Wireless User Authentication Based on KLT and Gaussian Mixture Model

Physical (PHY)-layer security has received considerable interest as a way to safeguard data confidentiality and achieve security and privacy in wireless networks. Authentication between two devices is a challenging problem. In this paper, a machine learning algorithm is proposed to detect and identify rogue transmitters relying on a low-dimensional channel feature vector that is obtained by the Karhunen-Loeve transform (KLT). Specifically, a Linde-Buzo-Gray algorithm is designed for improving the reliability and robustness of the proposed scheme, where a Gaussian Mixture Model (GMM) is employed to learn and track the changes of physical layer properties. Simulation results demonstrate that the proposed authentication scheme achieves a higher spoofing detection rate compared to other existing methods.

[1]  Xianbin Wang,et al.  Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.

[2]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[3]  Hong Liu,et al.  Securing wireless communications of connected vehicles with artificial intelligence , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).

[4]  Ting Jiang,et al.  Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..

[5]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[6]  Ting Jiang,et al.  Safeguarding multiuser communication using full-duplex jamming receivers , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[7]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.

[8]  Geoffrey Ye Li,et al.  Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.

[9]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[10]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[11]  Andreas Weinand,et al.  Physical Layer Authentication for Mission Critical Machine Type Communication Using Gaussian Mixture Model Based Clustering , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[12]  Weihua Zhuang,et al.  Game Theoretic Study on Channel-Based Authentication in MIMO Systems , 2017, IEEE Transactions on Vehicular Technology.

[13]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[14]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Xuemin Shen,et al.  Channel-based physical layer authentication , 2014, 2014 IEEE Global Communications Conference.