END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION

被引:8
|
作者
Sun, Zhuo [1 ]
Wu, Hengmiao [2 ,4 ]
Zhao, Chenglin [2 ]
Yue, Gang [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Wireless Signal Proc & Networks Lab, Key Lab Univ Wireless Commun, Minist Educ, Beijing, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, WSPN Lab, Beijing, Peoples R China
[4] Univ Elect Sci & Technol China, Chengdu, Peoples R China
关键词
Network layers - Security systems - Deep learning - Bit error rate;
D O I
10.1109/MWC.001.2000005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming to provide more efficient and robust physical layer security strategies for wireless communications, this article investigates the endogenous security of end-to-end learning of communication by addressing two main security issues of communication: confidential transmission and user authentication. For confidential transmission, we have redesigned the loss function of the autoencoder-based deep learning communication model to combat illegal eavesdropping over wireless broadcast channels. While assuming that the eavesdropper has three different ways of decoding prior information, the probability of successful eavesdropping attack is evaluated using the bit error rate criterion. In terms of user authentication, an authentication scheme using "symbol-level fingerprints" is designed for a single user, which takes advantage of the high complexity of parameters of the deep learning model and its natural sensitivity to training conditions. In addition, by leveraging a denoising autoencoder, we extend the authentication to adapt to the multi-user access situation. Experiments have shown that the proposed authentication scheme could guarantee reliability under dynamic channel and resistance to wireless attacks. The results inspire us to rebuild an efficient physical layer secure framework for wireless communication through a new deep learning method.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 50 条
  • [41] Semi-Supervised End-to-End Learning for Integrated Sensing and Communications
    Mateos-Ramos, Jose Miguel
    Chatelier, Baptiste
    Hager, Christian
    Keskin, Musa Furkan
    Le Magoarou, Luc
    Wymeersch, Henk
    2024 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING FOR COMMUNICATION AND NETWORKING, ICMLCN 2024, 2024, : 132 - 138
  • [42] End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Elgendy, Ibrahim A.
    Abd El-Latif, Ahmed A.
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [43] The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
    Wu, HK
    Yang, SC
    Lin, YT
    34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 242 - 250
  • [44] Universally Composable End-to-End Secure Messaging
    Canetti, Ran
    Jain, Palak
    Swanberg, Marika
    Varia, Mayank
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 3 - 33
  • [45] End-to-end Reliable Message Transmission Considering Load Balancing in Wireless Networks
    Tran, Anh Tai
    Kim, Myung Kyun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (09): : 3094 - 3109
  • [46] Secure end-to-end transport over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 381 - 395
  • [47] Secure End-to-End Transport Over SCTP
    Hohendorf, Carsten
    Rathgeb, Erwin P.
    Unurkhaan, Esbold
    Tuexen, Michael
    JOURNAL OF COMPUTERS, 2007, 2 (04) : 31 - 40
  • [48] A Secure End-to-End Mobile Chat Scheme
    Chen , Hsing-Chung
    Wen, Jyh-Horng
    Yang, Cheng-Ying
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 472 - 477
  • [49] An end-to-end approach to secure routing in MANETs
    Dabideen, Stephen
    Smith, Bradley R.
    Garcia-Luna-Aceves, J. J.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 130 - 149
  • [50] SMSSec: An end-to-end protocol for secure SMS
    Lo, Johnny Li-Chang
    Bishop, Judith
    Eloff, J. H. P.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 154 - 167