Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches
<p>A generic wireless OSI Model information consisting of the layers, main protocols, main attacks, security techniques.</p> "> Figure 2
<p>Authentication Scheme Characteristics.</p> "> Figure 3
<p>Primary study selection process.</p> "> Figure 4
<p>Distribution of papers by publisher.</p> "> Figure 5
<p>Distribution of publications by year.</p> "> Figure 6
<p>Distribution by type.</p> "> Figure 7
<p>Distribution by type.</p> "> Figure 8
<p>The performance results of selected studies.</p> "> Figure 9
<p>Dataset types used in selected papers.</p> ">
Abstract
:1. Introduction
- What machine learning approaches are applied in physical layer authentication to secure a wireless network?
- What are the existing physical layer authentication techniques for handling a wireless network’s security problems?
- What are the existing key challenges, open issues, and future trends in wireless network security based on physical layer authentication solutions?
- Present a systematic review of the current state of the art in physical layer authentication based on machine learning and deep learning approaches.
- Provide an assessment of ML and DL algorithms used for physical layer authentication.
- Review the methods of physical layer authentication and compare their performance.
- Outline the primary challenges and issues confronting physical layer authentication techniques.
- Define the key aspect in which future research can improve the use of PLA for wireless network security.
2. Related Works and Motivation
2.1. Related Review Studies on Physical Layer Security and Authentication
2.2. Motivations for a Secondary Study on PLA in Wireless Network Security
3. Background
3.1. Wireless Network
3.1.1. Physical Layer
3.1.2. Wireless Physical Layer Protocols
3.1.3. Wireless Networks Physical Layer Threats
- Interception: Eavesdropping is the most common attack on wireless devices’ privacy. The attacker could find legitimate communication by snooping in the nearby wireless environment when the traffic transmits control information about the sensor network configuration.
- Traffic Analysis: The ability to track communication patterns to facilitate various types of attacks.
- Proactive Jamming: Proactive jamming attackers spread interfering signals whether the legitimate signal communication is there or not. To save energy and toggle between the sleep and jamming phases, attackers sporadically spread random bits or normal packets into networks. Attackers sporadically broadcast either random bits or conventional packets into networks to preserve energy and rotation between the sleep and jamming phases.
- Reactive Jamming: Attackers that use reactive jamming can monitor the legitimate channel’s activity. If there is an activity, the attacker transmits a random signal to interfere with the existing signal on the channel.
3.2. Physical Layer Security
- First, physical layer security techniques do not rely on computational complexity compared to cryptography techniques [3,4,26,38,43]. As a result, the achieved level of security will not be compromised; even if the unauthorized devices in the wireless network are provided with powerful computational capabilities, secure and safe communications can still be performed.
3.3. Physical Layer Authentication
- The covertness means that any authentication schemes should not significantly affect the performance of the standard data transmission, do not occupy too much communication overheads or extra computational resources, and do not harm the existing conventional higher-layer cryptographic-based techniques.
- Robustness requires that the PLA framework is robust enough to mitigate channel fading and noise interference.
- Security is the kernel of PLA systems, representing the ability to prevent the authentication procedure from being interrupted or invaded by eavesdroppers.
- The PLA allows a legitimate receiver to easily distinguish between a legitimate and adversary transmitter without upper-layer processing, decreasing computational complexity and processing delay.
- There is no key distribution and management need with PLA compared to conventional secret key-based authentication schemes. Instead, some existing physical layer authentication approaches rely on analog channel information and device-specific characteristics caused by manufacturing variability.
- In a heterogeneous coexistence system, incompatible devices may not be able to decode each other’s upper-layer signaling, but they should be able to decode the physical layer bit-streams.
- The PLA presents information-theoretic security, where the physical layer puts adversaries in a state of uncertainty.
Physical Layer Authentication Techniques
3.4. Signal Classification
3.4.1. Automatic Modulation Classification
3.4.2. Specific Emitter Identification
4. Research Methodology
4.1. Phase 1. Planning the Review
4.2. Phase 2. Conducting the Review
- Group 1 finds papers related to transmitter identification: (“Transmitter Identification” OR “Transmitter Classification” OR “Specific Emitter Identification” OR “Emitter Classification”) AND (“Deep Learning” OR “Neural Network” OR “Radio Frequency Fingerprints” OR “RF fingerprinting” OR “RFF”).
- Group 2 finds papers related to wireless network security: (“Wireless Networks Security” OR “Wireless Device Security” OR “Internet of Things Security”) AND (“Transmitter Identification” OR “Transmitter Classification” OR “Specific Emitter Identification” OR “Emitter Classification”).
- Group 3 finds papers related to physical layer authentication: (“Physical Layer Authentication” OR “Physical Layer Security”) AND (“Wireless Networks” OR “Wireless Device” OR “Internet of Things” OR “IoT” OR “Radio Frequency Fingerprints” OR “RF fingerprinting” OR “RFF”).
5. Analysis
5.1. RQ1: What Machine Learning Approaches Are Applied in Physical Layer Authentication to Secure Wireless Networks?
5.1.1. Machine Learning Based PLA
5.1.2. Deep Learning Based PLA
5.2. RQ2:What Are the Existing Physical Layer Authentication Techniques for Handling a Wireless Network’s Security Problems?
5.2.1. Review of Selected PLA Technique-Based Radio Frequency Fingerprinting
5.2.2. Review of Selected PLA Technique-Based Channel Information
5.3. RQ3:What Are the Research Gaps in Wireless Network Security Based on Physical Layer Authentication Solutions?
5.3.1. Main Challenges
- The first challenge is that the wireless network environment changes dynamically over time [83,84,100]. This is because wireless channel conditions vary significantly according to configuration, and the shape of the RF signal changes according to variations in wireless channel conditions, which can affect transmitter identification.
- Differences in the relevant hardware feature devices are relatively small. In addition, noise and interference further distort feature detection, reducing the accuracy of estimating them for authentication purposes.
- Since wireless communication transmission exists in a random fading environment, imperfect estimation and incomplete measurement of wireless signals are unavoidable [84], resulting in unpredictably varying authentication systems.
- The rapid improvement in operational wireless infrastructure supported the dramatically increased traffic [100]. As a result, the complexity of wireless networks will grow, and wireless device users will have to switch between multiple base stations or access points more frequently, resulting in frequent authentication handovers.
5.3.2. Open Issues and Future Trends
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
PLS | Physical layer security |
PLA | Physical layer authentication |
RFF | Radiofrequency Fingerprint |
CSI | Channel State Information |
RSS | Receive Signal Strength |
CIR | Channel Impulse Response |
References
- Vailshery, L.S. IoT and Non-IoT Connections Worldwide 2010–2025. Available online: https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/#statisticContainer (accessed on 5 January 2022).
- Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 1878–1911. [Google Scholar] [CrossRef]
- Liu, Y.; Chen, H.H.; Wang, L. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [Google Scholar] [CrossRef]
- Zhang, J.; Rajendran, S.; Sun, Z.; Woods, R.; Hanzo, L. Physical Layer Security for the Internet of Things: Authentication and Key Generation. IEEE Wirel. Commun. 2019, 26, 92–98. [Google Scholar] [CrossRef]
- Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities. IEEE Internet Things J. 2019, 26, 8169–8181. [Google Scholar] [CrossRef]
- Ma, T.; Hu, F.; Ma, M. A LSTM-Based Channel Fingerprinting Method for Intrusion Detection. In Proceedings of the—2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), Zhuhai, China, 8–10 January 2021; pp. 113–116. [Google Scholar] [CrossRef]
- Li, X.; Huang, K.; Wang, S.; Xu, X. A physical layer authentication mechanism for IoT devices. China Commun. 2021, 19, 129–140. [Google Scholar] [CrossRef]
- Li, N.; Xia, S.; Tao, X.; Zhang, Z.; Wang, X. An area based physical layer authentication framework to detect spoofing attacks. Sci. China Inf. Sci. 2020, 63. [Google Scholar] [CrossRef]
- Kamboj, A.K.; Jindal, P.; Verma, P. Machine learning-based physical layer security: Techniques, open challenges, and applications. Wirel. Netw. 2021, 27, 5351–5383. [Google Scholar] [CrossRef]
- Zhuo, F.; Huang, Y.; Chen, J. Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance. Procedia Comput. Sci. 2017, 107, 472–477. [Google Scholar] [CrossRef]
- Deng, S.; Huang, Z.; Wang, X. A novel specific emitter identification method based on radio frequency fingerprints. In Proceedings of the 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), Beijing, China, 8–11 September 2017; pp. 368–371. [Google Scholar] [CrossRef]
- Feng, Y.; Wang, G.; Liu, Z.; Feng, R.; Chen, X.; Tai, N. An Unknown Radar Emitter Identification Method Based on Semi-Supervised and Transfer Learning. Algorithms 2019, 12, 271. [Google Scholar] [CrossRef]
- Jafari, H.; Omotere, O.; Adesina, D.; Wu, H.; Qian, L. IoT Devices Fingerprinting Using Deep Learning. In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–9. [Google Scholar] [CrossRef]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef] [PubMed]
- Zhou, D.; Wang, X.; Tian, Y.; Wang, R. A novel radar signal recognition method based on a deep restricted Boltzmann machine. Eng. Rev. 2017, 37, 165–171. [Google Scholar]
- Wu, B.; Yuan, S.; Li, P.; Jing, Z.; Huang, S.; Zhao, Y. Radar Emitter Signal Recognition Based on One-Dimensional Convolutional Neural Network with Attention Mechanism. Sensors 2020, 20, 6350. [Google Scholar] [CrossRef] [PubMed]
- Pu, Y.; Liu, T.; Wu, H.; Guo, J. Radar emitter signal recognition based on convolutional neural network and main ridge coordinate transformation of ambiguity function. In Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 18–20 June 2021; Volume 4, pp. 716–721. [Google Scholar] [CrossRef]
- Wu, L.; Yang, L.; Yuan, Y. A Recognition Method for Radar Emitter Signals Based on Deep Belief Network and Ambiguity Function Matrix Singular Value Vectors. In Proceedings of the 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 March 2021; Volume 5, pp. 381–386. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, J.; Zhang, W.; Yang, J.; Gui, G. Deep Learning-Based Cooperative Automatic Modulation Classification Method for MIMO Systems. IEEE Trans. Veh. Technol. 2020, 69, 4575–4579. [Google Scholar] [CrossRef]
- Shang, X.; Hu, H.; Li, X.; Xu, T.; Zhou, T. Dive Into Deep Learning Based Automatic Modulation Classification: A Disentangled Approach. IEEE Access 2020, 8, 113271–113284. [Google Scholar] [CrossRef]
- Mendis, G.J.; Wei, J.; Madanayake, A. Deep learning-based automated modulation classification for cognitive radio. In Proceedings of the 2016 IEEE International Conference on Communication Systems (ICCS), Seoul, Republic of Korea, 16–20 May 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Wang, N.; Li, W.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead. IEEE Netw. 2020, 34, 198–204. [Google Scholar] [CrossRef]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering.Technical Report EBSE 2007-001; Keele University and Durham University: Keele, UK, 2007; Volume 2. [Google Scholar]
- Shu, Z.; Qian, Y.; Ci, S. On Physical Layer Security for Cognitive Radio Networks. Netw. IEEE 2013, 27, 28–33. [Google Scholar] [CrossRef]
- Sánchez, J.D.V.; Urquiza-Aguiar, L.; Paredes, M.C.P. Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey. In Proceedings of the 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 23–25 October 2019; pp. 122–129. [Google Scholar] [CrossRef]
- Rojas, P.; Alahmadi, S.; Bayoumi, M. Physical Layer Security for IoT Communications—A Survey. In Proceedings of the 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LO, USA, 26–31 July 2021; pp. 95–100. [Google Scholar] [CrossRef]
- Bai, L.; Zhu, L.; Liu, J.; Choi, J.; Zhang, W. Physical layer authentication in wireless communication networks: A survey. J. Commun. Inf. Netw. 2020, 5, 237–264. [Google Scholar] [CrossRef]
- Xie, N.; Li, Z.; Tan, H. A Survey of Physical-Layer Authentication in Wireless Communications. IEEE Commun. Surv. Tutor. 2021, 23, 282–310. [Google Scholar] [CrossRef]
- Jiang, J.R. Short Survey on Physical Layer Authentication by Machine-Learning for 5G-based Internet of Things. In Proceedings of the 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), Kaohsiung, Taiwan, 21–23 August 2020; pp. 41–44. [Google Scholar] [CrossRef]
- Angueira, P.; Val, I.; Montalbán, J.; Seijo, O.; Iradier, E.; Fontaneda, P.S.; Fanari, L.; Arriola, A. A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry. IEEE Commun. Surv. Tutor. 2022, 24, 810–838. [Google Scholar] [CrossRef]
- Xiao, L.; Reznik, A.; Trappe, W.; Ye, C.; Shah, Y.; Greenstein, L.; Mandayam, N. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar] [CrossRef]
- Germain, K.S.; Kragh, F. Physical-Layer Authentication Using Channel State Information and Machine Learning. In Proceedings of the 14th International Conference on Signal Processing and Communication Systems (ICSPCS), Virtual, 14–16 December 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Tian, Q.; Jia, J.; Hou, C. Research on Fingerprint Identification of Wireless Devices Based on Information Fusion. Mob. Netw. Appl. 2020, 25, 2359–2366. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Yener, A.; Ulukus, S. Wireless Physical-Layer Security: Lessons Learned From Information Theory. Proc. IEEE 2015, 103, 1814–1825. [Google Scholar] [CrossRef]
- Mucchi, L.; Jayousi, S.; Caputo, S.; Panayirci, E.; Shahabuddin, S.; Bechtold, J.; Morales, I.; Stoica, R.A.; Abreu, G.; Haas, H. Physical-Layer Security in 6G Networks. IEEE Open J. Commun. Soc. 2021, 2, 1901–1914. [Google Scholar] [CrossRef]
- Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730. [Google Scholar] [CrossRef]
- Peng, L.; Hu, A.; Zhang, J.; Jiang, Y.; Yu, J.; Yan, Y. Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme. IEEE Internet Things J. 2019, 6, 349–360. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Rodriguez, L.J.; Tran, N.H.; Duong, T.Q.; Le-Ngoc, T.; Elkashlan, M.; Shetty, S. Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Commun. Mag. 2015, 53, 32–39. [Google Scholar] [CrossRef]
- Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
- Shen, G.; Zhang, J.; Marshall, A.; Peng, L.; Wang, X. Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN. In Proceedings of the IEEE INFOCOM 2021 IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021. [Google Scholar] [CrossRef]
- Shen, G.; Zhang, J.; Marshall, A.; Peng, L.; Wang, X. Radio Frequency Fingerprint Identification for LoRa Using Deep Learning. IEEE J. Sel. Areas Commun. 2021, 39, 2604–2616. [Google Scholar] [CrossRef]
- Wang, Q.; Li, H.; Zhao, D.; Chen, Z.; Ye, S.; Cai, J. Deep Neural Networks for CSI-Based Authentication. IEEE Access 2019, 7, 123026–123034. [Google Scholar] [CrossRef]
- Toonstra, J.; Kinsner, W. Transient analysis and genetic algorithms for classification. In Proceedings of the IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings, Winnipeg, MB, Canada, 15–16 May 1995; Volume 2, pp. 432–437. [Google Scholar] [CrossRef]
- Knox, D.A.; Kunz, T. RF Fingerprints for Secure Authentication in Single-Hop WSN. In Proceedings of the 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Avignon, France, 18–20 December 2008; pp. 567–573. [Google Scholar] [CrossRef]
- Li, Z.; Yin, Y.; Wu, L. Radio Frequency Fingerprint Identification Method in Wireless Communication. In Proceedings of the International Conference on Machine Learning and Intelligent Communications, Hangzhou, China, 6–8 July 2018; pp. 195–202. [Google Scholar] [CrossRef]
- Lin, Y.; Jia, J.; Wang, S.; Ge, B.; Mao, S. Wireless Device Identification Based on Radio Frequency Fingerprint Features. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Virtual, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Hall, J.; Barbeau, M.; Kranakis, E. Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase. Wirel. Opt. Commun. 2003, 13–18. [Google Scholar]
- Candell, R. Radio Frequency Measurements for Selected Manufacturing and Industrial Environments. NIST Tech. Rep. 2016. [CrossRef]
- Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Jiang, Y.; Xie, F.; Cao, M. Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks. Sensors 2019, 19, 2440. [Google Scholar] [CrossRef] [PubMed]
- Ma, Y.; Zhou, G.; Wang, S. WiFi Sensing with Channel State Information: A Survey. ACM Comput. Surv. 2019, 52, 1–36. [Google Scholar] [CrossRef] [Green Version]
- Wang, Z.; Dou, W.; Ma, M.; Feng, X.; Huang, Z.; Zhang, C.; Guo, Y.; Chen, D. A Survey of User Authentication Based on Channel State Information. Wirel. Commun. Mob. Comput. 2021, 2021, 6636665. [Google Scholar] [CrossRef]
- Hua, J.; Sun, H.; Shen, Z.; Qian, Z.; Zhong, S. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 1700–1708. [Google Scholar] [CrossRef]
- Liu, H.; Wang, Y.; Liu, J.; Yang, J.; Chen, Y.; Poor, H.V. Authenticating Users Through Fine-Grained Channel Information. IEEE Trans. Mob. Comput. 2018, 17, 251–264. [Google Scholar] [CrossRef]
- Jagannath, A.; Jagannath, J.; Kumar, P. A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges. arXiv 2022, arXiv:2201.00680. [Google Scholar] [CrossRef]
- Li, X.; Dong, F.; Zhang, S.; Guo, W. A Survey on Deep Learning Techniques in Wireless Signal Recognition. Wirel. Commun. Mob. Comput. 2019. [Google Scholar] [CrossRef]
- O’Shea, T.; Corgan, J.; Clancy, T. Convolutional Radio Modulation Recognition Networks. Engineering Applications of Neural Networks. In EANN 2016; Springer: Cham, Switzerland, 2016; Volume 629, pp. 213–226. [Google Scholar] [CrossRef]
- Bu, K.; He, Y.; Jing, X.; Han, J. Adversarial Transfer Learning for Deep Learning Based Automatic Modulation Classification. IEEE Signal Process. Lett. 2020, 27, 880–884. [Google Scholar] [CrossRef]
- Zhang, M.; Zeng, Y.; Han, Z.; Gong, Y. Automatic Modulation Recognition Using Deep Learning Architectures. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Xu, Y.; Dezhi, L.; Wang, Z.; Liu, G.L.; Lv, H. A Deep Learning Method Based on Convolutional Neural Network for Automatic Modulation Classification of Wireless Signals. Wirel. Netw. 2018, 25, 3735–3746. [Google Scholar] [CrossRef]
- Talbot, K.; Duley, P.; Hyatt, M. Specific emitter identification and verification. IEEE Access 2003, 29, 33544–33555. [Google Scholar]
- Dong, X.; Cheng, S.; Yang, J.; Zhou, Y. Radar Specific Emitter Recognition Based on DBN Feature Extraction. J. Phys. Conf. Ser. 2019, 1176, 032025. [Google Scholar] [CrossRef]
- Sa, K.; Lang, D.; Wang, C.; Bai, Y. Specific Emitter Identification Techniques for the Internet of Things. IEEE Access 2020, 8, 1644–1652. [Google Scholar] [CrossRef]
- Hou, K.; Li, N. Specific emitter identification based on CNN. J. Phys. Conf. Ser. 2021, 1971. [Google Scholar] [CrossRef]
- Bagwe, R.; Kachhia, J.; Erdogan, A.; George, K. Automated Radar Signal Analysis Based on Deep Learning. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; p. 215. [Google Scholar] [CrossRef]
- Wong, L.J.; Headley, W.C.; Michaels, A.J. Specific Emitter Identification Using Convolutional Neural Network-Based IQ Imbalance Estimators. IEEE Access 2019, 7, 33544–33555. [Google Scholar] [CrossRef]
- Han, H.; Cui, L.; Li, W.; Huang, L.; Cai, Y.; Cai, J.; Zhang, Y. Radio Frequency Fingerprint Based Wireless Transmitter Identification Against Malicious Attacker: An Adversarial Learning Approach. In Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Wuhan, China, 21–23 October 2020; pp. 310–315. [Google Scholar] [CrossRef]
- Roy, D.; Mukherjee, T.; Chatterjee, M.; Blasch, E.; Pasiliao, E. RFAL: Adversarial Learning for RF Transmitter Identification and Classification. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 783–801. [Google Scholar] [CrossRef]
- Karunaratne, S.; Krijestorac, E.; Cabric, D. Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Tian, Q.; Lin, Y.; Guo, X.; Wen, J.; Fang, Y.; Rodriguez, J.; Mumtaz, S. New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint. IEEE Internet Things J. 2019, 29, 7980–7987. [Google Scholar] [CrossRef]
- Lin, Y.; Chang, J. Improving Wireless Network Security Based On Radio Fingerprinting. In Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria, 22–26 July 2019; pp. 375–379. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, Y.; Zhang, H.; Wei, X.; Wang, G. Identification and authentication for wireless transmission security based on RF-DNA fingerprint. EURASIP J. Wirel. Commun. Netw. 2019, 2019. [Google Scholar] [CrossRef] [Green Version]
- Baldini, G.; Giuliani, R.; Dimc, F. Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots. Internet Technol. Lett. 2019, 2. [Google Scholar] [CrossRef]
- Tian, Q.; Lin, Y.; Guo, X.; Wang, J.; AlFarraj, O.; Tolba, A. An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology. Sensors 2020, 20, 1213. [Google Scholar] [CrossRef]
- Rajendran, S.; Sun, Z.; Lin, F.; Ren, K. Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1896–1911. [Google Scholar] [CrossRef]
- Aminuddin, N.S.; Habaebi, M.H.; Yusoff, S.H.; Islam, M.R. Securing Wireless Communication Using RF Fingerprinting. In Proceedings of the 2021 8th International Conference on Computer and Communication Engineering (ICCCE), IIUM Gombak, Malaysia, 22–23 June 2 2021; pp. 63–67. [Google Scholar] [CrossRef]
- Reising, D.; Cancelleri, J.; Loveless, T.D.; Kandah, F.; Skjellum, A. Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM. IEEE Internet Things J. 2021, 8, 8356–8371. [Google Scholar] [CrossRef]
- Chen, S.; Xie, F.; Chen, Y.; Song, H.; Wen, H. Identification of wireless transceiver devices using radio frequency (RF) fingerprinting based on STFT analysis to enhance authentication security. In Proceedings of the 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing), Beijing, China, 28–31 October 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Oh, M.K.; Lee, S.; Kang, Y. Wi-SUN Device Authentication using Physical Layer Fingerprint. In Proceedings of the 2021 International Conference on Information and Communication Technology Convergence (ICTC), Seoul, Republic of Korea, 20–22 October 2021; pp. 160–162. [Google Scholar] [CrossRef]
- Lee, W.; Baek, S.Y.; Kim, S.H. Deep-Learning-Aided RF Fingerprinting for NFC Security. IEEE Commun. Mag. 2021, 59, 96–101. [Google Scholar] [CrossRef]
- Qiu, X.; Dai, J.; Hayes, M. A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network. IEEE Access 2020, 8, 26139–26149. [Google Scholar] [CrossRef]
- Liao, R.; Wen, H.; Pan, F.; Song, H.; Xu, A.; Jiang, Y. A Novel Physical Layer Authentication Method with Convolutional Neural Network. In Proceedings of the 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 29–30 March 2019; pp. 231–235. [Google Scholar] [CrossRef]
- Chen, S.; Pang, Z.; Wen, H.; Yu, K.; Zhang, T.; Lu, Y. Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks. IEEE Trans. Ind. Inform. 2021, 17, 2041–2051. [Google Scholar] [CrossRef]
- Pan, F.; Pang, Z.; Wen, H.; Luvisotto, M.; Xiao, M.; Liao, R.; Chen, J. Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Trans. Ind. Inform. 2019, 15, 6481–6491. [Google Scholar] [CrossRef]
- Chen, S.; Wen, H.; Wu, J.; Chen, J.; Liu, W.; Hu, L.; Chen, Y. Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm. Wirel. Commun. Mob. Comput. 2018, 2018, 6039878. [Google Scholar] [CrossRef]
- Xiao, L.; Li, Y.; Han, G.; Liu, G.; Zhuang, W. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks. IEEE Trans. Veh. Technol. 2016, 65, 10037–10047. [Google Scholar] [CrossRef]
- Liao, R.F.; Wen, H.; Chen, S.; Xie, F.; Pan, F.; Tang, J.; Song, H. Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet Things J. 2020, 7, 2077–2088. [Google Scholar] [CrossRef]
- Yoon, J.; Lee, Y.; Hwang, E. Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Seoul, Republic of Korea, 19–21 October 2019; pp. 63–65. [Google Scholar] [CrossRef]
- Senigagliesi, L.; Baldi, M.; Gambi, E. Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning. In Proceedings of the 2021 IEEE Latin-American Conference on Communications (LATINCOM), Santo Domingo, Dominican Republic, 17–19 November 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Dai, C.; Yang, J.; Qin, Y.; Liu, J. Physical layer authentication algorithm based on SVM. In Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 14–17 October 2016; pp. 1597–1601. [Google Scholar] [CrossRef]
- Du, R.; Zhen, L. Multiuser physical layer security mechanism in the wireless communication system of the IIOT. Comput. Secur. 2022, 113, 102559. [Google Scholar] [CrossRef]
- Hoang, T.M.; Duong, T.Q.; Tuan, H.D.; Lambotharan, S.; Hanzo, L. Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines. IEEE Access 2021, 9, 31595–31607. [Google Scholar] [CrossRef]
- Chatterjee, B.; Das, D.; Maity, S.; Sen, S. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning. IEEE Internet Things J. 2019, 6, 388–398. [Google Scholar] [CrossRef]
- Samuel, A.L. Some Studies in Machine Learning Using the Game of Checkers. Ibm J. Res. Dev. 1959, 3, 210–229. [Google Scholar] [CrossRef]
- Freund, Y.; Schapire, R.E. A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting. J. Comput. Syst. Sci. 1997, 55, 119–139. [Google Scholar] [CrossRef]
- Alzubaidi, L.; Zhang, J.; Humaidi, A.J.; Al-Dujaili, A.; Duan, Y.; Al-Shamma, O.; Santamaría, J.; Fadhel, M.A.; Al-Amidie, M.; Farhan, L. Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions. J. Big Data 2021, 8, 53. [Google Scholar] [CrossRef]
- Wang, X.; Hao, P.; Hanzo, L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments. IEEE Commun. Mag. 2016, 54, 152–158. [Google Scholar] [CrossRef]
- Wang, T.; Wen, C.K.; Wang, H.; Gao, F.; Jiang, T.; Jin, S. Deep Learning for Wireless Physical Layer: Opportunities and Challenges. China Commun. 2017, 14, 92–111. [Google Scholar] [CrossRef]
Study | Publication Year | Publisher | Topics | Review Type | Covers ML | Environment | Focused Issues |
---|---|---|---|---|---|---|---|
[2] | 2018 | IEEE | PLS | Survey | No | Wireless Network | The optimization and design in PLS |
[3] | 2018 | IEEE | PLS | Survey | No | 5G Wireless Networks | PLS techniques provide for 5G wireless networks |
[4] | 2016 | IEEE | PLS | Survey | No | Wireless Network | The PLS techniques, and challenges |
[10] | 2021 | Springer | PLS/PLA | Survey | Yes | Wireless Network | PLS techniques based on machine learning |
[25] | 2013 | IEEE | PLS | Survey | No | Cognitive Radio Networks | PLS in cognitive radio networks |
[26] | 2019 | IEEE | PLS | Survey | No | 5G Wireless Networks | The PLS on enabling technologies for 5G |
[27] | 2021 | IEEE | PLS | Survey | No | IoT Communications | PLS techniques in the IoT communication protocols |
[28] | 2020 | IEEE | PLA | Survey | Yes | Wireless Network | PLA techniques and challenges |
[29] | 2021 | IEEE | PLA | Survey | No | Wireless Network | PLA techniques |
[30] | 2020 | IEEE | PLA | Survey | Yes | 5G Wireless Networks and IoT Communications | PLA schemes using machine learning for the 5G-based IoT |
[31] | 2022 | IEEE | PLS | Survey | No | Wireless Network | Physical layer security challenges |
Research Questions | Motivations |
---|---|
RQ1: What machine learning approaches are applied in physical layer authentication to secure the wireless network? | To assess whether machine learning approaches in physical layer authentication models enhance the performance of wireless network security. |
RQ2: What are the existing physical layer authentication techniques for handling a wireless network’s security problems? | To identify what techniques have been used in physical layer authentication. |
RQ3: What are the existing key challenges, open issues, and future trends in wireless network security based on physical layer authentication solutions? | To identify gaps in the physical layer authentication literature on wireless network security and to suggest directions for future research. |
Inclusion Criteria | Exclusion Criteria |
---|---|
Studies related to physical layer authentication and wireless network or IoT security. | Studies written in languages other than English. |
Studies related to transmitter classification and using deep learning techniques or machine learning techniques. | Studies that are reviews or surveys without findings. |
Studies published from January 2015 to January 2022. | Studies without justifiable research contributions. |
Study Number | Title | Authors | Year | Publisher | Type |
---|---|---|---|---|---|
S1 | Radio Frequency Fingerprint Based Wireless Transmitter Identification Against Malicious Attacker: An Adversarial Learning Approach | Hao Han et al. [70] | 2020 | IEEE | Conference |
S2 | RFAL: Adversarial Learning for RF Transmitter Identification and Classification | Debashri Roy et al. [71] | 2020 | IEEE | Journal |
S3 | Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack | Samurdhi Karunaratne et al. [72] | 2021 | IEEE | Conference |
S4 | New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint | Qiao Tian et al. [73] | 2019 | IEEE | Journal |
S5 | Improving Wireless Network Security Based On Radio Fingerprinting | Yun Lin et al. [74] | 2019 | IEEE | Conference |
S6 | Identification and authentication for wireless transmission security based on RF-DNA fingerprint | Xueli Wang et al. [75] | 2019 | Springer | Journal |
S7 | Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots | Gianmarco Baldini et al. [76] | 2018 | Wiley | Journal |
S8 | An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology | Qiao Tian et al. [77] | 2020 | MDPI | Journal |
S9 | Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things | Sekhar Rajendran et al. [78] | 2021 | IEEE | Journal |
S10 | Securing Wireless Communication Using RF Fingerprinting | Nur Sabryna Aminuddin et al. [79] | 2021 | IEEE | Conference |
S11 | Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM | Donald Reising et al. [80] | 2021 | IEEE | Journal |
S12 | A LSTM-Based Channel Fingerprinting Method for Intrusion Detection | Ting Ma et al. [7] | 2021 | IEEE | Conference |
S13 | Identification of Wireless Transceiver Devices Using Radio Frequency (RF) Fingerprinting Based on STFT Analysis to Enhance Authentication Security | Songlin Chen et al. [81] | 2017 | IEEE | Conference |
S14 | Wi-SUN Device Authentication using Physical Layer Fingerprint | Mi-Kyung Oh et al. [82] | 2021 | IEEE | Conference |
S15 | Deep-Learning-Aided RF Fingerprinting for NFC Security | Woongsup Lee et al. [83] | 2021 | IEEE | Journal |
S16 | A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network | XIAOYING QIU et al. [84] | 2020 | IEEE | Journal |
S17 | A Novel Physical Layer Authentication Method with Convolutional Neural Network | Runfa Liao QIU et al. [85] | 2019 | IEEE | Conference |
S18 | Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks | Songlin Chen et al. [86] | 2021 | IEEE | Journal |
S19 | Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS | Fei Pan et al. [87] | 2019 | IEEE | Journal |
S20 | Physical layer Channel Authentication for 5G via Machine Learning Algorithm | Songlin Chen et al. [88] | 2018 | Hindawi | Journal |
S21 | PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks | Liang Xiao et al. [89] | 2016 | IEEE | Journal |
S22 | Multiuser Physical Layer Authentication in Internet of Things with Data Augmentation | Run-Fa Liao et al. [90] | 2019 | IEEE | Journal |
S23 | Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications | Jiseok Yoon et al. [91] | 2019 | IEEE | Conference |
S24 | Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning | Linda Senigagliesi et al. [92] | 2021 | IEEE | Conference |
S25 | Physical Layer Authentication Algorithm Based on SVM | Chuping Dai et al. [93] | 2016 | IEEE | Conference |
S26 | A Physical Layer Authentication Mechanism for IoT Devices | Xinglu Li et al. [8] | 2021 | IEEE | Journal |
S27 | Multiuser physical layer security mechanism in the wireless communication system of the IIOT | Ruizhong Du et al. [94] | 2022 | Science Direct | Journal |
S28 | Physical layer Authentication Using Channel State Information and Machine Learning | Ken St. Germain, Frank Kragh [33] | 2020 | IEEE | Conference |
S29 | Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks | Run-Fa Liao et al. [53] | 2019 | MDPI | Journal |
S30 | Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines | TIEP M. HOANG et al. [95] | 2021 | IEEE | Journal |
S31 | RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning | Baibhab Chatterjee et al. [96] | 2018 | IEEE | Journal |
Study Number | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | QA8 | QA9 | QA10 | Total |
---|---|---|---|---|---|---|---|---|---|---|---|
S1 | 1 | 0.5 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 9.5 |
S2 | 1 | 1 | 0.5 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 9.5 |
S3 | 0.5 | 0.25 | 0.25 | 0.75 | 0.5 | 0.75 | 0.25 | 0.5 | 0.75 | 1 | 5.5 |
S4 | 0.75 | 1 | 1 | 1 | 0.5 | 1 | 0.25 | 0.5 | 1 | 1 | 8.25 |
S5 | 0.5 | 0.5 | 0.25 | 0.25 | 1 | 0.75 | 0.25 | 0.5 | 0.5 | 1 | 5.5 |
S6 | 1 | 0.75 | 0.75 | 1 | 1 | 1 | 0.5 | 1 | 1 | 1 | 9.5 |
S7 | 1 | 0 | 0.5 | 0.25 | 1 | 1 | 0.75 | 0.75 | 0.5 | 0.5 | 6 |
S8 | 1 | 1 | 0.25 | 1 | 1 | 1 | 0.5 | 1 | 1 | 0.75 | 8.25 |
S9 | 1 | 1 | 1 | 1 | 0.25 | 1 | 0.5 | 1 | 1 | 1 | 8.5 |
S10 | 1 | 1 | 1 | 1 | 1 | 1 | 0.75 | 1 | 0.75 | 1 | 9.5 |
S11 | 1 | 1 | 1 | 1 | 1 | 1 | 0.75 | 1 | 1 | 1 | 9.75 |
S12 | 1 | 0.75 | 1 | 1 | 0.75 | 0.5 | 0.25 | 0.5 | 0.5 | 0.75 | 7 |
S13 | 0.5 | 0.25 | 0 | 1 | 1 | 1 | 0.5 | 0.5 | 0.5 | 1 | 6 |
S14 | 0.75 | 0.5 | 0.75 | 1 | 0.25 | 1 | 0.25 | 0.5 | 0.5 | 1 | 6.5 |
S15 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 10 |
S16 | 1 | 1 | 1 | 1 | 1 | 1 | 0.5 | 1 | 1 | 1 | 9.5 |
S17 | 0.75 | 0 | 0.75 | 1 | 1 | 1 | 0.25 | 0.5 | 0.75 | 1 | 7 |
S18 | 1 | 1 | 1 | 1 | 1 | 1 | 0.5 | 1 | 1 | 1 | 9.5 |
S19 | 1 | 0.75 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 0.75 | 9.5 |
S20 | 1 | 0.75 | 1 | 1 | 1 | 1 | 0 | 1 | 0.75 | 1 | 8.5 |
S21 | 1 | 1 | 0.5 | 1 | 1 | 0.25 | 0.25 | 0.25 | 1 | 1 | 7.25 |
S22 | 1 | 1 | 0.5 | 1 | 1 | 0.75 | 0.75 | 0.75 | 1 | 1 | 8.75 |
S23 | 0.75 | 0.25 | 0.5 | 1 | 0.25 | 1 | 0.25 | 0.5 | 0.5 | 0.75 | 5.75 |
S24 | 0.75 | 0.25 | 0.75 | 1 | 0.25 | 1 | 0.25 | 0.75 | 0.75 | 0.5 | 6.25 |
S25 | 0.5 | 0.25 | 0.75 | 1 | 1 | 1 | 0.25 | 0.75 | 0.25 | 0.5 | 6.25 |
S26 | 1 | 0.5 | 1 | 1 | 1 | 1 | 0.25 | 1 | 1 | 1 | 8.75 |
S27 | 1 | 0.5 | 0.5 | 0 | 1 | 1 | 0.75 | 1 | 1 | 1 | 7.75 |
S28 | 1 | 1 | 0.75 | 1 | 1 | 1 | 0.75 | 1 | 1 | 1 | 9.5 |
S29 | 1 | 1 | 1 | 1 | 1 | 1 | 0.25 | 1 | 1 | 1 | 9.25 |
S30 | 1 | 1 | 1 | 1 | 1 | 1 | 0.5 | 1 | 1 | 1 | 9.75 |
S31 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 10 |
Study Number | Approaches | Algorithms | Evaluation Technique | Features | Performance Metrics | Tools/Platforms |
---|---|---|---|---|---|---|
S1 | DL | GAN-CNN | Simulated | In phase and Quadrature Data | Confusion Matrix of classification accuracy | Python (TensorFlow) |
S2 | DL | CNN-DNN-RNN | Simulated/Real test | In phase and Quadrature Data | ROC Curve and Confusion Matrix of classification accuracy | Python (Keras/ TensorFlow)-GNURadio |
S3 | DL | RNN | Simulated/Real test | In phase and Quadrature Data | Fooling Rate for different levels of SNR | Python (Keras/pyadi-iio) |
S4 | ML | KNN | Simulated | Amplitude Envelope (using Hilbert transformation) | Confusion Matrix of classification accuracy | MatLab |
S5 | ML | KNN | Simulated | Signal information in the time and the frequency domain (using Fractional Fourier Transform) | Confusion Matrix of classification accuracy | MatLab |
S6 | ML | SVM | Simulated | Phase-Frequency-Amplitude (using Hilbert transformation) | Classification Accuracy | MatLab |
S7 | DL | CNN | Simulated | In phase and Quadrature Data | Confusion Matrix of classification accuracy | Recurrence Plots (visualization tool) |
S8 | ML | SVM | Simulated | Amplitude Envelope (using Hilbert transformation) | Authentication/ Detection success rate | MatLab |
S9 | DL | CNN | Real test | Channel State Information | ROC Curve and Classification Accuracy | Not mentioned |
S10 | DL | CNN | Simulated | In phase and Quadrature Data | Confusion Matrix of classification accuracy | MatLab |
S11 | ML | SVM | Simulated | In phase and Quadrature Data | Vérification Rate | Not mentioned |
S12 | DL | RNN | Simulated | Channel State Information | Confusion Matrix of detection accuracy | Not mentioned |
S13 | ML | SVM | Simulated | Time-Frequency (using The Short Time Fourier Transform) | Recognition Rate | MatLab–GNURadio |
S14 | ML | KNN | Real test | Frequency (using Fast Fourier Transform) | Confusion Matrix of classification accuracy | MatLab |
S15 | DL | CNN-DNN-RNN | Real test | RF characteristics of an NFC tag | ROC Curve and Confusion Matrix of classification accuracy | GNURadio |
S16 | DL | CNN | Real test | Received Signal Strength Amplitudes | Detection Rate | USRP |
S17 | DL | CNN | Simulated | Channel State Information | Authentication Accuracy | Not mentioned |
S18 | ML | SVM | Simulated/Real test | Channel State Information | ROC Curve-Authentication Accuracy | USRP |
S19 | ML | SVM-DT-KNN | Simulated/Real test | Channel State Information | Authentication Accuracy | USRP |
S20 | ML | SVM-DT | Real test | Channel State Information | Detection Rate | MatLab–USRP |
S21 | ML | Reinforcement | Real test | Channel State Information | Detection Rate | USRP |
S22 | DL | DNN-CNN-CPNN | Simulated | Channel Impulse Response | Authentication Accuracy | Not mentioned |
S23 | ML | SVM-NCA | Simulated | Channel Impulse Response | ROC Curve of Authentication Accuracy | Not mentioned |
S24 | ML | KNN | Simulated | Channel Frequency Responses | Confusion Matrix of classification accuracy | Not mentioned |
S25 | ML | SVM | Simulated | Channel information and responses | Classification Accuracy | MatLab-LTE Simulator-QUALNET |
S26 | DL | CNN | Simulated | Channel State Information | Authentication Accuracy | Quasi-Deterministic Radio Channel Generator (QuaDRiGa) |
S27 | ML | SVM | Simulated | Channel Frequency Responses (using Fast Fourier Transform) | Authentication Accuracy | MatLab |
S28 | DL | GAN | Simulated | Channel State Information | Confusion Matrix of classification accuracy | Python (Keras/ TensorFlow) |
S29 | DL | DNN-CNN-CPNN | Simulated/ Real test | Channel State Information | Authentication Accuracy | USRP |
S30 | ML | SVM | Simulated | Channel State Information | ROC Curve of classification accuracy | Python |
S31 | DL | ANN | Simulated | In phase and Quadrature (Frequency-Amplitude) | Classification Accuracy | MatLab-GNURadio |
Study Number | Authentication Techniques | Proposed Solutions |
---|---|---|
S1 | RFF | Radio frequency fingerprint classifier consists of multiple discriminators to both detect malicious attackers and classify trusted transmitters. |
S2 | RFF | Radio frequency adversarial learning model generates fake signals and distinguishes trusted transmitters from rogue ones. |
S3 | RFF | Deep learning-based classifier to evaluate the feasibility of using physical layer authentication by introducing an algorithm that adds learned perturbations transmitted by an adversarial transmitter to fool the authenticator and classifying it as an authorized transmitter. |
S4 | RFF | Radio frequency fingerprint security mechanism to avoid the man-in-the-middle attack in industrial IoT scenario. |
S5 | RFF | Method based on radio frequency fingerprint to enhance wireless network security and distinguish different wireless network devices. |
S6 | RFF | Technology based on radio frequency fingerprint to find the difference among devices and identify them. |
S7 | RFF | Deep learning-based approach for the authentication of IoT wireless devices with the same model. |
S8 | RFF | Radio frequency fingerprint authentication model to solve identity authentication problems in the mobile IoT. |
S9 | RFF | Inject a designed radio frequency fingerprint into the wireless physical layer to increase the security of a stationary IoT device with minimal overhead. |
S10 | RFF | Radio frequency fingerprint models utilize raw baseband In-phase and Quadrature samples to identify the transmitting radio. |
S11 | RFF | Physical layer IoT authentication approach based on radio frequency fingerprint to successfully authorize identity (ID) verification and rejection of all rogue radio ID spoofing attacks. |
S12 | RFF | Implement an intrusion detection scheme to determine whether a spoofing attack happens. |
S13 | RFF | Radio frequency fingerprint method to identify the same wireless transceiver module. |
S14 | RFF | Radio frequency fingerprint classifier based on machine learning to identifies the authorized wireless smart utility network devices. |
S15 | RFF | Near field communication tags identification method based on deep learning and radio frequency fingerprint to enhance the security by preventing the cloning attack. |
S16 | RSS | Adaptive neural network authentication process to improve from attack detection and leading to effective physical layer security. |
S17 | CSI | A multi-user authentication system security to detecting spoofing attacks in wireless networks. |
S18 | CSI | Automated labeling and learning method for physical layer authentication where detect clone and Sybil attacks in edge computing industrial wireless network. |
S19 | CSI | Physical layer authentication approach based on machine learning algorithms in industrial wireless cyber-physical systems. |
S20 | CSI | Physical layer authentication method-based machine learning and channel features for the 5G wireless communication security by determining whether the received packets are from a legitimate transmitter or a counterfeiter. |
S21 | RSSI | PLA spoofing detection schemes based on ML in wireless networks. |
S22 | CIR | Deep learning based physical layer authentication framework to enhance the security of industrial wireless sensor networks. |
S23 | CIR | Machine learning based physical layer authentication scheme in the multi-input and multi-output wireless communication environment. |
S24 | CFR | Physical layer authentication approaches based on statistical and machine learning techniques. |
S25 | CSI | Wireless physical layer channel authentication classifier combined with machine learning algorithm. |
S26 | CSI | Physical layer authentication mechanism based on deep learning and wireless channel fingerprints to distinguish sending nodes in different locations. |
S27 | CFR | Physical layer authentication scheme for multiuser to improve the accuracy of authentication in dynamic industrial scenarios. |
S28 | CSI | Physical layer authentication method uses an adversarial neural network and measured multiple-input multiple-output communications channel information to decide on whether to authenticate a particular device. |
S29 | CSI | Deep learning based physical layer authentication methods to enhance the security of industrial sensor networks by utilizing the spatial diversity of wireless channels. |
S30 | CSI | Machine learning classifiers are considered to detect the eavesdropper who breaks into the system during the authentication phase. |
S31 | RFF | Radio frequency Physical unclonable function method where allows real-time authentication of wireless nodes that not require any additional circuitry for generation or feature extraction. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alhoraibi, L.; Alghazzawi, D.; Alhebshi, R.; Rabie, O.B.J. Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches. Sensors 2023, 23, 1814. https://doi.org/10.3390/s23041814
Alhoraibi L, Alghazzawi D, Alhebshi R, Rabie OBJ. Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches. Sensors. 2023; 23(4):1814. https://doi.org/10.3390/s23041814
Chicago/Turabian StyleAlhoraibi, Lamia, Daniyal Alghazzawi, Reemah Alhebshi, and Osama Bassam J. Rabie. 2023. "Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches" Sensors 23, no. 4: 1814. https://doi.org/10.3390/s23041814