Game Theoretic Spoofing Detection for Space Information Networks Using Physical Attributes

被引:1
|
作者
Abdrabou, Mohammed [1 ]
Gulliver, T. Aaron [2 ]
机构
[1] Tech Res Ctr, Cairo 11765, Egypt
[2] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8W 2Y2, Canada
关键词
Programmable logic arrays; Games; Satellite broadcasting; Satellites; Low earth orbit satellites; Authentication; Trajectory; Game theory; physical layer authentication (PLA); space information network (SIN); low Earth orbit (LEO) satellite; Doppler frequency spread (DS); received power (RP); sixth generation (6G) networks; LAYER SECURITY; AUTHENTICATION; SCHEME;
D O I
10.1109/TCOMM.2024.3370433
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Space information networks (SINs) have the potential to overcome the coverage and reliability limitations of cellular networks. As a result, SINs have received considerable attention as an enabling technology for sixth-generation (6G) networks to support global connectivity. SINs often employ a large number of low Earth orbit (LEO) satellites which are vulnerable to spoofing attacks. Thus, game theoretic physical layer authentication (PLA) based on Doppler frequency spread (DS) and received power (RP) attributes is proposed to provide effective authentication for these satellites. Hypothesis testing with a threshold is used to distinguish between legitimate and illegitimate (spoofer) satellites. Then, a zero-sum PLA game in which the ground station (GS) chooses the optimal detection threshold (tau*) to maximize its utility and a spoofing satellite (s) chooses the optimal attack probability (k*) to maximize its utility. Numerical results are presented to demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:3947 / 3956
页数:10
相关论文
共 50 条
  • [41] Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
    Xia, Shida
    Li, Na
    Xiaofeng, Tao
    Fang, Chao
    PROCEEDINGS OF 2018 1ST IEEE INTERNATIONAL CONFERENCE ON HOT INFORMATION-CENTRIC NETWORKING (HOTICN 2018), 2018, : 242 - 243
  • [42] Infrastructure Resilience Using Cyber-Physical Game-Theoretic Approach
    Rao, Nageswara S., V
    Poole, Steve W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    2013 6TH INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS), 2013, : 31 - 36
  • [43] A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
    Moosavi, Hussein
    Bui, Francis Minhthang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1367 - 1379
  • [44] A Game-Theoretic Approach for Energy-Efficient Detection in Radar Sensor Networks
    Bacci, Giacomo
    Sanguinetti, Luca
    Greco, Maria S.
    Luise, Marco
    2012 IEEE 7TH SENSOR ARRAY AND MULTICHANNEL SIGNAL PROCESSING WORKSHOP (SAM), 2012, : 157 - 160
  • [45] GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks
    Zhu, Quanyan
    Fung, Carol
    Boutaba, Raouf
    Basar, Tamer
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (11) : 2220 - 2230
  • [46] Space-Based Detection of Spoofing AIS Signals Using Doppler Frequency
    Guo, Shanzeng
    MULTISENSOR, MULTISOURCE INFORMATION FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS 2014, 2014, 9121
  • [47] Community detection using multitopology and attributes in social networks
    Liu, Changzheng
    Huang, Fengling
    Li, Ruixuan
    Yang, Qi
    Li, Yuhua
    Yu, Shui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (12):
  • [48] Transmit Power Optimization in Cognitive Radio Networks Using Game Theoretic Approach
    Sharma, Anjana
    Hastir, Vikas
    Saini, Davinder S.
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 312 - 316
  • [49] A Game Theoretic Approach for Adversarial Pipeline Monitoring using Wireless Sensor Networks
    Islam, Mohammad Saiful
    Nix, Robert
    Kantarcioglu, Murat
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 37 - 44
  • [50] Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach
    Zhu, Guang
    Liu, Hu
    Feng, Mining
    MATHEMATICS, 2018, 6 (10)