Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2022, 5(11); doi: 10.25236/AJCIS.2022.051103.

Wireless Sensor Network Physical Layer Authentication Technology Based on Dynamic Prediction of Electromagnetic Fingerprints

Author(s)

Dai Hang1, Jin Jing2,3

Corresponding Author:
Jin Jing
Affiliation(s)

1Wuhan University of Technology, Wuhan, China

2Chn Energy Zhishen Control Technology Co. Ltd.

3Beijing Engineering Research Center of Power Station Automation, Beijing, China

Abstract

The physical layer characteristics of the signal, such as electromagnetic fingerprints, will change with the time-varying channel’s variation under the influence of various factors, so that the reliability of traditional electromagnetic fingerprint authentication systems that don’t consider the dynamic changes of electromagnetic fingerprints would be reduced. In this paper, we explore and design a wireless sensor network physical layer authentication mechanism based on electromagnetic fingerprint dynamic prediction to improve the reliability of the authentication system. This system uses the LSTM network to learn and predict the dynamic of electromagnetic fingerprints affected by wireless channels and combines the unique electromagnetic fingerprint differences of legal transmitters with the channel corresponding changes to transceivers to improve the difference between the electromagnetic fingerprints from legitimate communication and the attack link, further improving the accuracy of electromagnetic fingerprint authentication. In addition, the LSTM network can also find the abnormal data and learn through continuous adaptive training to improve the detection probability.

Keywords

Time-varying channel, physical layer authentication, electromagnetic fingerprint, LSTM network

Cite This Paper

Dai Hang, Jin Jing. Wireless Sensor Network Physical Layer Authentication Technology Based on Dynamic Prediction of Electromagnetic Fingerprints. Academic Journal of Computing & Information Science (2022), Vol. 5, Issue 11: 18-27. https://doi.org/10.25236/AJCIS.2022.051103.

References

[1] Yuwen Chen et al. A Bilinear Map Pairing Based Authentication Scheme for Smart Grid Communications: PAuth [J]. IEEE Access, 2019, 7: 22633-22643.

[2] Q. Y e, J. Li, K. Qu, W. Zhuang, X. S. Shen, and X. Li, “End-to-endquality of service in 5G networks: Examining the effectiveness of anetwork slicing framework,” IEEE Veh. Technol. Mag., vol. 13, no. 2,pp. 65–74, Jun. 2018.

[3] H. Fang, X. Wang, and S. Tomasin, “Machine learning for intelligentauthentication in 5G and beyond wireless networks,” IEEE Wireless Commun., vol. 26, no. 5, pp. 55–61, Oct. 2019.

[4] Amal Hyadi and Zouheir Rezki and Mohamed-Slim Alouini. An Overview of Physical Layer Security in Wireless Communication Systems with CSIT Uncertainty [J]. IEEE Access, 2016, 4 : 6121-6132.

[5] Irram Fauzia et al. Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions [J]. Journal of Network and Computer Applications, 2022, 206.

[6] Long Jiao et al. Physical Layer Key Generation in 5G Wireless Networks [J]. IEEE Wireless Commun., 2019, 26(5) : 48-54.

[7] Wang Ning et al. Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead [J]. IEEE NETWORK, 2020, 34(6) : 198-204.

[8] I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, andM. Ylianttila, “Security for 5G and beyond,” IEEE Commun. SurveysTuts., vol. 21, no. 4, pp. 3682–3722, 4th Quart., 2019.

[9] J. Hamamreh, H. Furqan, and H. Arslan, “Classifications and appli-cations of physical layer security techniques for confidentiality: Acomprehensive survey,” IEEE Commun. Surveys Tuts., vol. 21, no. 2,pp. 1772–1828, 2nd Quart., 2019.

[10] M. A. Arfaoui et al., “Physical layer security for visible light com-munication systems: A survey,” IEEE Commun. Surveys Tuts., vol. 22,no. 3, pp. 1887–1908, 3rd Quart., 2020.

[11] Guyue Li et al. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities [J]. Entropy, 2019, 21(5): 497-497.

[12] L. Bai, L. Zhu, J. Liu, J. Choi, and W. Zhang, “Physical layer authen-tication in wireless communication networks: A survey,” J. Commun. Netw., vol. 5, no. 3, pp. 237–264, Sep. 2020.

[13] N. Xie, Z. Li and H. Tan, "A Survey of Physical-Layer Authentication in Wireless Communications," in IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 282-310, Firstquarter 2021, doi: 10.1109/COMST. 2020.3042188.

[14] Zhou Xinyu et al. A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition [J]. Ieee Internet of Things Journal, 2021, 8(14) : 11276-11289.

[15] Jianyin Lu. A New Indoor Location Algorithm Based on Radio Frequency Fingerprint Matching [J]. IEEE Access, 2020, 8: 83290-83297.

[16] Arun Kumar K A. RF Fingerprinting of Software Defined Radios Using Ensemble Learning Models [J]. Journal of Communications, 2022, 17(4).