Shiji Wang, Shida Xia, Sha Liu, Yan Zhang, Chang Cao
{"title":"基于迁移学习的无线网络切换物理层认证","authors":"Shiji Wang, Shida Xia, Sha Liu, Yan Zhang, Chang Cao","doi":"10.1109/ICCCWorkshops57813.2023.10233819","DOIUrl":null,"url":null,"abstract":"In dynamic access networks, terminals face frequent network handover which requires authentication handover to ensure the security of network access. Physical layer authentication based on machine learning will cause large computation overhead and communication delay for network. Therefore, this paper designs a fast authentication handover mechanism based on transfer learning, which makes full use of the source network authentication model and adopts transfer learning algorithm to transfer the previously trained model to target network. Target network continues to train on the basis of the model trained by source network, which simplifies the process of retraining authentication model during network handover greatly.","PeriodicalId":201450,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"203 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Transfer Learning-Based Physical Layer Authentication for Wireless Networks Handover\",\"authors\":\"Shiji Wang, Shida Xia, Sha Liu, Yan Zhang, Chang Cao\",\"doi\":\"10.1109/ICCCWorkshops57813.2023.10233819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In dynamic access networks, terminals face frequent network handover which requires authentication handover to ensure the security of network access. Physical layer authentication based on machine learning will cause large computation overhead and communication delay for network. Therefore, this paper designs a fast authentication handover mechanism based on transfer learning, which makes full use of the source network authentication model and adopts transfer learning algorithm to transfer the previously trained model to target network. Target network continues to train on the basis of the model trained by source network, which simplifies the process of retraining authentication model during network handover greatly.\",\"PeriodicalId\":201450,\"journal\":{\"name\":\"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"volume\":\"203 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCWorkshops57813.2023.10233819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCWorkshops57813.2023.10233819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Transfer Learning-Based Physical Layer Authentication for Wireless Networks Handover
In dynamic access networks, terminals face frequent network handover which requires authentication handover to ensure the security of network access. Physical layer authentication based on machine learning will cause large computation overhead and communication delay for network. Therefore, this paper designs a fast authentication handover mechanism based on transfer learning, which makes full use of the source network authentication model and adopts transfer learning algorithm to transfer the previously trained model to target network. Target network continues to train on the basis of the model trained by source network, which simplifies the process of retraining authentication model during network handover greatly.