Home > Research > Publications & Outputs > Physical Layer Authentication under Intelligent...

Electronic data

  • SIGPRO-D-19-00145R1(1)

    Rights statement: This is the author’s version of a work that was accepted for publication in Signal Processing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing, 166, 2020 DOI: 10.1016/j.sigpro.2019.107272

    Accepted author manuscript, 741 KB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks. / Gao, Ning; Ni, Qiang; Feng, Daquan et al.
In: Signal Processing, Vol. 166, 107272, 01.01.2020.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Gao N, Ni Q, Feng D, Jing X, Cao Y. Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks. Signal Processing. 2020 Jan 1;166:107272. Epub 2019 Aug 27. doi: 10.1016/j.sigpro.2019.107272

Author

Gao, Ning ; Ni, Qiang ; Feng, Daquan et al. / Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks. In: Signal Processing. 2020 ; Vol. 166.

Bibtex

@article{34ff4c70b2f94c5d99cfa934d22e687b,
title = "Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks",
abstract = "Location based access in wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we investigate the physical layer (PHY-layer) authentication in the threat of an intelligent location spoofing attack. The intelligent attack can emulate the legitimate channel information and maximize its long-term cumulative reward. First, we analyze the feasibility of this intelligent attack and investigate how it threats to the networks. Specifically, we derive the optimal transmit power allocation and find the worst case for the defenders, namely optimal intelligent attack, in which the attacker can learn the intelligent attack action based on the beamforming with optimal transmit power allocation. To defend against such an intelligent attack with high accuracy and low overhead, we develop a cooperative PHY-layer authentication scheme. Then, we provide an in-depth analysis on the belief and derive the belief bounds and the closed-form expression for the belief threshold. Furthermore, considering the whole computation complexity and the double counting problem in a loopy graph, we propose the cooperative neighbour selection algorithm to accelerate belief convergence and reduce the overhead. Finally, the simulation results reveal that the proposed method can significantly improve the defense performance compared with the state-of-art methods.",
keywords = "Physical layer authentication, Intelligent location spoofing, WSN",
author = "Ning Gao and Qiang Ni and Daquan Feng and Xiaojun Jing and Yue Cao",
note = "This is the author{\textquoteright}s version of a work that was accepted for publication in Signal Processing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing, 166, 2020 DOI: 10.1016/j.sigpro.2019.107272",
year = "2020",
month = jan,
day = "1",
doi = "10.1016/j.sigpro.2019.107272",
language = "English",
volume = "166",
journal = "Signal Processing",
issn = "0165-1684",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks

AU - Gao, Ning

AU - Ni, Qiang

AU - Feng, Daquan

AU - Jing, Xiaojun

AU - Cao, Yue

N1 - This is the author’s version of a work that was accepted for publication in Signal Processing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing, 166, 2020 DOI: 10.1016/j.sigpro.2019.107272

PY - 2020/1/1

Y1 - 2020/1/1

N2 - Location based access in wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we investigate the physical layer (PHY-layer) authentication in the threat of an intelligent location spoofing attack. The intelligent attack can emulate the legitimate channel information and maximize its long-term cumulative reward. First, we analyze the feasibility of this intelligent attack and investigate how it threats to the networks. Specifically, we derive the optimal transmit power allocation and find the worst case for the defenders, namely optimal intelligent attack, in which the attacker can learn the intelligent attack action based on the beamforming with optimal transmit power allocation. To defend against such an intelligent attack with high accuracy and low overhead, we develop a cooperative PHY-layer authentication scheme. Then, we provide an in-depth analysis on the belief and derive the belief bounds and the closed-form expression for the belief threshold. Furthermore, considering the whole computation complexity and the double counting problem in a loopy graph, we propose the cooperative neighbour selection algorithm to accelerate belief convergence and reduce the overhead. Finally, the simulation results reveal that the proposed method can significantly improve the defense performance compared with the state-of-art methods.

AB - Location based access in wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we investigate the physical layer (PHY-layer) authentication in the threat of an intelligent location spoofing attack. The intelligent attack can emulate the legitimate channel information and maximize its long-term cumulative reward. First, we analyze the feasibility of this intelligent attack and investigate how it threats to the networks. Specifically, we derive the optimal transmit power allocation and find the worst case for the defenders, namely optimal intelligent attack, in which the attacker can learn the intelligent attack action based on the beamforming with optimal transmit power allocation. To defend against such an intelligent attack with high accuracy and low overhead, we develop a cooperative PHY-layer authentication scheme. Then, we provide an in-depth analysis on the belief and derive the belief bounds and the closed-form expression for the belief threshold. Furthermore, considering the whole computation complexity and the double counting problem in a loopy graph, we propose the cooperative neighbour selection algorithm to accelerate belief convergence and reduce the overhead. Finally, the simulation results reveal that the proposed method can significantly improve the defense performance compared with the state-of-art methods.

KW - Physical layer authentication

KW - Intelligent location spoofing

KW - WSN

U2 - 10.1016/j.sigpro.2019.107272

DO - 10.1016/j.sigpro.2019.107272

M3 - Journal article

VL - 166

JO - Signal Processing

JF - Signal Processing

SN - 0165-1684

M1 - 107272

ER -