Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks

被引:28
|
作者
Xia, Shida [1 ]
Tao, Xiaofeng [1 ]
Li, Na [1 ]
Wang, Shiji [1 ]
Sui, Tengfei [1 ]
Wu, Huici [1 ]
Xu, Jin [1 ]
Han, Zhu [2 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Technol, Beijing 100876, Peoples R China
[2] Univ Houston, Elect & Comp Engn, Houston, TX 77004 USA
[3] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 446701, South Korea
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Authentication; Clustering algorithms; Reliability; Correlation; Training; Wireless networks; Computational complexity; Identity security; PYH-layer authentication; multiple correlated attributes; non-parametric clustering; PILOT SPOOFING ATTACK; SECURITY; AREA;
D O I
10.1109/TVT.2021.3055563
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Physical (PHY) layer authentication has been a significant trend towards ensuring the identity security of terminals in wireless networks due to the high security and low complexity. However, the independence assumption of existing literature ignores the inherent correlation of the PHY-layer attributes, which limits its generality. In this paper, we propose a multi-attribute-based PHY-layer authentication scheme by taking the correlation into account. To cope with the exponential growth of computational complexity in correlated analysis, this paper studies the reconstruction and heuristic algorithm to find a suboptimal authentication solution with low complexity. Specific to the inherent volatility nature of the PHY-layer attributes, we propose an unsupervised machine learning (ML) based non-parametric clustering algorithm to enhance the reliability of PHY-layer authentication. Unlike existing PHY-layer authentication schemes based on ML, the proposed PHY-layer authentication scheme does not require any prior information or the training set, which has a more potent universality. Extensive simulations are performed under both synthetic and real data sets, and the figures verify that the proposed authentication scheme can achieve a reliable and robust performance with low complexity.
引用
收藏
页码:1673 / 1687
页数:15
相关论文
共 50 条
  • [21] End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks
    Zhang, Pinchang
    Zhu, Jinxiao
    Chen, Yin
    Jiang, Xiaohong
    IEEE ACCESS, 2019, 7 : 38322 - 38336
  • [22] Multiple Attributes-based Data Recovery in Wireless Sensor Networks
    Chen, Guangshuo
    Liu, Xiao-Yang
    Kong, Linghe
    Lu, Jia-Liang
    Gu, Yu
    Shu, Wei
    Wu, Min-You
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 103 - 108
  • [23] Physical Layer Authentication in Private Campus Networks based on Machine Learning
    Kuruvatti, Nandish P.
    Mallikarjun, Sachinkumar B.
    Kusumapani, Sai Charan
    Djuitcheu, Hubert
    Schotten, Hans D.
    2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [24] Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication
    Wang, Shaoyu
    Huang, Kaizhi
    Xu, Xiaoming
    Hu, Xiaoyan
    Yang, Jing
    Jin, Liang
    ENTROPY, 2022, 24 (04)
  • [25] Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication
    Cai, Yufeng
    Wang, Wenya
    Chen, Yicong
    Tan, Haijun
    Xie, Ning
    Wang, Jiangzhou
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (07) : 165 - 171
  • [26] Physical Layer Authentication in Wired and Wireless Communication Systems
    Mouli, Chandra
    Singh, Sanjay
    ADVANCES IN DIGITAL IMAGE PROCESSING AND INFORMATION TECHNOLOGY, 2011, 205 : 291 - 304
  • [27] A Survey of Physical-Layer Authentication in Wireless Communications
    Xie, Ning
    Li, Zhuoyuan
    Tan, Haijun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 282 - 310
  • [28] Fingerprints in the ether: Using the physical layer for wireless authentication
    Xiao, Liang
    Greenstein, Larry
    Mandayam, Narayan
    Trappe, Wade
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 4646 - 4651
  • [29] Wireless Physical Layer Authentication via Fingerprint Embedding
    Yu, Paul L.
    Verma, Gunjan
    Sadler, Brian M.
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) : 48 - 53
  • [30] PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks
    Shan, Dan
    Zeng, Kai
    Xiang, Weidong
    Richardson, Paul
    Dong, Yan
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1817 - 1827