PDF
Abstract
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
Keywords
IoT
/
Game theory
/
Physical layer authentication
/
Nash equilibrium
/
Spoofing detection
Cite this article
Download citation ▾
Yue Wu, Tao Jing, Qinghe Gao, Yingzhen Wu, Yan Huo.
Game-theoretic physical layer authentication for spoofing detection in internet of things.
, 2024, 10(5): 1394-1404 DOI:10.1016/j.dcan.2022.12.016
| [1] |
W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, Y.A. Bangash, An in-depth analysis of iot security requirements, challenges, and their countermeasures via software-defined security, IEEE Internet Things J. 7 (10) (2020) 10250-10276.
|
| [2] |
N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying iot security: an exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations, IEEE Communications Surveys Tutorials 21 (3) (2019) 2702-2733.
|
| [3] |
L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, Phy-layer spoofing detection with reinforcement learning in wireless networks, IEEE Trans. Veh. Technol. 65 (12)(2016) 10037-10047.
|
| [4] |
H. Fang, X. Wang, L. Hanzo, Learning-aided physical layer authentication as an intelligent process, IEEE Trans. Commun. 67 (3) (2019) 2260-2273.
|
| [5] |
S. Zeng, X. Li, A. Salem, D. Zhao,Physical layer authentication based on cfo and visibility graph, in:2018 International Conference on Networking and Network Applications (NaNA), 2018, pp. 147-152.
|
| [6] |
P. Baracca, N. Laurenti, S. Tomasin, Physical layer authentication over mimo fading wiretap channels, IEEE Trans. Wireless Commun. 11 (7) (2012) 2564-2573.
|
| [7] |
F. Xie, H. Wen, Y. Li, S. Chen, L. Hu, Y. Chen, H. Song, Optimized coherent integration-based radio frequency fingerprinting in internet of things, IEEE Internet Things J. 5 (5) (2018) 3967-3977.
|
| [8] |
H. Lohrasbipeydeh, T.A. Gulliver, H. Amindavar, Unknown transmit power rssd based source localization with sensor position uncertainty, IEEE Trans. Commun. 63 (5) (2015) 1784-1797.
|
| [9] |
L. Xiao, T. Chen, G. Han, W. Zhuang, L. Sun, Game theoretic study on channel-based authentication in mimo systems, IEEE Trans. Veh. Technol. 66 (8) (2017) 7474-7484.
|
| [10] |
L. Xiao, T. Chen, G. Han, W. Zhuang, L. Sun, Channel-based authentication game in mimo systems, in: 2016 IEEE Global Communications Conference (GLOBECOM), 2016, pp. 1-6.
|
| [11] |
W. Hou, X. Wang, J.-Y. Chouinard, A. Refaey, Physical layer authentication for mobile systems with time-varying carrier frequency offsets, IEEE Trans. Commun. 62 (5) (2014) 1658-1667.
|
| [12] |
Y. Nan, L. Wang, G. Geraci, M. Elkashlan, M. Renzo, Safeguarding 5g wireless communication networks using physical layer security, Communications Magazine IEEE 53 (4) (2015) 20-27.
|
| [13] |
J. Yang, Y. Chen, W. Trappe, J. Cheng, Detection and localization of multiple spoofing attackers in wireless networks, IEEE Trans. Parallel Distr. Syst. 24 (1) (2013) 44-58.
|
| [14] |
C. Pei, Z. Ning, X.S. Shen, J.W. Mark, Channel-based physical layer authentication, in: 2014 IEEE Global Communications Conference, 2015.
|
| [15] |
F. J. Liu, X. Wang, H. Tang,Robust Physical Layer Authentication Using Inherent Properties of Channel Impulse Response, IEEE.
|
| [16] |
C. Yi, H. Wen, H. Song, S. Chen, F. Xie, Q. Yang, H. Lin, Lightweight one-time password authentication scheme based on radio-frequency fingerprinting, IET Commun. 12 (12) (2018) 1477-1484.
|
| [17] |
W.G. Conley, A.J. Miller,Cognitive jamming game for dynamically countering ad hoc cognitive radio networks, in: MILCOM 2013-2013 IEEE Military Communications Conference, 2013, pp. 1176-1182.
|
| [18] |
S. Wu, Y. Chen, M. Li, X. Luo, L. Liu, Survive and thrive: a stochastic game for ddos attacks in bitcoin mining pools, IEEE/ACM Trans. Netw. (2020) 1-14, 99.
|
| [19] |
Y. Jie, K. Choo, M. Li, L. Chen, C. Guo, Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model, Future Generat. Comput. Syst. 101 (Dec.) (2019) 169-179.
|
| [20] |
L. Xiao, Y. Chen, W.S. Lin, K.J.R. Liu, Indirect reciprocity security game for large-scale wireless networks, IEEE Trans. Inf. Forensics Secur. 7 (4) (2012) 1368-1380.
|
| [21] |
Z. Ding, R. Schober, H.V. Poor, No-pain no-gain: Drl assisted optimization in energy-constrained cr-noma networks, IEEE Trans. Commun. 69 (9) (2021) 5917-5932.
|
| [22] |
H. Peng, X.S. Shen, Ddpg-based resource management for mec/uav-assisted vehicular networks, in: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 2020, pp. 1-6.
|
| [23] |
H. Peng, X. Shen, Multi-agent reinforcement learning based resource management in mec- and uav-assisted vehicular networks, IEEE J. Sel. Area. Commun. 39 (1)(2021) 131-141.
|