END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION

被引:6
|
作者
Sun, Zhuo [1 ]
Wu, Hengmiao [2 ,4 ]
Zhao, Chenglin [2 ]
Yue, Gang [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Wireless Signal Proc & Networks Lab, Key Lab Univ Wireless Commun, Minist Educ, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, WSPN Lab, Beijing, Peoples R China
[4] Univ Elect Sci & Technol China, Chengdu, Peoples R China
关键词
Network layers - Security systems - Deep learning - Bit error rate;
D O I
10.1109/MWC.001.2000005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming to provide more efficient and robust physical layer security strategies for wireless communications, this article investigates the endogenous security of end-to-end learning of communication by addressing two main security issues of communication: confidential transmission and user authentication. For confidential transmission, we have redesigned the loss function of the autoencoder-based deep learning communication model to combat illegal eavesdropping over wireless broadcast channels. While assuming that the eavesdropper has three different ways of decoding prior information, the probability of successful eavesdropping attack is evaluated using the bit error rate criterion. In terms of user authentication, an authentication scheme using "symbol-level fingerprints" is designed for a single user, which takes advantage of the high complexity of parameters of the deep learning model and its natural sensitivity to training conditions. In addition, by leveraging a denoising autoencoder, we extend the authentication to adapt to the multi-user access situation. Experiments have shown that the proposed authentication scheme could guarantee reliability under dynamic channel and resistance to wireless attacks. The results inspire us to rebuild an efficient physical layer secure framework for wireless communication through a new deep learning method.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 50 条
  • [1] Efficient Key Authentication Service for Secure End-to-End Communications
    Etemad, Mohammad
    Kupcu, Alptekin
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 183 - 197
  • [2] Providing end-to-end secure communications in wireless sensor networks
    Gu W.
    Dutta N.
    Chellappan S.
    Bai X.
    IEEE Transactions on Network and Service Management, 2011, 8 (03): : 205 - 218
  • [3] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
  • [4] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [5] Wireless End-to-End Image Transmission System Using Semantic Communications
    Lokumarambage, Maheshi U.
    Gowrisetty, Vishnu Sai Sankeerth
    Rezaei, Hossein
    Sivalingam, Thushan
    Rajatheva, Nandana
    Fernando, Anil
    IEEE ACCESS, 2023, 11 : 37149 - 37163
  • [6] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [7] Authentication for the Web of Things: Secure End-to-End Authentication Between CoAP and HTTP
    Buschsieweke, Marian
    Guenes, Mesut
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [8] End-to-end learning of adaptive coded modulation schemes for resilient wireless communications
    Davey, Christopher P.
    Shakeel, Ismail
    Deo, Ravinesh C.
    Sharma, Ekta
    Salcedo-Sanz, Sancho
    Soar, Jeffrey
    APPLIED SOFT COMPUTING, 2024, 159
  • [9] End-to-end wireless multimedia transmission system
    Shen, J
    Han, B
    Yuen, MC
    Jia, WJ
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2616 - 2620
  • [10] EasySMS: A Protocol for End-to-End Secure Transmission of SMS
    Saxena, Neetesh
    Chaudhari, Narendra S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1157 - 1168