Abstract

With the continuous development of science and engineering technology, our society has entered the era of the mobile Internet of Things (MIoT). MIoT refers to the combination of advanced manufacturing technologies with the Internet of Things (IoT) to create a flexible digital manufacturing ecosystem. The wireless communication technology in the Internet of Things is a bridge between mobile devices. Therefore, the introduction of machine learning (ML) algorithms into MIoT wireless communication has become a research direction of concern. However, the traditional key-based wireless communication method demonstrates security problems and cannot meet the security requirements of the MIoT. Based on the research on the communication of the physical layer and the support vector data description (SVDD) algorithm, this paper establishes a radio frequency fingerprint (RFF or RF fingerprint) authentication model for a communication device. The communication device in the MIoT is accurately and efficiently identified by extracting the radio frequency fingerprint of the communication signal. In the simulation experiment, this paper introduces the neighborhood component analysis (NCA) method and the SVDD method to establish a communication device authentication model. At a signal-to-noise ratio (SNR) of 15 dB, the authentic devices authentication success rate (ASR) and the rogue devices detection success rate (RSR) are both 90%.

Highlights

  • The Internet of Things is the “internet connected to everything”, which is an extended and expanded network based on the Internet

  • This paper studies the use of artificial intelligence algorithms to solve identity authentication problems in the mobile Internet of Things (MIoT)

  • Based on our recent research on the application of the radio frequency (RF) fingerprint authentication model to MIoT, we arrange the structure of the paper as follows: in Section 2, we systematically summarize and classify the research on the RF fingerprint authentication model and feature extraction algorithm from the past few years

Read more

Summary

Introduction

The Internet of Things is the “internet connected to everything”, which is an extended and expanded network based on the Internet It combines various information sensor devices with the internet and forms a huge network to realize the interconnection of people, machines and things at any time and any place [1]. RF fingerprint authentication technology aims at distinguishing authorized transmitters of multifarious users based on the unique feature from their radio frequency signals at the physical layer [7]. In the field of communication, the development of artificial intelligence is very rapid, including wireless sensor networks [8,9,10,11], network resource allocation [12], modulation signal recognition [13,14,15] communication equipment individual recognition [16], abnormal information identification and detection [17,18], and others.

Related Work
RF Fingerprint Feature Extraction
RF Fingerprint Authentication
NCA Feature Selection
Support Vector Data Description
Whale Swarm Optimization Algorithm
Experimental Environment and Experimental Devices
Simulation Analysis
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call