GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme

Authentication schemes based on wireless physical layer channel information have gained significant attention in recent years. It has been shown in recent studies, that the channel based authentication can either cooperate with existing higher layer security protocols or provide some degree of security to networks without central authority such as sensor networks. We propose a Gaussian Mixture Model based semi-supervised learning technique to identify intruders in the network by building a probabilistic model of the wireless channel of the network users. We show that even without having a complete apriori knowledge of the statistics of intruders and users in the network, our technique can learn and update the model in an online fashion while maintaining high detection rate. We experimentally demonstrate our proposed technique leveraging pattern diversity and show using measured channels that miss detection rates as low as 0.1% for false alarm rate of 0.3% can be achieved.

[1]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[2]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[3]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[4]  Kapil R. Dandekar,et al.  Two port reconfigurable CRLH leaky wave antenna with improved impedance matching and beam tuning , 2009, 2009 3rd European Conference on Antennas and Propagation.

[5]  Hamid Jafarkhani,et al.  A reconfigurable multiple-input multiple-output communication system , 2008, IEEE Transactions on Wireless Communications.

[6]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[7]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[8]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[9]  Kapil R. Dandekar,et al.  A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks , 2012 .

[10]  B. Clerckx,et al.  Channel Characterization of Indoor Wireless Personal Area Networks , 2006, IEEE Transactions on Antennas and Propagation.

[11]  Kapil R. Dandekar,et al.  Enhancing wireless security through reconfigurable antennas , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).

[12]  Mohammed J. Zaki,et al.  ADMIT: anomaly-based data mining for intrusions , 2002, KDD.

[13]  J.-E. Berg,et al.  Temporal radio channel variations with stationary terminal , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[14]  Kapil R. Dandekar,et al.  Impact of pattern reconfigurable antennas on Interference Alignment over measured channels , 2012, 2012 IEEE Globecom Workshops.

[15]  P. Pagani,et al.  Characterization and Modeling of Temporal Variations on an Ultrawideband Radio Link , 2006, IEEE Transactions on Antennas and Propagation.

[16]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[17]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[18]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Srinivasan Parthasarathy,et al.  Towards NIC-based intrusion detection , 2003, KDD '03.

[20]  R. Redner,et al.  Mixture densities, maximum likelihood, and the EM algorithm , 1984 .

[21]  David González,et al.  Learning algorithm for reconfigurable antenna state selection , 2012, 2012 IEEE Radio and Wireless Symposium.