Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks

Gao, Ning and Ni, Qiang and Feng, Daquan and Jing, Xiaojun and Cao, Yue (2020) Physical Layer Authentication under Intelligent Spoofing in Wireless Sensor Networks. Signal Processing, 166: 107272. ISSN 0165-1684

[thumbnail of SIGPRO-D-19-00145R1(1)]
Text (SIGPRO-D-19-00145R1(1))
SIGPRO_D_19_00145R1_1_.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (759kB)

Abstract

Location based access in wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we investigate the physical layer (PHY-layer) authentication in the threat of an intelligent location spoofing attack. The intelligent attack can emulate the legitimate channel information and maximize its long-term cumulative reward. First, we analyze the feasibility of this intelligent attack and investigate how it threats to the networks. Specifically, we derive the optimal transmit power allocation and find the worst case for the defenders, namely optimal intelligent attack, in which the attacker can learn the intelligent attack action based on the beamforming with optimal transmit power allocation. To defend against such an intelligent attack with high accuracy and low overhead, we develop a cooperative PHY-layer authentication scheme. Then, we provide an in-depth analysis on the belief and derive the belief bounds and the closed-form expression for the belief threshold. Furthermore, considering the whole computation complexity and the double counting problem in a loopy graph, we propose the cooperative neighbour selection algorithm to accelerate belief convergence and reduce the overhead. Finally, the simulation results reveal that the proposed method can significantly improve the defense performance compared with the state-of-art methods.

Item Type:
Journal Article
Journal or Publication Title:
Signal Processing
Additional Information:
This is the author’s version of a work that was accepted for publication in Signal Processing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing, 166, 2020 DOI: 10.1016/j.sigpro.2019.107272
Subjects:
?? physical layer authenticationintelligent location spoofingwsn ??
ID Code:
136391
Deposited By:
Deposited On:
03 Sep 2019 07:45
Refereed?:
Yes
Published?:
Published
Last Modified:
19 Sep 2024 02:21