A Lightweight Intelligent Authentication Approach for Intrusion Detection

被引:0
|
作者
Qiu, Xiaoying [1 ]
Li, Zhidu [2 ]
Sun, Xuan [1 ]
Xu, Tongyang [3 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Informat Management, Beijing 100192, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[3] UCL, Dept Elect & Elect Engn, London, England
关键词
Physical layer authentication; artificial intelligence; deep learning; CNN; classification; prototyping; software defined radio; WIRELESS NETWORKS; CHALLENGES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) offers advanced and intelligent services for our life. However, smart IoT devices also bring various security vulnerabilities. Traditionally, attacks are solved by conventional authentication and authorization schemes, requiring extensive time and computational resources. In addition, it is possible to exploit artificial intelligence (AI) to provide countermeasures while enabling lightweight authentication. In this paper, we explore a solution on modelling a spoofing detection system based on machine learning and we propose a deep learning method using Auto-Extractor/Classifier Neural Network. Our scheme operates on the physical layer without causing computational overhead. Therefore, the lightweight authentication can be achieved and spoofing attacks are well-controlled in IoT scenarios.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] An intelligent agent based approach for intrusion detection and prevention in adhoc networks
    Veeraraghavan, Sampathkumar
    Bose, S.
    Anand, K.
    Kannan, A.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 534 - +
  • [32] Statistical Decision Making for Authentication and Intrusion Detection
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    EIGHTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2009, : 409 - +
  • [33] Lightweight Intrusion Detection Using Reservoir Computing
    Deng, Jiarui
    Shen, Wuqiang
    Feng, Yihua
    Lu, Guosheng
    Shen, Guiquan
    Cui, Lei
    Lyu, Shanxiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 1345 - 1361
  • [34] Abstracting Audit Data for Lightweight Intrusion Detection
    Wang, Wei
    Zhang, Xiangliang
    Pitsilis, Georgios
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 201 - +
  • [35] Intelligent Green Efficiency for Intrusion Detection
    Pereira, Pedro
    Mendes, Paulo
    Vitorino, João
    Maia, Eva
    Praça, Isabel
    arXiv,
  • [36] Hybrid Intelligent Intrusion Detection System
    Bashah, Norbik
    Shanmugam, Idris Bharanidharan
    Ahmed, Abdul Marian
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 291 - 294
  • [37] Intelligent Processing of Intrusion Detection Data
    Duan, Tao
    Tian, Youhui
    Zhang, Hanrui
    Liu, Yaozong
    Li, Qianmu
    Jiang, Jian
    Shi, Zongsheng
    IEEE ACCESS, 2020, 8 : 78330 - 78342
  • [38] Artificial intelligent techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1266 - 1271
  • [39] Hybrid Intelligent Intrusion Detection Scheme
    Salama, Mostafa A.
    Eid, Heba F.
    Ramadan, Rabie A.
    Darwish, Ashraf
    Hassanien, Aboul Ella
    SOFT COMPUTING IN INDUSTRIAL APPLICATIONS, 2011, 96 : 293 - +
  • [40] A universal intelligent method for intrusion detection
    Wang, Yong
    Xi, Jinsong
    Zhong, Meiling
    Journal of Cyber Security Technology, 2022, 6 (1-2) : 91 - 111