Autoencoder-based physical layer authentication in a real indoor environment

IF 2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Linda Senigagliesi, Gianluca Ciattaglia, Ennio Gambi
{"title":"Autoencoder-based physical layer authentication in a real indoor environment","authors":"Linda Senigagliesi,&nbsp;Gianluca Ciattaglia,&nbsp;Ennio Gambi","doi":"10.1016/j.phycom.2025.102626","DOIUrl":null,"url":null,"abstract":"<div><div>Authentication of wireless nodes, as in fifth-generation (5G) and Internet of Things (IoT) networks, is an increasingly pressing issue, in order to limit the required computational effort and the necessary overhead. A simplification of the authentication process may therefore be of interest to achieve the satisfaction of stringent performance requirements, such as those envisaged for sixth-generation (6G) networks. This paper provides a study on the feasibility of physical layer authentication (PLA) in a real indoor environment, as an alternative solution to the traditional authentication schemes. To ensure the reliability of the proposed approach a simulated scenario is firstly tested. Subsequently, real-world data are collected through a laboratory setup using a Vectorial Signal Transceiver (VST) and two Universal Software Radio Peripherals (USRPs) to emulate the behavior of the receiver, the legitimate transmitter, and the potential adversary. A machine learning (ML) algorithm is then exploited to act as authenticator. This means that channel fingerprint is extracted from signals to create a dataset used to train a sparse autoencoder. To emulate a real authentication scenario, the autoencoder is trained only on the class of the legitimate user. Once a new message arrives, the autoencoder task is to discern authentic signals from those forged by the adversary. It is shown that a geometric mean of accuracy of more than 90%, with corresponding low levels of false alarm and missed detection, is achievable irrespective of the nodes location, underlining the robustness and versatility of the proposed ML-based PLA approach.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"70 ","pages":"Article 102626"},"PeriodicalIF":2.0000,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000291","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Authentication of wireless nodes, as in fifth-generation (5G) and Internet of Things (IoT) networks, is an increasingly pressing issue, in order to limit the required computational effort and the necessary overhead. A simplification of the authentication process may therefore be of interest to achieve the satisfaction of stringent performance requirements, such as those envisaged for sixth-generation (6G) networks. This paper provides a study on the feasibility of physical layer authentication (PLA) in a real indoor environment, as an alternative solution to the traditional authentication schemes. To ensure the reliability of the proposed approach a simulated scenario is firstly tested. Subsequently, real-world data are collected through a laboratory setup using a Vectorial Signal Transceiver (VST) and two Universal Software Radio Peripherals (USRPs) to emulate the behavior of the receiver, the legitimate transmitter, and the potential adversary. A machine learning (ML) algorithm is then exploited to act as authenticator. This means that channel fingerprint is extracted from signals to create a dataset used to train a sparse autoencoder. To emulate a real authentication scenario, the autoencoder is trained only on the class of the legitimate user. Once a new message arrives, the autoencoder task is to discern authentic signals from those forged by the adversary. It is shown that a geometric mean of accuracy of more than 90%, with corresponding low levels of false alarm and missed detection, is achievable irrespective of the nodes location, underlining the robustness and versatility of the proposed ML-based PLA approach.
在真实的室内环境中基于自编码器的物理层认证
无线节点的身份验证,如第五代(5G)和物联网(IoT)网络,是一个日益紧迫的问题,以限制所需的计算工作量和必要的开销。因此,简化认证过程可能有助于满足严格的性能要求,例如为第六代(6G)网络设想的性能要求。本文研究了物理层认证(PLA)在真实室内环境中的可行性,作为传统认证方案的替代方案。为了保证所提方法的可靠性,首先对一个模拟场景进行了测试。随后,使用矢量信号收发器(VST)和两个通用软件无线电外设(usrp)通过实验室设置收集真实世界的数据,以模拟接收器,合法发射器和潜在对手的行为。然后利用机器学习(ML)算法作为身份验证者。这意味着从信号中提取通道指纹以创建用于训练稀疏自编码器的数据集。为了模拟真实的身份验证场景,自动编码器仅根据合法用户的类别进行训练。一旦新信息到达,自动编码器的任务就是从对手伪造的信号中辨别出真实的信号。结果表明,无论节点位置如何,都可以实现超过90%的几何平均精度,并具有相应的低水平虚警和漏检,强调了所提出的基于ml的PLA方法的鲁棒性和通用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Physical Communication
Physical Communication ENGINEERING, ELECTRICAL & ELECTRONICTELECO-TELECOMMUNICATIONS
CiteScore
5.00
自引率
9.10%
发文量
212
审稿时长
55 days
期刊介绍: PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published. Topics of interest include but are not limited to: Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信