1109/SPAWC.2015.7227017
[9]   DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems [J].
Li, Beibei ;
Wu, Yuhao ;
Song, Jiarui ;
Lu, Rongxing ;
Li, Tao ;
Zhao, Liang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5615-5624
[10]   A fast and accurate online sequential learning algorithm for feedforward networks [J].
Liang, Nan-Ying ;
Huang, Guang-Bin ;
Saratchandran, P. ;
Sundararajan, N. .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2006, 17 (06) :1411-1423