Abstract

Exploiting physical (PHY)-layer characteristics for authentication has great potential to provision underlying trust for low-ended Internet of things (IoT) devices with limited computation resources. In this paper, we propose an online learning aided adaptive PHY-layer authentication framework for enhanced authenticity provisioning. Instead of relying on some preset PHY-layer signatures with scenario-sensitive “thresholds,” multiple PHY-layer attributes are jointly considered by the proposed scheme to improve the reliability and robustness of PHY-layer authentication. Such a dimension extension on PHY-layer signatures can effectively deteriorate the spoofing capability of malicious attackers. However, it also complicates the predicting and authenticating procedure of the legitimate receiver. Therefore, artificial intelligence aided search algorithms are formulated to facilitate adaptive selection of the Most Effective PHY-layer Attributes (MEA) through learning their historical authenticity performance. To be specific, the attributes which are predicted to be effective in maximizing the authentication capability, in terms of low false alarm rate and low miss detection rate, will be dynamically selected by the authenticator in an autonomous manner. Theoretical analysis shows that the proposed learning algorithm achieves asymptotically diminishing regret. Moreover, extensive experiments are conducted using Universal Software Radio Peripherals (USRPs) in a laboratory environment, which further validates the efficiency of the proposed scheme.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.