Identification of Active Attacks in Internet of Things: Joint Model- and Data-Driven Automatic Modulation Classification Approach

被引:46
|
作者
Huang, Sai [1 ]
Lin, Chunsheng [1 ]
Xu, Wenjun [1 ]
Gao, Yue [2 ]
Feng, Zhiyong [1 ]
Zhu, Fusheng [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing 100876, Peoples R China
[2] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[3] Guangdong Commun & Networks Inst, Guangzhou 510700, Guangdong, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Feature extraction; Modulation; Machine learning; Internet of Things; Jamming; Training; Reliability; Automatic modulation classification (AMC); cyclic correntropy spectral density; deep learning (DL); Internet of Things (IoT); physical-layer security;
D O I
10.1109/JIOT.2020.3016125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) pervades every aspect of our daily lives and industrial productions since billions of interconnected devices are deployed everywhere of the globe. However, the seamless IoT unveils a number of physical-layer threats, such as jamming and spoofing that decrease the communication performance and the reliability of the IoT systems. As the process of identifying the modulation format of signals corrupted by noise and fading, automatic modulation classification (AMC) plays a vital role in physical-layer security as it can detect and identify the pilot jamming, deceptive jamming, and sybil attacks. In this article, we propose a novel cyclic correntropy vector (CCV)-based AMC method using long short-term memory densely connected network (LSMD). Specifically, cyclic correntropy model-driven feature CCV is first extracted using the received signals as it contains both the second-order and the higher order characteristics of cyclostationary. Then, the extracted CCV feature is put into the data-driven LSMD which mainly consists of long short-term memory (LSTM) network and dense network (DenseNet). Moreover, an additive cosine loss is utilized to train the LSMD for maximizing the interclass feature differences and minimizing the intraclass feature variations. Simulations demonstrate that the proposed CCV-LSMD method yields superior performance than other recent schemes.
引用
收藏
页码:2051 / 2065
页数:15
相关论文
共 41 条
  • [1] Modulation Classification of Active Attacks in Internet of Things: Lightweight MCBLDN With Spatial Transformer Network
    Zhang, Ruiyun
    Chang, Shuo
    Wei, Zhiqing
    Zhang, Yifan
    Huang, Sai
    Feng, Zhiyong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 19132 - 19146
  • [2] Data-Driven Ship Stay Behavior Identification in Maritime Internet of Things System
    Yin, Shangkun
    Qian, Huigang
    Huang, Tao
    Huo, Xiaojie
    Liu, Ryan Wen
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 403 - 410
  • [3] Data-Driven Intelligent Model for the Classification, Identification, and Determination of Data Clusters and Defect Location in a Welded Joint
    Oleka, Chijioke Jerry
    Aikhuele, Daniel Osezua
    Omorogiuwa, Eseosa
    PROCESSES, 2022, 10 (10)
  • [4] A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things
    Meng, Dian
    Xiao, Yang
    Guo, Zhiwei
    Jolfaei, Alireza
    Qin, Lanxia
    Lu, Xinting
    Xiang, Qiao
    COMPUTER COMMUNICATIONS, 2021, 179 : 231 - 241
  • [5] Identification for control approach to data-driven model predictive control
    Zakeri, Yadollah
    Sheikholeslam, Farid
    Haeri, Mohammad
    INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2024, 18 (03) : 281 - 301
  • [6] A Robust Predicted Performance Analysis Approach for Data-Driven Product Development in the Industrial Internet of Things
    Zheng, Hao
    Feng, Yixiong
    Gao, Yicong
    Tan, Jianrong
    SENSORS, 2018, 18 (09)
  • [7] A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
    Hao Xu
    Zihan Sun
    Yuan Cao
    Hazrat Bilal
    Soft Computing, 2023, 27 : 14469 - 14481
  • [8] A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
    Xu, Hao
    Sun, Zihan
    Cao, Yuan
    Bilal, Hazrat
    SOFT COMPUTING, 2023, 27 (19) : 14469 - 14481
  • [9] Exploration on human resource management and prediction model of data-driven information security in Internet of Things
    Niu, Xuejie
    HELIYON, 2024, 10 (09)
  • [10] Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection Model
    Alimi, Oyeniyi Akeem
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0496 - 0501