Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between...Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time.展开更多
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA...Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.展开更多
Most of the existing physical layer watermarking authentication schemes are based on a single-input single-output system and require pre-issue of shared keys.To address these problems,in this thesis,a physical layer a...Most of the existing physical layer watermarking authentication schemes are based on a single-input single-output system and require pre-issue of shared keys.To address these problems,in this thesis,a physical layer authentication scheme without the distribution keys is proposed based on the constellation dithering physical layer authentication watermarking mechanism with a multiple-input multiple-output(MIMO)system,and space-time block coding(STBC)is used to improve the robustness of transmission.Specifically,the legitimate node obtains channel state information(CSI)through channel probing and couples CSI with the message signal using a hash function to generate an authentication tag,which is then embedded through constellation dithering.The receiver extracts the tag and authenticates it using hypothesis testing.Performance analysis shows that the scheme is resistant to various attacks such as replay,interference,tampering,and forgery.Simulation results show that the use of MIMO multi-antenna diversity with STBC coding technique reduces the bit error rate(BER)of message signals and tag signals and improves the detection rate of legitimate signals.展开更多
Physical layer security(PLS)in wireless communication systems has attracted extensive research attentions in recent years.Unlike cryptography-based methods applied in upper-layer in network,PLS methods are applied in ...Physical layer security(PLS)in wireless communication systems has attracted extensive research attentions in recent years.Unlike cryptography-based methods applied in upper-layer in network,PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the randomness of signals and wireless channels.In this survey,we provide a comprehensive review in the domain of physical layer authentication(PLA)in wireless communication systems,including the concepts,several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems.The survey begins with an overview of the background and basic concepts of PLA,such as the general model of wireless security communication system,typical frameworks of key-based/less PLA systems,and the common attack models.We then discuss the major concerns and key techniques that are applied in PLA systems,where three types of authentication schemes are considered,i.e.,the authentication based on channel information,radio-frequency and identity watermarks.Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered.Finally,the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper.展开更多
基金This work is supported in part by the Beijing Natural Science Foundation(No.4212015)Natural Science Foundation of China(No.61801008)+3 种基金China Ministry of Education-China Mobile Scientific Research Foundation(No.MCM20200102)China Postdoctoral Science Foundation(No.2020M670074)Beijing Municipal Commission of Education Foundation(No.KM201910005025)Beijing Postdoctoral Research Foundation(No.2021-ZZ-077,No.2020-YJ-006).
文摘Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time.
基金Supported by the National Natural Science Foundation of China under Grant No.62171310the Marine Defense Innovation Fund JJ-2020-701-09Lanzhou Jiaotong University-Tianjin University Co-Funding under Grant No.2022064。
文摘Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.
基金supported by the National Key Research and Development Program of China(No.2017YFE0135700)the High Level Talent Support Project of Hebei Province(No.A201903011)+3 种基金the Natural Science Foundation of Hebei Province(No.F2018209358)the Tsinghua Precision Medicine Foundation(No.2022TS003)the Ministry of Education and Science(MES)for NCDSC,part of the Bulgarian National Roadmap on RIs(No.D01-387/18.12.2020)the Telecommunications Research Centre(TRC)of University of Limerick,Ireland.
文摘Most of the existing physical layer watermarking authentication schemes are based on a single-input single-output system and require pre-issue of shared keys.To address these problems,in this thesis,a physical layer authentication scheme without the distribution keys is proposed based on the constellation dithering physical layer authentication watermarking mechanism with a multiple-input multiple-output(MIMO)system,and space-time block coding(STBC)is used to improve the robustness of transmission.Specifically,the legitimate node obtains channel state information(CSI)through channel probing and couples CSI with the message signal using a hash function to generate an authentication tag,which is then embedded through constellation dithering.The receiver extracts the tag and authenticates it using hypothesis testing.Performance analysis shows that the scheme is resistant to various attacks such as replay,interference,tampering,and forgery.Simulation results show that the use of MIMO multi-antenna diversity with STBC coding technique reduces the bit error rate(BER)of message signals and tag signals and improves the detection rate of legitimate signals.
基金This work was supported by National Key Research and Development Program of China(Grant No.2017YFB0503002)National Natural Science Foundation of China(Grant No.61922010).
文摘Physical layer security(PLS)in wireless communication systems has attracted extensive research attentions in recent years.Unlike cryptography-based methods applied in upper-layer in network,PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the randomness of signals and wireless channels.In this survey,we provide a comprehensive review in the domain of physical layer authentication(PLA)in wireless communication systems,including the concepts,several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems.The survey begins with an overview of the background and basic concepts of PLA,such as the general model of wireless security communication system,typical frameworks of key-based/less PLA systems,and the common attack models.We then discuss the major concerns and key techniques that are applied in PLA systems,where three types of authentication schemes are considered,i.e.,the authentication based on channel information,radio-frequency and identity watermarks.Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered.Finally,the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper.