{"title":"A fast security authentication scheme based on meta-learning under the changing channel environment","authors":"Yongli An , Haifei Bai , Zongrui Li , Zhanlin Ji","doi":"10.1016/j.phycom.2025.102612","DOIUrl":null,"url":null,"abstract":"<div><div>This paper presents a meta-learning-based scheme for secure authentication at the physical layer. The solution focuses on efficiently adapting neural network-based physical layer security authentication to new environments. It aims to minimize the need for extensive re-learning and human intervention in the process. Specifically, the meta-learning-based physical layer authentication scheme uses the inner and outer cycle of the meta-learning algorithm to find a common initialization between tasks. When applying identical parameters across various tasks and fine-tuning them, consistent good results indicate the model’s ability to extract common features across tasks. On this basis, this paper utilizes a convolutional neural network to collect channel state information (CSI) data from multiple historical environments to train the network. This enables feeding a small amount of CSI data into a network model trained in the historical environment of the new setting, quickly generating an authenticator suited to the new environment. To evaluate the performance of the proposed scheme, this paper conducts experiments on real datasets. The results show that the scheme outperforms the transfer learning approach in both authentication accuracy and convergence. This highlights the economical and efficient nature of meta-learning-based physical layer authentication schemes.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"69 ","pages":"Article 102612"},"PeriodicalIF":2.0000,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000151","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a meta-learning-based scheme for secure authentication at the physical layer. The solution focuses on efficiently adapting neural network-based physical layer security authentication to new environments. It aims to minimize the need for extensive re-learning and human intervention in the process. Specifically, the meta-learning-based physical layer authentication scheme uses the inner and outer cycle of the meta-learning algorithm to find a common initialization between tasks. When applying identical parameters across various tasks and fine-tuning them, consistent good results indicate the model’s ability to extract common features across tasks. On this basis, this paper utilizes a convolutional neural network to collect channel state information (CSI) data from multiple historical environments to train the network. This enables feeding a small amount of CSI data into a network model trained in the historical environment of the new setting, quickly generating an authenticator suited to the new environment. To evaluate the performance of the proposed scheme, this paper conducts experiments on real datasets. The results show that the scheme outperforms the transfer learning approach in both authentication accuracy and convergence. This highlights the economical and efficient nature of meta-learning-based physical layer authentication schemes.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.