Enhanced Security Authentication Based on Convolutional-LSTM Networks
<p>Security authentication system between Alice and Bob based on physical layer characteristics.</p> "> Figure 2
<p>(<b>a</b>) Floor plan of the meeting room for data collection. (<b>b</b>) Realistic data acquisition scenarios.</p> "> Figure 3
<p>The architecture of the intelligent authentication process.</p> "> Figure 4
<p>An overview of the intelligent authentication process.</p> "> Figure 5
<p>Structure of LSTM layer.</p> "> Figure 6
<p>Normalized channel signal estimates of Alice and Eve.</p> "> Figure 7
<p>The feature distribution of different scenarios. (<b>a</b>) Sample Pearson correlation coefficient. (<b>b</b>) Euclidean distance.</p> "> Figure 8
<p>Characteristic distribution under different SNRs.</p> "> Figure 9
<p>Convergence performance of the Convolutional-LSTM network.</p> "> Figure 10
<p>Performance comparison—SNR changes from 2 dB to 18 dB.</p> "> Figure 11
<p>Authentication performance of the Convolutional-LSTM network and the CNN-based approach of [<a href="#B20-sensors-21-05379" class="html-bibr">20</a>].</p> "> Figure 12
<p>Comparison of results of the Convolutional-LSTM network and the CNN-based approach of [<a href="#B20-sensors-21-05379" class="html-bibr">20</a>] in a conference room scenario.</p> ">
Abstract
:1. Introduction
- First, a novel framework is proposed that enables the network to verify the reliability of messages and authenticate malicious attackers who seek to degrade the security performance of the system. The proposed approach uses two-dimensional measure information as a security parameter that is used in conjunction with physical layer attributes as the solution to the problem of security authentication against spoofing attackers.
- Second, a detection model is proposed that is based on a Convolutional-LSTM network, which learns dynamic channel features without knowing the statistical distribution function, and reduces the complexity of the authentication process, compared to encryption methods. The resulting physical layer authentication process can be regarded as an intelligent model, which is easier to train, based on the estimation of channel attributes and on the authentication of the results that are observed.
- Third, the performance results from simulations show that the proposed Convolutional-LSTM network model describes an adaptive procedure of security authentication, thereby providing reliable protection for legitimate communication links. The superiority of this authentication process over the conventional learning approaches is demonstrated.
2. Preliminary
2.1. System Model
2.2. Data Preparation and Measure Engineering
3. Dataset for Security Authentication
4. Convolutional-LSTM Network Based Security Authentication
Algorithm 1 Security authentication based on Convolutional-LSTM network. |
Given physical layer attribute used , Alice’s estimates , , initialize the network parameters
|
5. Experimental Results
5.1. Experimental Setup
5.2. Impact of 2D-MV Using Measurement Data
5.3. Convergence Performance
5.4. Impact of the Iteration Index and the SNR
5.5. Authentication Accuracy Performance
5.6. Evaluation of the Convolutional-LSTM Network System
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
GMM | Gaussian mixture model |
IoT | Internet of Things |
MHz | Mega Hertz |
RSS | Received signal strength |
LSTM | Long short-term memory |
2D-MV | Two-dimensional measure vector |
USRP | Universal software radio peripheral |
SVM | Support vector machine |
CNN | Convolutional neural network |
RNN | Recurrent neural network |
PCA | Principal component analysis |
References
- Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities. IEEE Internet Things J. 2019, 6, 8169–8181. [Google Scholar] [CrossRef]
- Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. Hybrid Deep Learning for Botnet Attack Detection in the Internet of Things Networks. IEEE Internet Things J. 2020, 8, 4944–4956. [Google Scholar] [CrossRef]
- Fang, H.; Wang, X.; Xu, L. Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach. IEEE Trans. Wirel. Commun. 2020, 19, 5420–5432. [Google Scholar] [CrossRef]
- Qiu, X.; Sun, X.; Si, X. Machine Learning-Based Security Authentication for IoT Networks; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Jorswieck, E.; Tomasin, S.; Sezgin, A. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing. Proc. IEEE 2015, 103, 1702–1724. [Google Scholar] [CrossRef]
- Xie, N.; Zhang, S. Blind Authentication at the Physical Layer Under Time-Varying Fading Channels. IEEE J. Sel. Areas Commun. 2018, 36, 1465–1479. [Google Scholar] [CrossRef]
- Mao, Q.; Hu, F.; Hao, Q. Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2018, 20, 2595–2621. [Google Scholar] [CrossRef]
- Wang, N.; Jiao, L.; Alipour-Fanid, A.; Dabaghchian, M.; Zeng, K. Pilot Contamination Attack Detection for NOMA in 5G mm-Wave Massive MIMO Networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1363–1378. [Google Scholar] [CrossRef]
- Gui, G.; Liu, F.; Sun, J.; Yang, J.; Zhou, Z.; Zhao, D. Flight Delay Prediction Based on Aviation Big Data and Machine Learning. IEEE Trans. Veh. Technol. 2020, 69, 140–150. [Google Scholar] [CrossRef]
- Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, F. Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2020, 27, 214–222. [Google Scholar] [CrossRef] [Green Version]
- Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
- Ji, Z.; He, Z.; Zhang, Y.; Chen, X. A two-step decorrelation method on time-frequency correlated channel for secret key generation. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
- Xu, D.; Ren, P.; Ritcey, J.A.; He, H.; Xu, Q. ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
- Wang, N.; Jiang, T.; Lv, S.; Xiao, L. Physical-Layer Authentication Based on Extreme Learning Machine. IEEE Commun. Lett. 2017, 21, 1557–1560. [Google Scholar] [CrossRef]
- Lin, Y.; Li, W.; Sun, J.; Wu, Q. Improving wireless devices identification using gray relationship classifier to enhance wireless network security. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018; pp. 421–425. [Google Scholar]
- Wang, N.; Li, W.; Jiang, T.; Lv, S. Physical layer spoofing detection based on sparse signal processing and fuzzy recognition. IET Signal Process. 2017, 11, 640–646. [Google Scholar] [CrossRef]
- Wang, N.; Jiang, T.; Li, W.; Lv, S. Physical-layer security in Internet of Things based on compressed sensing and frequency selection. IET Commun. 2017, 11, 1431–1437. [Google Scholar] [CrossRef] [Green Version]
- Qiu, X.; Jiang, T.; Wu, S.; Jiang, C.; Yao, H.; Hayes, M.H.; Benslimane, A. Wireless User Authentication Based on KLT and Gaussian Mixture Model. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–5. [Google Scholar]
- Qiu, X.; Jiang, T.; Wu, S.; Hayes, M. Physical Layer Authentication Enhancement Using a Gaussian Mixture Model. IEEE Access 2018, 6, 53583–53592. [Google Scholar] [CrossRef]
- Qiu, X.; Dai, J.; Hayes, M. A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network. IEEE Access 2020, 8, 26139–26149. [Google Scholar] [CrossRef]
- Buczak, A.L.; Guven, E. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Commun. Surv. Tutor. 2016, 18, 1153–1176. [Google Scholar] [CrossRef]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
- Cao, J.; Lv, G.; Chang, C.; Li, H. A Feature Selection Based Serial SVM Ensemble Classifier. IEEE Access 2019, 7, 144516–144523. [Google Scholar] [CrossRef]
- Hoang, T.M.; Duong, T.Q.; Lambotharan, S. Secure Wireless Communication Using Support Vector Machines. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Wang, Y.; Li, L.; Dang, C. Calibrating Classification Probabilities with Shape-Restricted Polynomial Regression. IEEE Trans. Pattern Anal. Mach. Intell. 2019, 41, 1813–1827. [Google Scholar] [CrossRef]
- Ye, H.; Li, G.Y.; Juang, B. Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems. IEEE Wirel. Commun. Lett. 2018, 7, 114–117. [Google Scholar] [CrossRef]
- Gui, G.; Huang, H.; Song, Y.; Sari, H. Deep Learning for an Effective Nonorthogonal Multiple Access Scheme. IEEE Trans. Veh. Technol. 2018, 67, 8440–8450. [Google Scholar] [CrossRef]
- Gu, J.; Shan, C.; Chen, X.; Yin, H.; Wang, W. A Novel Pilot-Aided Channel Estimation Scheme Based on RNN for FDD-LTE systems. In Proceedings of the 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, China, 18–20 October 2018. [Google Scholar]
- Xu, T.; Darwazeh, I. Design and Prototyping of Neural Network Compression for Non-Orthogonal IoT Signals. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
- Fang, H.; Wang, X.; Hanzo, L. Learning-Aided Physical Layer Authentication as an Intelligent Process. IEEE Trans. Commun. 2019, 67, 2260–2273. [Google Scholar] [CrossRef] [Green Version]
- Xiao, L.; Sheng, G.; Wan, X.; Su, W.; Cheng, P. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks. IEEE Commun. Lett. 2019, 23, 60–63. [Google Scholar] [CrossRef]
- Pan, F.; Pang, Z.; Wen, H.; Luvisotto, M.; Xiao, M.; Liao, R.F.; Chen, J. Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Trans. Ind. Inform. 2019, 15, 6481–6491. [Google Scholar] [CrossRef]
- Zhang, J.; Rajendran, S.; Sun, Z.; Woods, R.; Hanzo, L. Physical Layer Security for the Internet of Things: Authentication and Key Generation. IEEE Wirel. Commun. 2019, 26, 92–98. [Google Scholar] [CrossRef]
- Liao R., F.; Wen, H.; Wu, J.; Pan, F.; Cao, M. Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sensors 2019, 19, 2440. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Merchant, K.; Nousain, B. Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks. In Proceedings of the MILCOM 2019—2019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA, 12–14 November 2019. [Google Scholar]
- Chen, B.; Draper, S.C.; Wornell, G. Information embedding and related problems: Recent results and applications. Presented at the Allerton Conference Communication, Control, Computing, Monticello, IL, USA, 4 October 2001. [Google Scholar]
- Moulin, P.; O’Sullivan, J.A. Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 2003, 49, 563–593. [Google Scholar] [CrossRef]
- Zaidi, A.; Vandendorpe, L. Coding Schemes for Relay-Assisted Information Embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
- Zhu, Y.; Dong, X.; Lu, T. An Adaptive and Parameter-Free Recurrent Neural Structure for Wireless Channel Prediction. IEEE Trans. Commun. 2019, 67, 8086–8096. [Google Scholar] [CrossRef]
- Huang, Y.; Zhong, Y.; Wu, Q.; Dutkiewicz, E.; Jiang, T. Cost-Effective Foliage Penetration Human Detection Under Severe Weather Conditions Based on Auto-Encoder/Decoder Neural Network. IEEE Internet Things J. 2019, 6, 6190–6200. [Google Scholar] [CrossRef]
Authors | Contributions and Concepts |
---|---|
B. Chen et al. [37] P. Moulin et al. [38] A. Zaidi et al. [39] | Information hiding strategies in the presence of attackers are proposed for partial or non-cooperative mode. |
N. Wang et al. [14] | A physical layer authentication based on extreme learning machine algorithm is proposed which does not require key generation. |
X. Qiu et al. [18] | An authentication model based on Guassian mixture model using static characteristic is proposed, |
R. Liao et al. [35] | A multi-layer convolutional mapping method without needing to know the statistical distribution functions of the channel attributes is proposed |
Our paper | A deep-learning method for physical layer authentication based on continuous characteristics is proposed |
Parameters | Values |
---|---|
Carrier Frequency | 2.4 GHz |
Channel Model | Rayleigh Fading Model |
Number of Subcarriers | 256 |
Wireless Protocol | IEEE 802.11a/g |
Signal to Noise Ratio (SNR) | 2 dB∼20 dB |
Bandwidth | 20 MHz |
Sampling Interval | 2.5 ms |
Distance between Alice and Bob | 1 m |
Settings | Values |
---|---|
Initialization Parameters of Model | random |
Number of Layers | 6 |
Learning Rate | 5 (20) |
Training Subsets | 4000 × 256 |
Validation Subsets | 800 × 256 |
Testing Subsets | 1200 × 256 |
Batch Size | 128 |
Number of Epochs | 30 |
Classifier | Accuracy | False Alarm Rate | Stage |
---|---|---|---|
SVM | 68.35% | 15.27% | 1 |
GMM | 89.12% | 8.13% | 1 |
CNN | 95.81% | 5.72% | 2 |
Convolutional-LSTM | 99.15% | 0.71% | 2 |
Reference | Approach | False Alarm Rate | Accuracy |
---|---|---|---|
Scheme [19] | PCA + GMM | 7.92% | 94.50% |
Scheme [18] | KLT + GMM | 7.72% | 92.80% |
Scheme [20] | CNN | 5.72% | 95.81% |
Scheme [36] | RNN | 1.20% | 97.40% |
Our scheme | Convolutional-LSTM | 0.71% | 99.15% |
Algorithm | Accuracy | Complexity | Training Time | Benefit | Cost |
---|---|---|---|---|---|
SVM | Fair | Low | Low | Require low computational resources | Lack of large-scale deployment |
GMM | Fair | Fair | Low | Adaptive Learning | Lack of realistic authentication tests |
RNN | High (97.40%) | High | Fair | Accurate Learning | Complex learning implementation |
CNN | Fair | Fair | Low | Robust learning | Sensitive to channel variance |
Proposed Method | High (99.15%) | Fair | Fair | Improved learning efficiency; real experiments | Training privacy |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qiu, X.; Sun, X.; Hayes, M. Enhanced Security Authentication Based on Convolutional-LSTM Networks. Sensors 2021, 21, 5379. https://doi.org/10.3390/s21165379
Qiu X, Sun X, Hayes M. Enhanced Security Authentication Based on Convolutional-LSTM Networks. Sensors. 2021; 21(16):5379. https://doi.org/10.3390/s21165379
Chicago/Turabian StyleQiu, Xiaoying, Xuan Sun, and Monson Hayes. 2021. "Enhanced Security Authentication Based on Convolutional-LSTM Networks" Sensors 21, no. 16: 5379. https://doi.org/10.3390/s21165379