Physical Layer Authentication Enhancement Using a Gaussian Mixture Model

被引:31
|
作者
Qiu, Xiaoying [1 ]
Jiang, Ting [1 ]
Wu, Sheng [1 ]
Hayes, Monson [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Universal Wireless Commun, Beijing 100876, Peoples R China
[2] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
来源
IEEE ACCESS | 2018年 / 6卷
基金
国家自然科学基金重大项目; 中国国家自然科学基金;
关键词
PHY-layer authentication; Gaussian mixture model; spoofing detection; wireless security; SPOOFING DETECTION; SECURITY; POWER;
D O I
10.1109/ACCESS.2018.2871514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks strive to integrate information technology into every corner of the world. This openness of radio propagation is one reason why holistic wireless security mechanisms only rarely enter the picture. In this paper, we propose a physical (PHY)-layer security authentication scheme that takes advantage of channel randomness to detect spoofing attacks in wireless networks. Unlike most existing authentication techniques that rely on comparing message information between the legitimate user and potential spoofer, our proposed authentication scheme uses a Gaussian mixture model (GMM) to detect spoofing attackers. Probabilistic models of different transmitters are used to cluster messages. Furthermore, a 2-D feature measure space is exploited to preprocess the channel information. Training data for a spoofer operating through an unknown channel, a pseudo adversary model is developed to enhance the spoofing detection performance. Monte Carlo simulations are used to evaluate the detection performance of the GMM-based PHY-layer authentication scheme. The results show that the probability of detecting a spoofer is higher than that obtained using similar approaches.
引用
收藏
页码:53583 / 53592
页数:10
相关论文
共 50 条
  • [1] Physical Layer Authentication for Mission Critical Machine Type Communication using Gaussian Mixture Model based Clustering
    Weinand, Andreas
    Karrenbauer, Michael
    Ji Lianghai
    Schotten, Hans D.
    [J]. 2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [2] Subspace Based Speech Enhancement Using Gaussian Mixture Model
    Kundu, Achintya
    Chatterjee, Saikat
    Sreenivas, T. V.
    [J]. INTERSPEECH 2008: 9TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2008, VOLS 1-5, 2008, : 395 - 398
  • [3] PHYSICAL LAYER AUTHENTICATION BASED ON CHANNEL RESPONSE TRACKING USING GAUSSIAN PROCESSES
    Van Vaerenbergh, Steven
    Gonzalez, Oscar
    Via, Javier
    Santamaria, Ignacio
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [4] Image Contrast Enhancement using Gaussian Mixture Model and Genetic Algorithm
    Mahajan, Arushi
    Gupta, Divya
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 979 - 983
  • [5] Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization
    Liu, Jiazi
    Wang, Xianbin
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) : 4171 - 4182
  • [6] Layer-Wise Network Compression Using Gaussian Mixture Model
    Lee, Eunho
    Hwang, Youngbae
    [J]. ELECTRONICS, 2021, 10 (01) : 1 - 16
  • [7] Wireless User Authentication Based on KLT and Gaussian Mixture Model
    Qiu, Xiaoying
    Jiang, Ting
    Wu, Sheng
    Jiang, Chunxiao
    Yao, Haipeng
    Hayes, Monson H.
    Benslimane, Abderrahim
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [8] Quality enhancement of CELP coded speech by using a voicing gaussian mixture model
    Raza, DG
    Chan, CF
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 452 - 455
  • [9] Gaussian mixture model-based contrast enhancement
    Abdoli, Mohsen
    Sarikhani, Hossein
    Ghanbari, Mohammad
    Brault, Patrice
    [J]. IET IMAGE PROCESSING, 2015, 9 (07) : 569 - 577
  • [10] Reliability enhancement for CIR-based physical layer authentication
    Liu, Jiazi
    Refaey, Ahmed
    Wang, Xianbin
    Tang, Helen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 661 - 671