Reliable resource allocation with RF fingerprinting authentication in secure IoT networks

被引:0
|
作者
Weiwei WU [1 ]
Su HU [1 ]
Di LIN [1 ]
Gang WU [1 ]
机构
[1] National Key Laboratory of Science and Technology on Communications,University of Electronic Science and Technology of China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TN915.08 [网络安全]; TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 0839 ; 1405 ;
摘要
The unprecedented growth of the Internet of Things(Io T) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service(QoS) of authenticated users rather than that of all users. By acknowledging this limitation,we realise that user authentication would be a big issue in Io T networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious attacks and the relevant complicated computations restrict Io T deployments. In this paper, a radio frequency(RF)fingerprinting based authentication scheme is proposed under the architecture of convolutional neural network(CNN). It can effectively prevent unauthenticated users from consuming valuable wireless resources and significantly improve QoS performance for legitimate users. By solving an NP-hard optimization problem with the objective of minimizing efficient energy density, we demonstrate an approximate optimal resource allocation scheme in consideration of an RF-fingerprinting based authentication process. The analytic results show that our proposed scheme can dramatically reduce the efficient energy density compared with traditional cryptography based authentication schemes.
引用
收藏
页码:51 / 66
页数:16
相关论文
共 50 条
  • [21] Fairness resource allocation based on blockchain for secure communication in integrated IoT
    Liang, Wei
    Zhao, Jun
    Liu, Yan
    Liang, Yan
    Li, Jingwen
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2023, 2023 (01)
  • [22] Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios
    Ren, Hong
    Pan, Cunhua
    Deng, Yansha
    Elkashlan, Maged
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (09) : 5793 - 5807
  • [23] Resource Allocation for Secure Communication in Cooperative CR Networks
    Lu, Weidang
    Gu, Kecai
    Lu, Zhanghui
    Peng, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1199 - 1206
  • [24] Radio-Frequency Fingerprinting for Distributed IoT Networks: Authentication and QoS Optimization
    Wu, Weiwei
    Hu, Su
    Lin, Di
    Yang, Tian
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4440 - 4451
  • [25] Reliable Resource Allocation and Management for IoT Transportation Using Fog Computing
    Atiq, Haseeb Ullah
    Ahmad, Zulfiqar
    Uz Zaman, Sardar Khaliq
    Khan, Muhammad Amir
    Shaikh, Asad Ali
    Al-Rasheed, Amal
    ELECTRONICS, 2023, 12 (06)
  • [26] Fairness resource allocation based on blockchain for secure communication in integrated IoT
    Wei Liang
    Jun Zhao
    Yan Liu
    Yan Liang
    Jingwen Li
    EURASIP Journal on Advances in Signal Processing, 2023
  • [27] Energy Efficient Resource Allocation for Secure NOMA Networks
    Zhang, Haijun
    Yang, Ning
    Long, Keping
    Pan, Miao
    Karagiannidis, George K.
    Nallanathan, Arumugam
    2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2018,
  • [28] Resource Allocation for Secure OFDMA Networks with Imperfect CSIT
    Ng, Derrick Wing Kwan
    Lo, Ernest S.
    Schober, Robert
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [29] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
    Chaudhary, Ajay
    Peddoju, Sateesh K.
    Chouhan, Vikas
    JOURNAL OF GRID COMPUTING, 2023, 21 (03)
  • [30] Deep Learning Enabled Secure IoT Handover Authentication for Blockchain Networks
    Salim, Mikail Mohammed
    Shanmuganathan, Vimal
    Loia, Vincenzo
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2021, 11