CN109951451A - A kind of spoof attack detection method based on intensified learning in mist calculating - Google Patents

A kind of spoof attack detection method based on intensified learning in mist calculating Download PDF

Info

Publication number
CN109951451A
CN109951451A CN201910130013.3A CN201910130013A CN109951451A CN 109951451 A CN109951451 A CN 109951451A CN 201910130013 A CN201910130013 A CN 201910130013A CN 109951451 A CN109951451 A CN 109951451A
Authority
CN
China
Prior art keywords
mist
income
spoof attack
channel
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910130013.3A
Other languages
Chinese (zh)
Inventor
涂山山
于金亮
孟远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201910130013.3A priority Critical patent/CN109951451A/en
Publication of CN109951451A publication Critical patent/CN109951451A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Mist calculate in a kind of spoof attack detection method based on intensified learning belong to information security field.With the continuous development that mist calculates, while improving information processing rate, more secure communication problems also emerge gradually.It is easy the safety problem by spoof attack herein for the communication in mobile mist calculating between mist node and mobile terminal user, proposes a kind of spoof attack detection algorithm based on intensified learning.We construct the spoof attack model in mobile mist calculating first, then devise the spoof attack detection algorithm based on Q-learning algorithm under the model, realize the detection in a dynamic environment to spoof attack.The invention can effectively take precautions against spoof attack in dynamic environment, and detection performance restrains rapidly and reaches stable, detection accuracy with higher and lower average detected error rate.

Description

A kind of spoof attack detection method based on intensified learning in mist calculating
Technical field
The present invention generates physical layer security key using wireless signal channel characteristic, and uses intensified learning Q-learning Algorithm detects the spoof attack in mist calculating network and raising, to realize mist node and the secure communication of terminal user.Physics Layer key generation belongs to the communications field, belongs to computer field using intensified learning detection spoof attack.
Background technique
In the past ten years, mobile Internet flow exponentially increases, and the attraction of mobile device guides always The significant development of wireless communication and network.Be based particularly on the heterogeneous network of junior unit, magnanimity multiple-input and multiple-output (MIMO) and The revolution of millimeter (mm) wave communication, provides gigabit wirelessly access for the next generation.Long-range cloud data center is with higher Processing capacity and biggish memory storage enable reduction process mobile device to run respective calculating service.However, cloud computing Also there is certain limitation.In this new era, due to the distance between static conditions, Cloud Server and terminal user of cloud compared with Far, user may be not appropriate for low latency, reduction process, the demand of low storage to rely on the application of cloud computing, it is possible to say Cloud computing is not suitable for extensive mobile applications.
Mist calculates the extension as a kind of pair of cloud computing concept, and cloud computing is extended to network edge, can use and set Standby direct transmission link improves throughput of system, solves cloud computing poor mobility, geography information perception is weak, time delay is high etc. asks Topic, but also bring communication and problem of data safety.Equipment used in mist calculating can be router or base station, compare cloud It calculates there is no a large amount of resource, but framework used by mist calculates more shows distribution, than cloud computing closer to equipment, from And it is more able to satisfy the high application of requirement of real-time, support the mobility and location aware of terminal user.In mist calculating, mist section Point user between using it is more open, be more vulnerable to attack wireless transmission.Mist calculates different terminals in network and uses Trusting relationship between family or Internet of Things is that building cooperates environment with the necessary condition of optimization system target, a large amount of movement End equipment is communicated by wireless network with mist layer.Trust due to the opening of wireless channel, between mist node and terminal node It is faced with numerous challenges.Traditional safe practice uses close based on the technologies such as key management, digital signature, authentication Code learns system, but the mobility of terminal makes the online distribution of key, maintenance and management become highly difficult in the wireless network.Cause This is provided secure communication by the methods of signal processing, coded modulation, terminal can be helped to use using safety of physical layer technology Safe transmission scheme is established between family and mist node.Safety of physical layer technology provides while avoiding the side of eavesdropping from obtaining information , safety quantifiable communication reliable to communication party has wide research and application prospect in the case where mist calculates network environment.
Safety of physical layer key generates scheme and is believed to meet the demand for security of radio physical layer, it is using wireless What the reciprocity and randomness of fading channel generated, the essence of safety of physical layer is according to the channel medium between receiving-transmitting sides The uniqueness of channel state information (Channel State Information, CSI), randomness and reciprocity, by starting both sides Security key is generated by local computing according to accessed information, this also solves the distribution problem of key.However, physics Layer security key production rate is heavily dependent on the speed of channel variation, and in static radio environment, channel randomness is very It is low, that is to say, that attacker is easy to initiate spoof attack to user or mist node, therefore invention introduces Q-learning Algorithm detects spoof attack, in dynamic infinite environment can be with accurate detection to spoof attack.
Summary of the invention
The present invention considers the wireless communication connection in mobile mist calculates between mist node and terminal user, and applies Q-learning algorithm identifies spoof attack that mist node or terminal user are subject in intensified learning, solves mist node and end Secure wireless communication problem between end subscriber.
Present invention employs the following technical solutions:
WithIt indicates the channel vector for m-th of training sample that n-th of terminal user sends, usesIndicate n-th of terminal The channel record for m-th of training sample that user sends.We useTo indicate m-th of n-th of terminal user transmission The channel gain of training sample channel vector, so there is following hypothesis testing:
If 1) channel gain of channel vectorGreater than EA, B, then n-th of terminal user send m-th of trained sample This channel vector H0Transmitted by legitimate user, to see formula (5);
If 2) channel gain of channel vectorGreater than EA | B, I, then n-th of terminal user send m-th of trained sample This channel vector is to see formula (6) transmitted by illegal user;
Wherein, EA, BIt is the estimation channel gain of legal terminal user, EA | B, IIt is the estimation channel increasing of potential spoof attack person Benefit
Because the CSI of channel be it is unique,WithIt also is all uniquely, to there is this to assume on this basis real The statistic tested are as follows:
Wherein, | | | | it is Fu Luobinniusi norm, S is indicatedWithBetween European normalized cumulant.So can To think to work asLess than setting test threshold λ when the node be legitimate user, it may be assumed that
In contrast, whenMore than or equal to setting test threshold λ when the node person that is spoof attack, That is:
The precision of inspection assumed above depends on test threshold λ, if threshold value is excessively high will to improve omission factor (MDR);Such as Fruit threshold value is too low will to improve rate of false alarm (FAR).Herein using the Q-learning algorithms selection appropriate threshold in intensified learning.
Q-learning algorithm is a kind of extensive chemical that can find optimal solution using insufficient condition in dynamic environment Practise algorithm.Mist node is according to current state StSelect suitable threshold valueCome maximize current income andWherein CtIt is t The time of time slot between a signal, thus current income andBe then income before the time slot and with each sample in the time slot Adding up for the resulting income of data, then have following formula:
Wherein γ is the set of the training signal of illegal node-node transmission, and T is the training signal quantity transmitted in each time slot; Use RxThe movement of processing data packet is represented, is represented with 0 receive data packet respectively, 1 represents refusal data packet,It is income immediately Function.To sum up, if withIndicate the income for receiving to obtain when data packet,Then indicate the income obtained when refusal data packet, The two opposite number each other;g0Expression receives the income of valid data, g1Expression is to refuse the income of invalid data;c0It is that receiving is non- The cost of method data, c1It is the cost for refusing valid data;PA(λ) and PB(λ) is that probability its function under present threshold value λ is as follows:
The Q-learning algorithm based on ε-greedy strategy is introduced herein.Every bout mist node has the probability of ε that can select Suboptimum action, so it is 1- ε that every bout, which selects the probability of optimal action, wherein using λ*Indicate the optimal value of threshold value, λ belongs to L First of quantization level in quantization level, has probability as follows:
In Q-learning, learning rate determines that new information to what extent covers old information, i.e. μ ∈ (0,1). Q value when current t-th of state threshold is λ is expressed as Q (st, λt), wherein stRepresent t-th of state, λtIt is in t-th of time slot State threshold value.Discount factor δ indicates that, to the discount currently rewarded, by δ ∈ (0,1) expression, its bigger algorithm of value more exists Meaning immediate interests and less consider the long-term interests.State stMaximum Q functional value by V (st) indicate, state st+1Maximum Q letter Numerical value is by V (st+1) indicate.Therefore, receiving end updates its Q value according to following formula:
V(st)←maxQ(st, λ), λ ∈ { l/L } 0≤l≤L (15)
The optimal value λ of test threshold*, wherein λ belongs to first of quantization level in L quantization level, it is given by:
λ*=arg maxQ (st, λ), λ ∈ { l/L } 0≤l≤L (16)
Detailed description of the invention
Fig. 1 moves mist computation model schematic diagram
Fig. 2 key generates model schematic
For Fig. 3 as k=-3, rate of false alarm (FAR) is with the increased change for testing wheel number when testing ρ=20 and ρ=10 respectively Change analysis chart, each round updates 20 Q tables
For Fig. 4 as k=-3, rate of failing to report (MDR) is with the increased change for testing wheel number when testing ρ=20 and ρ=10 respectively Change analysis chart, each round updates 20 Q tables
For Fig. 5 as k=-3, vision response test (AER) is with the increase for testing wheel number when testing ρ=20 and ρ=10 respectively Mutation analysis figure, each round update 20 Q tables
Specific embodiment
System model used herein is as shown in Figure 1, assume herein in 20 × 20m2Room in have random dispersal Node is several, and by communicating wireless signals, wireless signal centre frequency is 2.4GHz for mobile terminal user and mist node.At X In user (X ∈ { 1,2,3 ..., x }, x ∈ N*), Y legitimate node (Y ∈ { 1,2,3 ..., y }, 1≤y≤m) is shared, Z non- Self information can be revised as the letter of legitimate node by method node (Z ∈ { 1,2,3 ..., z }, z=x-y), this Z illegal nodes Breath, to carry out spoof attack.Illegal node can be the mist node of illegal camouflage terminal user, be also possible to illegally pretend eventually The terminal node of end subscriber.
The physical layer key that the present invention uses, which generates scheme, can be roughly divided into four steps: 1) receiving end and transmitting terminal both sides are mutual Send several impulse signals;2) signal received is quantified;3) data after extracting a part quantization are as initial close Key;4) receiving end and transmitting terminal both sides carry out key agreement, are corrected with the data for ensuring to malfunction in quantizing process.
When legitimate user and legal mist node are in generating physical layer cipher key processes, receiving end generate initial key it Afterwards, both sides carry out that test portion will be added before key agreement.As shown in Fig. 2, when receiving end both sides are generating cipher key processes Middle spoof attack person launches a offensive, and can examine the normalization Euclidean distance of two continuous signal CSI with according to hypothesis in receiving end It tests gained threshold value to be compared, if not meeting null hypothesis examines setting, is judged as illegal user and discards the data.Such as Fruit meets null hypothesis and examines setting, then is judged as legitimate user and key agreement process is unfolded in both sides.
Mist node indicates that spoof attack person is indicated with I with terminal user with A and B respectively.In channel estimation phase, A Multiple training signals are sent mutually in a time slot with B, are T respectivelyAAnd TB.Then mist node, terminal user and camouflage are attacked at this time The signal Y that the person of hitting receivesA、YBAnd YISuch as following formula:
YB=GA, BTA+NB (1)
YI=GA, ITA+NI (2)
YA=GB, ATB+NA (3)
YI=GB, ITB+NI (4)
Wherein, GA, BIndicate the channel gain of A to B, GA, IIndicate the channel gain of A to I, GB, IIndicate that the channel of B to I increases Benefit.Then NA、NB、NIFor A, additive white noise (Additive White Gaussian Noise, AWGNs) existing for B, I, and Assuming that cordless communication network uses time division duplex protocol (Time-Division Duplexing, TDD).WithIt indicates n-th The channel vector for m-th of training sample that terminal user sends is usedIndicate m-th of trained sample that n-th of terminal user sends This channel record.We useCome indicate n-th of terminal user send m-th of training sample channel vector channel Gain, so there is following hypothesis testing:
If 1) channel gain of channel vectorGreater than EA, B, then n-th of terminal user send m-th of trained sample This channel vector H0Transmitted by legitimate user, to see formula (5);
If 2) channel gain of channel vectorGreater than EA | B, I, then n-th of terminal user send m-th of trained sample This channel vector is to see formula (6) transmitted by illegal user;
Wherein, EA, BIt is the estimation channel gain of legal terminal user, EA | B, IIt is the estimation channel increasing of potential spoof attack person Benefit
Because the CSI of channel be it is unique,WithIt also is all uniquely, to there is this to assume on this basis real The statistic tested are as follows:
Wherein, | | | | it is Fu Luobinniusi norm, S is indicatedWithBetween European normalized cumulant.So can To think to work asLess than setting test threshold λ when the node be legitimate user, it may be assumed that
In contrast, whenMore than or equal to setting test threshold λ when the node person that is spoof attack, That is:
The precision of inspection assumed above depends on test threshold λ, if threshold value is excessively high will to improve omission factor (MDR);Such as Fruit threshold value is too low will to improve rate of false alarm (FAR).Herein using the Q-learning algorithms selection appropriate threshold in intensified learning.
Q-learning algorithm is a kind of extensive chemical that can find optimal solution using insufficient condition in dynamic environment Practise algorithm.Mist node is according to current state StSelect suitable threshold valueCome maximize current income andWherein CtIt is one The time of time slot between signal, current income andBe then income before the time slot and with each sample data institute in the time slot Adding up for the income obtained, then have following formula:
Wherein γ is the set of the training signal of illegal node-node transmission, and T is the training signal quantity transmitted in each time slot, It is set as 20 in the present invention;Use RxThe movement of processing data packet is represented, is represented with 0 receive data packet respectively, 1 represents refusal number According to packet,It is revenue function immediately.To sum up,It is revenue function immediately, if withIndicate the receipts for receiving to obtain when data packet Benefit,Then indicate the income that obtains when refusal data packet, the two opposite number each other;g0Indicate that the income for receiving valid data is set It is set to 9, g1Expression is that the income of refusal invalid data is set as 6;c0It is to receive the cost of valid data to be set as 4, c1It is refusal The cost of invalid data is set as 2;PA(λ) and PB(λ) is that probability its function under present threshold value λ is as follows:
The Q-learning algorithm based on ε-greedy strategy is introduced herein, and every bout mist node has the probability of ε that can select Suboptimum action sets ε as 0.5, so there is select probability so it is 1- ε that every bout, which selects the probability of optimal action, in the present invention Calculation formula is as follows:
Wherein, λ belongs to first of quantization level in L quantization level, λ*For optimal threshold.
In Q-learning, learning rate determines that new information to what extent covers old information, i.e. μ ∈ (0,1), Learning rate μ is set in the present invention as 0.5.Q value when current t-th of state threshold is λ is expressed as Q (st, λt), wherein st Represent t-th of state, λtIt is the threshold value in the state of t-th of time slot.Discount factor δ is indicated to the discount currently rewarded, by δ ∈ (0,1) indicate, its bigger algorithm of value more take notice of immediate interests and it is less consider the long-term interests, in the present invention setting discount because Sub- δ is 0.8.State stMaximum Q functional value by V (st) indicate, next state st+1Maximum Q functional value by V (st+1) table Show, uses ΠtCome indicate current income and.Therefore, receiving end updates its Q value according to following formula:
V(st)←maxQ(st, λ), λ ∈ { l/L } 0≤l≤L (15)
The optimal value λ of test threshold*It is given by, wherein λ belongs to first of quantization level in L quantization level:
λ*=arg maxQ (st, λ), λ ∈ { l/L } 0≤l≤L (16).

Claims (1)

1. a kind of spoof attack detection method based on intensified learning in mist calculating, it is characterised in that:
WithIt indicates the channel vector for m-th of training sample that n-th of terminal user sends, usesIndicate n-th of terminal user The channel record of m-th of the training sample sent;WithTo indicate m-th of training sample of n-th of terminal user transmission The channel gain of channel vector, so there is following hypothesis testing:
If 1) channel gain of channel vectorGreater than EA, B, then the letter for m-th of training sample that n-th of terminal user sends Road vector H0Transmitted by legitimate user, to see formula (5);
If 2) channel gain of channel vectorGreater than EA | B, I, then n-th terminal user sends m-th of training sample Channel vector is to see formula (6) transmitted by illegal user;
Wherein, EA, BIt is the estimation channel gain of legal terminal user, EA | B, IIt is the estimation channel gain of potential spoof attack person
Because the CSI of channel be it is unique,WithIt also is all uniquely, to there is this to assume experiment on this basis Statistic are as follows:
Wherein, | | | | it is Fu Luobinniusi norm, S is indicatedWithBetween European normalized cumulant;So can recognize To work asLess than setting test threshold λ when the node be legitimate user, it may be assumed that
In contrast, whenMore than or equal to setting test threshold λ when the node person that is spoof attack, it may be assumed that
The precision of inspection assumed above depends on test threshold λ, if threshold value is excessively high will to improve omission factor;If threshold value is too low Rate of false alarm will be improved;Use the Q-learning algorithms selection appropriate threshold in intensified learning;
Mist node is according to current state StSelect suitable threshold value λ maximize current income andWherein CtIt is t-th of signal Between time slot time, so current income andBe then income before the time slot and with each sample data institute in the time slot Adding up for the income obtained, then have following formula:
Wherein γ is the set of the training signal of illegal node-node transmission, and T is the training signal quantity transmitted in each time slot;Use Rx The movement of processing data packet is represented, is represented with 0 receive data packet respectively, 1 represents refusal data packet,It is revenue function immediately; To sum up, if withIndicate the income for receiving to obtain when data packet,Then indicate that the income obtained when refusal data packet, the two are mutual For opposite number;g0Expression receives the income of valid data, g1Expression is to refuse the income of invalid data;c0It is to receive invalid data Cost, c1It is the cost for refusing valid data;PA(λ) and PB(λ) is that probability its function under present threshold value λ is as follows:
Every bout mist node has the probability of ε that can select suboptimum action, so it is 1- ε that every bout, which selects the probability of optimal action,, In use λ*Indicate the optimal value of threshold value, λ belongs to first of quantization level in L quantization level, has probability as follows:
Learning rate μ ∈ (0,1);Q value when current t-th of state threshold is λ is expressed as Q (st, λt), wherein stIt represents t-th State, λtIt is the threshold value in the state of t-th of time slot;Discount factor δ is indicated to the discount currently rewarded, by δ ∈ (0,1) table Show;State stMaximum Q functional value by V (st) indicate, state st+1Maximum Q functional value by V (st+1) indicate;Therefore, receiving end Its Q value is updated according to following formula:
V(st)←maxQ(st, λ), λ ∈ { l/L } 0≤l≤L (15)
The optimal value λ of test threshold*, wherein λ belongs to first of quantization level in L quantization level, it is given by:
λ*=arg maxQ (st, λ), λ ∈ { l/L } 0≤l≤L (16).
CN201910130013.3A 2019-02-21 2019-02-21 A kind of spoof attack detection method based on intensified learning in mist calculating Pending CN109951451A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910130013.3A CN109951451A (en) 2019-02-21 2019-02-21 A kind of spoof attack detection method based on intensified learning in mist calculating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910130013.3A CN109951451A (en) 2019-02-21 2019-02-21 A kind of spoof attack detection method based on intensified learning in mist calculating

Publications (1)

Publication Number Publication Date
CN109951451A true CN109951451A (en) 2019-06-28

Family

ID=67006928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910130013.3A Pending CN109951451A (en) 2019-02-21 2019-02-21 A kind of spoof attack detection method based on intensified learning in mist calculating

Country Status (1)

Country Link
CN (1) CN109951451A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401675A (en) * 2019-08-20 2019-11-01 绍兴文理学院 Uncertain ddos attack defence method under a kind of sensing cloud environment
CN110399728A (en) * 2019-07-09 2019-11-01 北京邮电大学 A kind of edge calculations method for trust evaluation of nodes, device, equipment and storage medium
CN114666075A (en) * 2020-12-08 2022-06-24 上海交通大学 Distributed network anomaly detection method and system based on depth feature coarse coding

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082513A1 (en) * 2008-09-26 2010-04-01 Lei Liu System and Method for Distributed Denial of Service Identification and Prevention
US20110214157A1 (en) * 2000-09-25 2011-09-01 Yevgeny Korsunsky Securing a network with data flow processing
CN104918249A (en) * 2015-05-04 2015-09-16 厦门大学 Wireless channel fingerprint method based on reinforcement learning
CN104994569A (en) * 2015-06-25 2015-10-21 厦门大学 Multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method
CN106612287A (en) * 2017-01-10 2017-05-03 厦门大学 Method for detecting persistent attack of cloud storage system
CN107332855A (en) * 2017-07-20 2017-11-07 浙江大学 Primary user based on enhancing learning algorithm emulates attack detection method
US20180165579A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Deep Learning Application Distribution

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110214157A1 (en) * 2000-09-25 2011-09-01 Yevgeny Korsunsky Securing a network with data flow processing
US20100082513A1 (en) * 2008-09-26 2010-04-01 Lei Liu System and Method for Distributed Denial of Service Identification and Prevention
CN104918249A (en) * 2015-05-04 2015-09-16 厦门大学 Wireless channel fingerprint method based on reinforcement learning
CN104994569A (en) * 2015-06-25 2015-10-21 厦门大学 Multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method
US20180165579A1 (en) * 2016-12-09 2018-06-14 Cisco Technology, Inc. Deep Learning Application Distribution
CN106612287A (en) * 2017-01-10 2017-05-03 厦门大学 Method for detecting persistent attack of cloud storage system
CN107332855A (en) * 2017-07-20 2017-11-07 浙江大学 Primary user based on enhancing learning algorithm emulates attack detection method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JIE XU等: "《Online Learning for Offloading and Autoscaling in》", 《IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING》 *
LIANG XIAO等: "PHY-Layer Spoofing Detection With Reinforcement", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110399728A (en) * 2019-07-09 2019-11-01 北京邮电大学 A kind of edge calculations method for trust evaluation of nodes, device, equipment and storage medium
CN110399728B (en) * 2019-07-09 2021-05-28 北京邮电大学 Edge computing node trust evaluation method, device, equipment and storage medium
CN110401675A (en) * 2019-08-20 2019-11-01 绍兴文理学院 Uncertain ddos attack defence method under a kind of sensing cloud environment
CN114666075A (en) * 2020-12-08 2022-06-24 上海交通大学 Distributed network anomaly detection method and system based on depth feature coarse coding

Similar Documents

Publication Publication Date Title
Xiao et al. PHY-layer spoofing detection with reinforcement learning in wireless networks
Fang et al. Learning-aided physical layer authentication as an intelligent process
Tu et al. Reinforcement learning assisted impersonation attack detection in device-to-device communications
Liao et al. Security enhancement for mobile edge computing through physical layer authentication
Fang et al. Fast authentication and progressive authorization in large-scale IoT: How to leverage AI for security enhancement
Liu et al. Authenticating users through fine-grained channel information
Liu et al. Practical user authentication leveraging channel state information (CSI)
Sagduyu et al. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
Zenger et al. Security analysis of quantization schemes for channel-based key extraction
Xiao et al. Spoofing detection with reinforcement learning in wireless networks
CN109951451A (en) A kind of spoof attack detection method based on intensified learning in mist calculating
Wang et al. Deep neural networks for CSI-based authentication
Weinand et al. Physical layer authentication for mission critical machine type communication using Gaussian mixture model based clustering
Kim et al. Channel effects on surrogate models of adversarial attacks against wireless signal classifiers
Chorppath et al. Bayesian mechanisms and detection methods for wireless network with malicious users
Wang et al. CSI-based physical layer authentication via deep learning
CN109039412A (en) A kind of safe transmission method of physical layer based on random wave bundle figuration
CN114727286B (en) Threshold-free multi-attribute physical layer authentication method and related equipment
Wang et al. Collaborative physical layer authentication in Internet of Things based on federated learning
Wan et al. An efficient impersonation attack detection method in fog computing
Xie et al. Physical-layer authentication in wirelessly powered communication networks
Wang et al. Physical layer spoofing detection based on sparse signal processing and fuzzy recognition
Jing et al. A Stackelberg game based physical layer authentication strategy with reinforcement learning
Upadhyaya et al. Multihypothesis sequential testing for illegitimate access and collision-based attack detection in wireless IoT networks
Sharaf-Dabbagh et al. Transfer learning for device fingerprinting with application to cognitive radio networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190628