Game Theoretic Spoofing Detection for Space Information Networks Using Physical Attributes

被引:1
|
作者
Abdrabou, Mohammed [1 ]
Gulliver, T. Aaron [2 ]
机构
[1] Tech Res Ctr, Cairo 11765, Egypt
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
Programmable logic arrays; Games; Satellite broadcasting; Satellites; Low earth orbit satellites; Authentication; Trajectory; Game theory; physical layer authentication (PLA); space information network (SIN); low Earth orbit (LEO) satellite; Doppler frequency spread (DS); received power (RP); sixth generation (6G) networks; LAYER SECURITY; AUTHENTICATION; SCHEME;
D O I
10.1109/TCOMM.2024.3370433
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Space information networks (SINs) have the potential to overcome the coverage and reliability limitations of cellular networks. As a result, SINs have received considerable attention as an enabling technology for sixth-generation (6G) networks to support global connectivity. SINs often employ a large number of low Earth orbit (LEO) satellites which are vulnerable to spoofing attacks. Thus, game theoretic physical layer authentication (PLA) based on Doppler frequency spread (DS) and received power (RP) attributes is proposed to provide effective authentication for these satellites. Hypothesis testing with a threshold is used to distinguish between legitimate and illegitimate (spoofer) satellites. Then, a zero-sum PLA game in which the ground station (GS) chooses the optimal detection threshold (tau*) to maximize its utility and a spoofing satellite (s) chooses the optimal attack probability (k*) to maximize its utility. Numerical results are presented to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:3947 / 3956
页数:10
相关论文
共 50 条
  • [21] Community Detection in Dynamic Social Networks: A Game-Theoretic Approach
    Alvari, Hamidreza
    Hajibagheri, Alireza
    Sukthankar, Gita
    2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 101 - 107
  • [22] Information theoretic feature space slicing for statistical anomaly detection
    Ashfaq, Ayesha Binte
    Rizvi, Sajjad
    Javed, Mobin
    Khayam, Syed Ali
    Au, Muhammad Qasim
    Al-Shaer, Ehab
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 473 - 487
  • [23] A Game-Theoretic View on the Physical Layer Security of Cognitive Radio Networks
    Houjeij, Ali
    Saad, Walid
    Basar, Tamer
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [24] Spoofing signal detection using accelerometers in IMU and GPS information
    Kwon, Keum-Cheol
    Yang, Cheol-Kwan
    Shim, Duk-Sun
    Transactions of the Korean Institute of Electrical Engineers, 2014, 63 (09): : 1273 - 1280
  • [25] Spoofing Speech Detection Using Modified Relative Phase Information
    Wang, Longbiao
    Nakagawa, Seiichi
    Zhang, Zhaofeng
    Yoshida, Yohei
    Kawakami, Yuta
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2017, 11 (04) : 660 - 670
  • [26] Replay Spoofing Attack Detection Using Deep Neural Networks
    Bakar, Bekir
    Hanilci, Cemal
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [27] The Degrees of Freedom of Wireless Networks: Information-theoretic and Physical Limits
    Franceschetti, Massimo
    Migliore, Marco D.
    Minero, Paolo
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1578 - +
  • [28] On the Efficiency of Information-Assisted Search for Parking Space: A Game-Theoretic Approach
    Kokolaki, Evangelia
    Karaliopoulos, Merkourios
    Stavrakakis, Ioannis
    SELF-ORGANIZING SYSTEMS: 7TH IFIP TC 6 INTERNATIONAL WORKSHOP (IWSOS 2013), 2014, 8221 : 54 - 65
  • [29] A game-theoretic intrusion detection model for mobile ad hoc networks
    Otrok, Hadi
    Mohammed, Noman
    Wang, Lingyu
    Debbabi, Mourad
    Bhattacharya, Prabir
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 708 - 721
  • [30] A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
    Patcha, A
    Park, JM
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 280 - 284