504 research outputs found
Multi-subcarrier Physical Layer Authentication Using Channel State Information and Deep Learning
17 USC 105 interim-entered record; under temporary embargo.Strong authentication is crucial as wireless networks become more widespread and relied upon. The robust physical layer features produced by advanced communication networks lend themselves to accomplishing physical layer authentication by using channel state information (CSI). The use of deep learning with neural networks is well suited for classification tasks and can further the goal of enhancing physical layer security. To that end, we propose a semi-supervised generative adversarial network to differentiate between legitimate and malicious transmitters and accurately identify devices for authentication across a range of signal to noise ratio conditions. Our system leverages multiple input multiple output CSI across orthogonal frequency division multiplexing subcarriers using a small percentage of labeled training data.U.S. Government affiliation is unstated in article text
EsaNet: Environment Semantics Enabled Physical Layer Authentication
Wireless networks are vulnerable to physical layer spoofing attacks due to
the wireless broadcast nature, thus, integrating communications and security
(ICAS) is urgently needed for 6G endogenous security. In this letter, we
propose an environment semantics enabled physical layer authentication network
based on deep learning, namely EsaNet, to authenticate the spoofing from the
underlying wireless protocol. Specifically, the frequency independent wireless
channel fingerprint (FiFP) is extracted from the channel state information
(CSI) of a massive multi-input multi-output (MIMO) system based on environment
semantics knowledge. Then, we transform the received signal into a
two-dimensional red green blue (RGB) image and apply the you only look once
(YOLO), a single-stage object detection network, to quickly capture the FiFP.
Next, a lightweight classification network is designed to distinguish the
legitimate from the illegitimate users. Finally, the experimental results show
that the proposed EsaNet can effectively detect physical layer spoofing attacks
and is robust in time-varying wireless environments
Physical layer authentication using ensemble learning technique in wireless communications
Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect cyber-attacks. Still, the cyber-physical systems (CPS) have relatively large computational requirements and require more communication resources, thus making it impossible to achieve a low latency target. These methods perform well but only in stationary scenarios. We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios. The features are fed to ensemble learning algorithms, such as AdaBoost, LogitBoost and Gentle Boost, to classify data. The authentication of the received signal is considered a binary classification problem. The transmitted data is labeled as legitimate information, and spoofing data is illegitimate information. Therefore, this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks. It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile. The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …