Spoofing Detection with Reinforcement Learning in Wireless Networks

In this paper, we investigate the PHY-layer authentication in wireless networks, which exploits PHY-layer channel information such as the received signal strength indicators to detect spoofing attacks. The interactions between a legitimate receiver node and a spoofer are formulated as a PHY- authentication game. More specifically, the receiver chooses the test threshold in the hypothesis test of the spoofing detection to maximize its expected utility based on Bayesian risk to detect the spoofer. On the other hand, the spoofing node decides its attack strength, i.e., the frequency to send a spoofing packet that claims to use another node's MAC address, based on its individual utility in the zero-sum game. As it is challenging for most radio nodes to obtain the exact channel models in advance in a dynamic radio environment, we propose a spoofing detection scheme based on reinforcement learning techniques, which achieves the optimal test threshold in the spoofing detection via Q-learning and implement it over universal software radio peripherals (USRP). Experimental results are presented to validate its efficiency in spoofing detection.

[1]  Xianbin Wang,et al.  An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI , 2013, 2013 13th Canadian Workshop on Information Theory.

[2]  Larry J. Greenstein,et al.  PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[3]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[4]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[5]  Zhen Yang,et al.  Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.

[6]  Eyal de Lara,et al.  Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.

[7]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Jie Yang,et al.  Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.

[9]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[10]  Xiang-Yang Li,et al.  Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.

[11]  Xianbin Wang,et al.  Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[12]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[13]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Jitendra K. Tugnait,et al.  A channel-based hypothesis testing approach to enhance user authentication in wireless networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).