4.8 Article

Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 3, Pages 2041-2051

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.2963962

Keywords

Edge computing; Cloning; Wireless communication; Communication system security; Wireless sensor networks; Authentication; Physical layer; Cyber physical security; physical layer authentication; supervised machine learning

Funding

  1. National Natural Science Foundation of China (NSFC) [61572114]
  2. National Major RD Program [2018YFB0904900, 2018YFB0904905]
  3. Sichuan Science and Technology Service Development Project [18KJFWSF0368]
  4. Sichuan Science and Technology Basic Research Condition Platform Project [2018TJPT0041]

Ask authors/readers for more resources

The article proposes a scheme using channel-based machine learning to detect clone and Sybil attacks, by exploring channel responses between sensor peers for unique fingerprints, providing accurate authentication rates, and achieving success in industrial environments without manual labeling.
In this article, a scheme to detect both clone and Sybil attacks by using channel-based machine learning is proposed. To identify malicious attacks, channel responses between sensor peers have been explored as a form of fingerprints with spatial and temporal uniqueness. Moreover, the machine-learning-based method is applied to provide a more accurate authentication rate. Specifically, by combining with edge devices, we apply a threshold detection method based on channel differences to provide offline training sample sets with labels for the machine learning algorithm, which avoids manually generating labels. Therefore, our proposed scheme is lightweight for resource constrained industrial wireless devices, since only an online-decision making is required. Extensive simulations and experiments were conducted in real industrial environments. Both results show that the authentication accuracy rate of our strategy with an appropriate threshold can achieve 84% without manual labeling.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available