Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks

In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes’ authentication method, the convolutional neural network (CNN)-based sensor nodes’ authentication method, and the convolution preprocessing neural network (CPNN)-based sensor nodes’ authentication method, have been adopted to implement the PHY-layer authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed method can implement a lightweight authentication for the sensor nodes under the edge computing (EC) system in IWSNs.

[1]  Ming Xiao,et al.  Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.

[2]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[3]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[4]  Wolfgang Kellerer,et al.  Achieving Hybrid Wired/Wireless Industrial Networks With WDetServ: Reliability-Based Scheduling for Delay Guarantees , 2018, IEEE Transactions on Industrial Informatics.

[5]  Hong Wen,et al.  A Novel Physical Layer Authentication Method with Convolutional Neural Network , 2019, 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA).

[6]  Manu Bansal,et al.  A review on lightweight cryptography algorithms for data security and authentication in IoTs , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[7]  Mert Bal Industrial applications of collaborative Wireless Sensor Networks: A survey , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).

[8]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[9]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Abdesselam Bouzerdoum,et al.  A generalized feedforward neural network architecture for classification and regression , 2003, Neural Networks.

[11]  Georges Kaddoum,et al.  Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets , 2018, 2018 IEEE International Conference on Communications (ICC).

[12]  Hong Wen,et al.  Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..

[13]  Hong Wen,et al.  The Rayleigh Fading Channel Prediction via Deep Learning , 2018, Wirel. Commun. Mob. Comput..

[14]  Xuemin Shen,et al.  Channel-based physical layer authentication , 2014, 2014 IEEE Global Communications Conference.

[15]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.

[16]  Mihail L. Sichitiu,et al.  Physical Security Perimeters for Wireless Local Area Networks , 2006, Int. J. Netw. Secur..

[17]  Meng Joo Er,et al.  Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[18]  H. Vincent Poor,et al.  Authenticating Users Through Fine-Grained Channel Information , 2018, IEEE Transactions on Mobile Computing.

[19]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[20]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[21]  Matthias Hollick,et al.  Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.

[22]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[23]  Geoffrey Ye Li,et al.  Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.

[24]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[25]  Zhibo Pang,et al.  Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions , 2017, IEEE Transactions on Industrial Informatics.

[26]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[27]  Liang Xiao,et al.  Learning-Based PHY-Layer Authentication for Underwater Sensor Networks , 2019, IEEE Communications Letters.

[28]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[29]  Georges Kaddoum,et al.  Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[30]  R. Clarke A statistical theory of mobile-radio reception , 1968 .

[31]  Wei Wei,et al.  RSA-based digital image encryption algorithm in wireless sensor networks , 2010, 2010 2nd International Conference on Signal Processing Systems.

[32]  J.A. Anderson,et al.  Neural Network Models for Pattern Recognition and Associative Memory , 2002 .