PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

被引:192
|
作者
Xiao, Liang [1 ,2 ]
Li, Yan [1 ]
Han, Guoan [1 ]
Liu, Guolong [1 ]
Zhuang, Weihua [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing 100093, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Game theory; PHY-layer authentication; reinforcement learning; spoofing detection; PHYSICAL-LAYER; AUTHENTICATION; GAME;
D O I
10.1109/TVT.2016.2524258
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the PHY-layer authentication that exploits radio channel information (such as received signal strength indicators) to detect spoofing attacks in wireless networks. The interactions between a legitimate receiver and spoofers are formulated as a zero-sum authentication game. The receiver chooses the test threshold in the hypothesis test to maximize its utility based on the Bayesian risk in the spoofing detection, whereas the spoofers determine their attack frequencies to minimize the utility of the receiver. The Nash equilibrium of the static authentication game is derived, and its uniqueness is discussed. We also investigate a repeated PHY-layer authentication game for a dynamic radio environment. As it is challenging for the radio nodes to obtain the exact channel parameters in advance, we propose spoofing detection schemes based on Q-learning and Dyna-Q, which achieve the optimal test threshold in the spoofing detection via reinforcement learning. We implement the PHY-layer spoofing detectors over universal software radio peripherals and evaluate their performance via experiments in indoor environments. Both simulation and experimental results have validated the efficiency of the proposed strategies.
引用
收藏
页码:10037 / 10047
页数:11
相关论文
共 50 条
  • [1] Detecting PHY-Layer Spoofing Attack in Wireless Networks
    Chang, Bo
    Zhao, Guodong
    Chen, Zhi
    Dan, Jiangxun
    [J]. 2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [2] Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
    Soosahabi, Reza
    Naraghi-Pour, Mort
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1118 - 1126
  • [3] Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
    Soosahabi, Reza
    Naraghi-Pour, Mort
    [J]. 2012 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2012,
  • [4] Spoofing Detection with Reinforcement Learning in Wireless Networks
    Xiao, Liang
    Li, Yan
    Liu, Guolong
    Li, Qiangda
    Zhuang, Weihua
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [5] Distributed PHY-layer mesh networks
    Dohler, M
    Aghyami, H
    [J]. PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 2543 - 2547
  • [6] PHY-Layer Key Exchange for Wireless Communication
    Roogi, Shashikala B.
    Kounte, Manjunath R.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 293 - 299
  • [7] Distributed PHY-layer mesh networks
    Centre for Telecommunications Research, King's College London, United Kingdom
    [J]. IEEE Int Symp Person Indoor Mobile Radio Commun PIMRC, 1600, (2543-2547):
  • [8] PHY-Authentication Protocol for Spoofing Detection in Wireless Networks
    Xiao, Liang
    Reznik, Alex
    Trappe, Wade
    Ye, Chunxuan
    Shah, Yogendra
    Greenstein, Larry
    Mandayam, Narayan
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [9] Learning-Based PHY-Layer Authentication for Underwater Sensor Networks
    Xiao, Liang
    Sheng, Geyi
    Wan, Xiaoyue
    Su, Wei
    Cheng, Peng
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 60 - 63
  • [10] A Novel PHY-Layer Spoofing Attack Detection Scheme Based on WGAN-Encoder Model
    Xie, Wei
    Wang, Hongjun
    Feng, Zimo
    Ma, Chunlai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8616 - 8629