Machine Learning for In-Region Location Verification in Wireless Networks

In-region location verification (IRLV) aims at verifying whether a user is inside a region of interest (ROI). In wireless networks, IRLV can exploit the features of the channel between the user and a set of trusted access points. In practice, the channel feature statistics is not available and we resort to machine learning (ML) solutions for IRLV. We first show that solutions based on either neural networks (NNs) or support vector machines (SVMs) with typical loss functions are Neyman-Pearson (N-P)-optimal at learning convergence for sufficiently complex learning machines and large training datasets. For a finite training, ML solutions are more accurate than the N-P test based on estimated channel statistics. Then, as estimating channel features outside the ROI may be difficult, we consider one-class classifiers, namely auto-encoder NNs and one-class SVMs which, however, are not equivalent to the generalized likelihood ratio test (GLRT), typically replacing the N-P test in the one-class problem. Numerical examples support the results in realistic wireless networks, with channel models including path-loss, shadowing, and fading.

[1]  Zhu Han,et al.  PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.

[2]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[3]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[4]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[5]  C. M. Roach,et al.  Fast curve fitting using neural networks , 1992 .

[6]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[7]  X. C. Guo,et al.  A novel LS-SVMs hyper-parameter selection based on particle swarm optimization , 2008, Neurocomputing.

[8]  Stefano Tomasin,et al.  Geo-specific encryption through implicitly authenticated location for 5G wireless systems , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[9]  Giorgio Maria Di Nunzio,et al.  Location-Verification and Network Planning via Machine Learning Approaches , 2019, 2019 International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT).

[10]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[11]  Ulrich Türke,et al.  IST-Momentum project public deliverable 5.3: Evaluation of reference and public scenarios , 2003 .

[12]  Sailes K. Sengijpta Fundamentals of Statistical Signal Processing: Estimation Theory , 1995 .

[13]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[14]  Nicola Laurenti,et al.  Optimization of anchor nodes' usage for location verification systems , 2017, 2017 International Conference on Localization and GNSS (ICL-GNSS).

[15]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[16]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[17]  Paul C. van Oorschot,et al.  CPV: Delay-Based Location Verification for the Internet , 2017, IEEE Transactions on Dependable and Secure Computing.

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[20]  K. Johana,et al.  Benchmarking Least Squares Support Vector Machine Classifiers , 2022 .

[21]  Victor C. M. Leung,et al.  Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[22]  Franco Scarselli,et al.  On the Complexity of Neural Network Classifiers: A Comparison Between Shallow and Deep Architectures , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[23]  Bruce W. Suter,et al.  The multilayer perceptron as an approximation to a Bayes optimal discriminant function , 1990, IEEE Trans. Neural Networks.

[24]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[25]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[26]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[27]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[28]  Jieping Ye,et al.  SVM versus Least Squares SVM , 2007, AISTATS.

[29]  Nicola Laurenti,et al.  Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.

[30]  Young-Sik Choi,et al.  Least squares one-class support vector machine , 2009, Pattern Recognit. Lett..

[31]  Shihao Yan,et al.  Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.

[32]  Bruce Denby,et al.  Robust indoor localization and tracking using GSM fingerprints , 2015, EURASIP J. Wirel. Commun. Netw..

[33]  Liangmin Wang,et al.  Security Verification of Location Estimate in Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[34]  Johan A. K. Suykens,et al.  Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.