Game-theoretic physical layer authentication for spoofing detection in internet of things

IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Digital Communications and Networks Pub Date : 2024-10-01 DOI:10.1016/j.dcan.2022.12.016
Yue Wu, Tao Jing, Qinghe Gao, Yingzhen Wu, Yan Huo
{"title":"Game-theoretic physical layer authentication for spoofing detection in internet of things","authors":"Yue Wu,&nbsp;Tao Jing,&nbsp;Qinghe Gao,&nbsp;Yingzhen Wu,&nbsp;Yan Huo","doi":"10.1016/j.dcan.2022.12.016","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1394-1404"},"PeriodicalIF":7.5000,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S235286482200284X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网中用于欺骗检测的博弈论物理层认证
物联网(IoT)已经渗透到与我们生活相关的各个领域。在这些应用中,无数的物联网设备传输大量数据,这些数据往往包含重要的私人信息。为了防止恶意用户欺骗这些信息,有效的身份验证是关键的第一步。物理层身份验证(PLA)利用了无线信号和物理设备固有的独特特性,由于其灵活性、低复杂性以及对上层协议的透明性,在物联网领域大有可为。本文的重点是 PLA 过程中多个恶意欺骗者与合法接收者之间的交互。首先,通过将欺骗者和接收者作为博弈者,将互动制定为静态欺骗检测博弈。接收方的最佳认证阈值和欺骗者的攻击率被视为纳什均衡(Nash Equilibrium,NE)。然后,在静态环境中,在多人博弈、有碰撞的零和博弈和无碰撞的零和博弈这三种情况下,推导出了所有 NE 的闭式表达式。考虑到动态环境,提出了一种多代理深度确定性策略梯度(MADDPG)算法来分析接收者和欺骗者之间的相互作用。最后,进行了全面的仿真实验,证明了环境参数对近地网的影响,为设计有效的 PLA 方案提供了指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Digital Communications and Networks
Digital Communications and Networks Computer Science-Hardware and Architecture
CiteScore
12.80
自引率
5.10%
发文量
915
审稿时长
30 weeks
期刊介绍: Digital Communications and Networks is a prestigious journal that emphasizes on communication systems and networks. We publish only top-notch original articles and authoritative reviews, which undergo rigorous peer-review. We are proud to announce that all our articles are fully Open Access and can be accessed on ScienceDirect. Our journal is recognized and indexed by eminent databases such as the Science Citation Index Expanded (SCIE) and Scopus. In addition to regular articles, we may also consider exceptional conference papers that have been significantly expanded. Furthermore, we periodically release special issues that focus on specific aspects of the field. In conclusion, Digital Communications and Networks is a leading journal that guarantees exceptional quality and accessibility for researchers and scholars in the field of communication systems and networks.
期刊最新文献
Editorial Board A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization Dynamic adversarial jamming-based reinforcement learning for designing constellations A secure double spectrum auction scheme Intelligent cache and buffer optimization for mobile VR adaptive transmission in 5G edge computing networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1