4.8 Article

Clone Detection Based on BPNN and Physical Layer Reputation for Industrial Wireless CPS

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 5, Pages 3693-3702

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3028120

Keywords

Cloning; Physical layer; Servers; Image edge detection; Communication system security; Wireless communication; Wireless sensor networks; Back propagation neural network (BPNN); cyber– physical security; physical layer clone detection; physical layer reputation

Funding

  1. Disciplinary Construction Double Support Project from Sichuan Agricultural University [035/2021993120]

Ask authors/readers for more resources

Existing clone detection schemes for industrial wireless cyber-physical systems are either based on upper layer observations or physical layer channel state information. This article proposes a scheme that applies physical layer reputation and back propagation neural network to improve detection accuracy. The scheme accumulates physical layer reputations and inputs them to the neural network for attack detection and tracing.
Industrial wireless cyber-physical systems are vulnerable to malicious node attacks, for example, clone node attack. The existing clone detection schemes are either based on upper layer observations or physical layer channel state information. The schemes based on upper layer observations are vulnerable to defamation while the schemes based on channel state information perform better against defamation, but are badly affected by channel conditions. This article applies physical layer reputation and back propagation neural network to clone detection, aiming at improving the detection accuracy. The proposed scheme accumulates the physical layer reputations by channel state information and input them to the neural network. The cloud server performs attack detection by group detection first. If a certain group is classified as attacked, the corresponding edge processor will perform attack tracing to identify the specific clone nodes. During the attack tracing stage, multiple reputations of each node is adopted for a comprehensive inspection. Extensive experiments are conducted on the Universal Software Radio Peripheral platform. The numerical results show that the proposed scheme significantly improves the detection accuracy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available