Game Theoretic Spoofing Detection for Space Information Networks Using Physical Attributes

被引:1
|
作者
Abdrabou, Mohammed [1 ]
Gulliver, T. Aaron [2 ]
机构
[1] Tech Res Ctr, Cairo 11765, Egypt
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
Programmable logic arrays; Games; Satellite broadcasting; Satellites; Low earth orbit satellites; Authentication; Trajectory; Game theory; physical layer authentication (PLA); space information network (SIN); low Earth orbit (LEO) satellite; Doppler frequency spread (DS); received power (RP); sixth generation (6G) networks; LAYER SECURITY; AUTHENTICATION; SCHEME;
D O I
10.1109/TCOMM.2024.3370433
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Space information networks (SINs) have the potential to overcome the coverage and reliability limitations of cellular networks. As a result, SINs have received considerable attention as an enabling technology for sixth-generation (6G) networks to support global connectivity. SINs often employ a large number of low Earth orbit (LEO) satellites which are vulnerable to spoofing attacks. Thus, game theoretic physical layer authentication (PLA) based on Doppler frequency spread (DS) and received power (RP) attributes is proposed to provide effective authentication for these satellites. Hypothesis testing with a threshold is used to distinguish between legitimate and illegitimate (spoofer) satellites. Then, a zero-sum PLA game in which the ground station (GS) chooses the optimal detection threshold (tau*) to maximize its utility and a spoofing satellite (s) chooses the optimal attack probability (k*) to maximize its utility. Numerical results are presented to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:3947 / 3956
页数:10
相关论文
共 50 条
  • [31] Game-Theoretic Approach to Malicious Controller Detection in Software Defined Networks
    Sridharan, Vignesh
    Gurusamy, Mohan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [32] Game-Theoretic Framework for Malicious Controller Detection in Software Defined Networks
    Sridharan, Vignesh
    Gurusamy, Mohan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3107 - 3120
  • [33] Constrained anomaly detection in heterogeneous information networks with rich attributes
    Zhang R.
    Zhang G.
    Guo J.
    Jiang H.
    1600, Huazhong University of Science and Technology (45): : 26 - 31
  • [34] Game theoretic approach to optimize the throughput of cognitive radio networks in physical layer attacks
    Ahmadfard, Arash
    Jamshidi, Azizollah
    Keshavarz-Haddad, Alireza
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (03) : 1281 - 1290
  • [35] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    Lavrova, D. S.
    Solovei, R. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 937 - 943
  • [36] Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
    D. S. Lavrova
    R. S. Solovei
    Automatic Control and Computer Sciences, 2020, 54 : 937 - 943
  • [37] Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information
    Sanchez, Jon
    Saratxaga, Ibon
    Hernaez, Inma
    Navas, Eva
    Erro, Daniel
    Raitio, Tuomo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (04) : 810 - 820
  • [38] GNSS Spoofing Detection Using Multiple Sensing Devices and LSTM Networks
    Qi, Xin
    Sato, Toshio
    Wen, Zheng
    Katsuyama, Yutaka
    Tamesue, Kazuhiko
    Sato, Takuro
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (12) : 1372 - 1379
  • [39] A Neural Network Model for Intrusion Detection Using a Game Theoretic Approach
    Kaushik, Pallavi
    Dutta, Kamlesh
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 355 - 367
  • [40] Using Information Theoretic Learning Techniques to Train Neural Networks
    Deb, Manas
    Ogunfunmi, Tokunbo
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 351 - 355