A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

被引:0
|
作者
Meng, Rui [1 ]
Xu, Bingxuan [1 ]
Xu, Xiaodong [1 ,2 ]
Sun, Mengying [1 ]
Wang, Bizhu [1 ]
Han, Shujun [1 ]
Lv, Suyu [3 ]
Zhang, Ping [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Peng Cheng Lab, Dept Broadband Commun, Shenzhen 518066, Guangdong, Peoples R China
[3] Beijing Univ Technol, Sch Informat Sci & Technol, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Physical-layer authentication; Machine learning; Identity security; FREQUENCY FINGERPRINT IDENTIFICATION; AUTOMATIC MODULATION CLASSIFICATION; EMITTER IDENTIFICATION; OPEN-SET; SPOOFING DETECTION; DATA AUGMENTATION; RF FINGERPRINTS; NEURAL-NETWORKS; CHANNEL; SECURITY;
D O I
10.1016/j.jnca.2024.104085
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low compatibility, reliability, and high complexity. Physical-Layer Authentication (PLA) is emerging as a promising complement due to its exploitation of unique properties in wireless environments. Recently, Machine Learning (ML)-based PLA has gained attention for its intelligence, adaptability, universality, and scalability compared to non-ML approaches. However, a comprehensive overview of state-of-the-art ML-based PLA and its foundational aspects is lacking. This paper presents a comprehensive survey of characteristics and technologies that can be used in the ML-based PLA. We categorize existing ML-based PLA schemes into two main types: multi-device identification and attack detection schemes. In deep learning-based multi-device identification schemes, Deep Neural Networks are employed to train models, avoiding complex processing and expert feature transformation. Deep learning-based multi-device identification schemes are further subdivided, with schemes based on Convolutional Neural Networks being extensively researched. In ML-based attack detection schemes, receivers utilize intelligent ML techniques to set detection thresholds automatically, eliminating the need for manual calculation or knowledge of channel models. ML-based attack detection schemes are categorized into three sub-types: Supervised Learning, Unsupervised Learning, and Reinforcement Learning. Additionally, we summarize open-source datasets used for PLA, encompassing Radio Frequency fingerprints and channel fingerprints. Finally, this paper outlines future research directions to guide researchers in related fields.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] A Survey of Physical-Layer Authentication in Wireless Communications
    Xie, Ning
    Li, Zhuoyuan
    Tan, Haijun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 282 - 310
  • [2] Physical-Layer Authentication Based on Extreme Learning Machine
    Wang, Ning
    Jiang, Ting
    Lv, Shichao
    Xiao, Liang
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1557 - 1560
  • [3] Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications
    Yoon, Jiseok
    Lee, Younggu
    Hwang, Euiseok
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 63 - 65
  • [4] Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [5] Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks
    Xiao, Liang
    Lu, Xiaozhen
    Xu, Tangwei
    Zhuang, Weihua
    Dai, Huaiyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2535 - 2547
  • [6] Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN
    Pourghasem, Azita
    Kirner, Raimund
    Tsokanos, Athanasios
    Mporas, Iosif
    Mylonas, Alexios
    FUTURE INTERNET, 2025, 17 (02)
  • [7] Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications
    Nan, Guoshun
    Li, Zhichun
    Zhai, Jinli
    Cui, Qimei
    Chen, Gong
    Du, Xin
    Zhang, Xuefei
    Tao, Xiaofeng
    Han, Zhu
    Quek, Tony Q. S.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (08) : 2592 - 2608
  • [8] A machine learning-based physical layer authentication with phase impairments
    Khatab, Zahra Ezzati
    Mohammadi, Abbas
    Pourahmadi, Vahid
    Kuhestani, Ali
    PHYSICAL COMMUNICATION, 2025, 68
  • [9] Authentication at the Physical Layer with Cooperative Communications and Machine Learning
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    2022 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT), 2022, : 71 - 76
  • [10] Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,