Reliable resource allocation with RF fingerprinting authentication in secure IoT networks

被引:0
|
作者
Weiwei Wu
Su Hu
Di Lin
Gang Wu
机构
[1] University of Electronic Science and Technology of China,National Key Laboratory of Science and Technology on Communications
来源
关键词
user authentication; Internet of things; convolutional neural network; RF fingerprinting; NP-hard optimization problem;
D O I
暂无
中图分类号
学科分类号
摘要
The unprecedented growth of the Internet of Things (IoT) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service (QoS) of authenticated users rather than that of all users. By acknowledging this limitation, we realise that user authentication would be a big issue in IoT networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious attacks and the relevant complicated computations restrict IoT deployments. In this paper, a radio frequency (RF) fingerprinting based authentication scheme is proposed under the architecture of convolutional neural network (CNN). It can effectively prevent unauthenticated users from consuming valuable wireless resources and significantly improve QoS performance for legitimate users. By solving an NP-hard optimization problem with the objective of minimizing efficient energy density, we demonstrate an approximate optimal resource allocation scheme in consideration of an RF-fingerprinting based authentication process. The analytic results show that our proposed scheme can dramatically reduce the efficient energy density compared with traditional cryptography based authentication schemes.
引用
收藏
相关论文
共 50 条
  • [1] Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
    Weiwei WU
    Su HU
    Di LIN
    Gang WU
    [J]. Science China(Information Sciences), 2022, (07) : 51 - 66
  • [2] Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
    Wu, Weiwei
    Hu, Su
    Lin, Di
    Wu, Gang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [3] Optimization of a Secure UAV-Based IoT: RF-Fingerprint Authentication and Resource Allocation
    Lin, Di
    Wu, Weiwei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 19208 - 19217
  • [4] Reliable Routing and Resource Allocation Scheme for Hybrid RF/FSO Networks
    Rak, Jacek
    Molisz, Wojciech
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [5] Resource Allocation for Secure Short Packet Communications in Wireless Powered IoT Networks
    Xu, Ding
    Zhao, Haitao
    Zhu, Hongbo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 11000 - 11005
  • [6] Reliable and secure data transfer in IoT networks
    Sarada Prasad Gochhayat
    Chhagan Lal
    Lokesh Sharma
    D. P. Sharma
    Deepak Gupta
    Jose Antonio Marmolejo Saucedo
    Utku Kose
    [J]. Wireless Networks, 2020, 26 : 5689 - 5702
  • [7] Reliable and secure data transfer in IoT networks
    Gochhayat, Sarada Prasad
    Lal, Chhagan
    Sharma, Lokesh
    Sharma, D. P.
    Gupta, Deepak
    Saucedo, Jose Antonio Marmolejo
    Kose, Utku
    [J]. WIRELESS NETWORKS, 2020, 26 (08) : 5689 - 5702
  • [8] Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)
    Sharma, Vishal
    You, Ilsun
    Seo, Jung Taek
    Guizani, Mohsen
    [J]. IEEE ACCESS, 2019, 7 : 13867 - 13881
  • [9] Joint Trajectory Design and Resource Allocation for Secure Air–Ground Integrated IoT Networks
    Zhang, Shangwei
    Shi, Zhenjiang
    Liu, Jiajia
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 20458 - 20471
  • [10] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    [J]. INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)