4 research outputs found

    Physical-Layer Authentication Using Channel State Information and Machine Learning

    Get PDF
    Strong authentication in an interconnected wireless environment continues to be an important, but sometimes elusive goal. Research in physical-layer authentication using channel features holds promise as a technique to improve network security for a variety of devices. We propose the use of machine learning and measured multiple-input multiple-output communications channel information to make a decision on whether or not to authenticate a particular device. This work analyzes the use of received channel state information from the wireless environment and demonstrates the employment of a generative adversarial neural network (GAN) trained with received channel data to authenticate a transmitting device. We compared a variety of machine learning techniques and found that the local outlier factor (LOF) algorithm reached 100% accuracy at lower signal to noise ratios (SNR) than other algorithms. However, before LOF reached 100%, we also show that the GAN was more accurate at lower SNR levels.Comment: Submitted to 14th International Conference on Signal Processing and Communication Systems (ICSPCS) 202

    A signature-based data security and authentication framework for internet of things applications

    Get PDF
    Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment

    Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication

    No full text
    corecore