Channel-Based Authentication Game in MIMO Systems

In this paper, we investigate the PHY-layer authentication that exploits radio channel information to detect spoofing attacks in multiple- input multiple-output (MIMO) systems. We formulate the interactions between a receiver and a spoofing node in the spoofing detection as a zero-sum game. In this game, the receiver chooses the test threshold of the hypothesis test in the PHY-layer authentication to maximize its utility based on the Bayesian risk in the spoofing detection, while the adversary chooses its attack frequency, i.e., how often a spoofing packet is sent over multiple antennas. The unique Nash equilibrium of the static MIMO authentication game is derived and the condition for its existence is discussed. We investigate the impact of the number of antennas on the performance of the dynamic authentication game. We propose a PHY-layer spoofing detection based on Q-learning for MIMO systems to achieve the optimal test threshold in the spoofing detection via trials, and implement it over universal software radio peripherals. The performance of the spoofing detection algorithm is evaluated via experiments in indoor environments.

[1]  Bin Sun,et al.  Cooperative Game Approach to Power Allocation for Target Tracking in Distributed MIMO Radar Sensor Networks , 2015, IEEE Sensors Journal.

[2]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[4]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[5]  Wei-Ho Chung,et al.  Distributed channel assignment for network MIMO: game-theoretic formulation and stochastic learning , 2015, Wirel. Networks.

[6]  A. Lee Swindlehurst,et al.  Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[7]  M. J. Gans,et al.  On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..

[8]  Nicola Laurenti,et al.  Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.

[9]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[10]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[11]  Larry J. Greenstein,et al.  MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[12]  Liang Xiao,et al.  Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.

[13]  Matt Henricksen,et al.  Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions" , 2013, IEEE Communications Letters.

[14]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[15]  Hong Wen,et al.  A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.

[16]  Hui Li,et al.  Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.

[17]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).