{"title":"基于多种信道属性的机器学习方法在物理层验证和欺骗检测方面的比较","authors":"Andrea Stomaci, D. Marabissi, Lorenzo Mucchi","doi":"10.12720/jcm.19.2.99-106","DOIUrl":null,"url":null,"abstract":"—The aim of this study is to assess the effectiveness of Physical Layer Authentication (PLA) in securing IoT nodes. Specifically, we present a PLA framework based on wireless fingerprinting, where the legitimated node is distinguished from potential attackers by exploiting the unique wireless channel features. To achieve this objective, we employ various machine learning approaches for anomaly detection, making use of a wide range of channel attributes in time-varying conditions. In particular, four different Machine Learning (ML) strategies in their one class version have been considered and compared: decision-tree, kernel-based, clustering and nearest neighbors. Our study highlights advantages and disadvantages of each method, considering parameters optimization, training requirements and time complexity. Results show that the use of multiple-attribute allows to achieve accurate detection performance. In particular, our results reveal that the kernel-based solution is the one that achieves best results in terms of accuracy, but the nearest neighbor’s solution has very similar performance with a significant advantage in terms of complexity and no need for training, making it more suitable for time-varying contexts, and a promising choice for securing IoT nodes through PLA based on wireless fingerprinting. The other two alternatives have somewhat lower performance but low complexity. This research contributes valuable insights into enhancing IoT security through PLA techniques.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"46 16","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparison of Machine Learning Approaches Based on Multiple Channel Attributes for Authentication andSpoofing Detection at the Physical Layer\",\"authors\":\"Andrea Stomaci, D. Marabissi, Lorenzo Mucchi\",\"doi\":\"10.12720/jcm.19.2.99-106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"—The aim of this study is to assess the effectiveness of Physical Layer Authentication (PLA) in securing IoT nodes. Specifically, we present a PLA framework based on wireless fingerprinting, where the legitimated node is distinguished from potential attackers by exploiting the unique wireless channel features. To achieve this objective, we employ various machine learning approaches for anomaly detection, making use of a wide range of channel attributes in time-varying conditions. In particular, four different Machine Learning (ML) strategies in their one class version have been considered and compared: decision-tree, kernel-based, clustering and nearest neighbors. Our study highlights advantages and disadvantages of each method, considering parameters optimization, training requirements and time complexity. Results show that the use of multiple-attribute allows to achieve accurate detection performance. In particular, our results reveal that the kernel-based solution is the one that achieves best results in terms of accuracy, but the nearest neighbor’s solution has very similar performance with a significant advantage in terms of complexity and no need for training, making it more suitable for time-varying contexts, and a promising choice for securing IoT nodes through PLA based on wireless fingerprinting. The other two alternatives have somewhat lower performance but low complexity. This research contributes valuable insights into enhancing IoT security through PLA techniques.\",\"PeriodicalId\":53518,\"journal\":{\"name\":\"Journal of Communications\",\"volume\":\"46 16\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12720/jcm.19.2.99-106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jcm.19.2.99-106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
Comparison of Machine Learning Approaches Based on Multiple Channel Attributes for Authentication andSpoofing Detection at the Physical Layer
—The aim of this study is to assess the effectiveness of Physical Layer Authentication (PLA) in securing IoT nodes. Specifically, we present a PLA framework based on wireless fingerprinting, where the legitimated node is distinguished from potential attackers by exploiting the unique wireless channel features. To achieve this objective, we employ various machine learning approaches for anomaly detection, making use of a wide range of channel attributes in time-varying conditions. In particular, four different Machine Learning (ML) strategies in their one class version have been considered and compared: decision-tree, kernel-based, clustering and nearest neighbors. Our study highlights advantages and disadvantages of each method, considering parameters optimization, training requirements and time complexity. Results show that the use of multiple-attribute allows to achieve accurate detection performance. In particular, our results reveal that the kernel-based solution is the one that achieves best results in terms of accuracy, but the nearest neighbor’s solution has very similar performance with a significant advantage in terms of complexity and no need for training, making it more suitable for time-varying contexts, and a promising choice for securing IoT nodes through PLA based on wireless fingerprinting. The other two alternatives have somewhat lower performance but low complexity. This research contributes valuable insights into enhancing IoT security through PLA techniques.
期刊介绍:
JCM is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, systems, methods, algorithms and applications in communications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on communications. All papers will be blind reviewed and accepted papers will be published monthly which is available online (open access) and in printed version.