Professional Documents
Culture Documents
PHY-Layer Authentication With Multiple Landmarks With Reduced Communication Overhead
PHY-Layer Authentication With Multiple Landmarks With Reduced Communication Overhead
Abstract—In this paper, we propose a physical (PHY)-layer multiple landmarks each equipped with multiple antennas to
authentication system that exploits the channel state information improve the spoofing detection accuracy.
of radio transmitters to detect spoofing attacks in wireless Most existing PHY-layer authentication systems are based
networks. By using multiple landmarks and multiple antennas in
the channel estimation, this authentication system enhances the on the hypothesis tests and assume some specific radio channel
spatial resolution of the channel information and thus improves models, e.g., the frequency-selective Rayleigh channel model
the spoofing detection accuracy. Unlike most existing hypothesis as assumed in [9]. However, the assumed channel model is
test based PHY-layer authentication schemes that rely on the not always accurate, especially in dynamic wireless networks
known radio channel model, our proposed authentication system in which the actual channel model is complicated and change
uses the logistic regression to remove the assumption on the
known channel model and is applicable to more generic wireless over time. Therefore, the logistic regression technique [10] can
networks. The Frank-Wolfe algorithm is then used to estimate be used to discriminate radio transmitters according to their
the parameters of the logistic regression model, which solves the channel information and remove the assumptions on the radio
convex problem under a 1 -norm constraint for weight sparsity to channel distribution. In other words, with coefficients being
avoid over-fitting in the learning process. The distributed Frank- estimated by the maximum log-likelihood (ML) estimation
Wolfe algorithm can further reduce the communication overhead
between the landmarks and the security agent while keeping the over the training channel data, the logistic regression based
spoofing detection accuracy. Simulation results can validate the authentication is applicable to a broader range of wireless
accuracy of the proposed PHY-layer authentication with multiple networks.
landmarks and show the performance gain regarding the overall The ML-based coefficient estimation of the regression can
communication overhead. be formulated as a convex optimization problem, and thus can
Index Terms—PHY-layer authentication, learning, distributed
be efficiently addressed by the Frank-Wolfe (FW) algorithm,
Frank-Wolfe algorithm, spoofing detection, multiple landmarks.
which uses linear subproblems to approximate the convex and
constrained optimization problem at each iteration [11]. The
authentication system based on FW requires the transmission
I. I NTRODUCTION
of the channel information from each landmark to the agent
Wireless networks are vulnerable to spoofing attacks, in that can be either the legal receiver Bob or the special security
which an attacker Eve impersonates another user Alice by agent. The resulting communication overhead is forbidden,
claiming her higher-layer identity such as her media access if the number of the landmarks and the antennas are large.
control (MAC) address, which cannot be fully addressed by the Therefore, the PHY-layer authentication can apply the dis-
traditional higher-layer authentication techniques. Therefore, tributed Frank-Wolfe (dFW) algorithm, which performs the
various physical (PHY)-layer authentication techniques have FW updates and converges faster with a small amount of
been proposed to exploit the spatial decorrelation property of computational overhead at each iteration and a lower com-
the PHY-layer radio channel information, such as received munication cost, to solve the convex constraint optimization
signal strength indicators (RSSIs) [1]–[4], received signal problem in a distributed system.
strength (RSS) [5], channel impulse responses (CIR) [6], In this paper, we propose a logistic regression based PHY-
and channel state information (CSI) [7], [8], to distinguish layer authentication, which exploits the RSSIs collected at
radio transmitters and thus detect spoofing attacks with low multiple antennas by multiple landmarks to detect spoofing
overhead. As the channel estimation by multiple landmarks attacks, and estimates the coefficients of the regression model
each with multiple antennas at different locations increases with the FW algorithm. The communication costs of the PHY-
the spatial resolution of the radio channel regarding the radio layer authentication is further reduced with dFW. Simulations
transmitter, a PHY-layer authentication system can utilize based on the stochastic channel model are performed to verify
the spoofing detection performance of our proposed systems.
This work was supported in part by National Natural Science Foundation The main contributions of our work can be summarized as
of China under Grant 61671396, CCF-Venustech Hongyan Research Initiative
(2016-010), and the US NSF CNS-1646607, ECCS-1547201, CCF-1456921, follows:
CNS-1443917, and ECCS-1405121. 1) We present a PHY-layer authentication system that ex-
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on November 24,2020 at 11:37:33 UTC from IEEE Xplore. Restrictions apply.
IEEE ICC 2017 Communication and Information Systems Security Symposium
β0 +βHk
N Number of receive antennas β̂ = arg min ln(1 + e ) − yk (β0 + βHk )
β
T Number of training data in the regression k=i−1−T
e Hkj
the channel vector Hi is presented with the softmax function ∇f (β)j = − yk Hkj , (11)
as described in [10] as follows 1 + eβ0 +βHk
k=i−T −1
β0 +βHi where Hkj is the j-th element of channel vector Hk and 1 ≤
e
Pr (yi = 1|Hi ) = , (2) j ≤ M N . The largest absolute value of the overall gradient
1 + eβ0 +βHi
1 ∇f (β) is chosen as the optimal descent direction of the cost
Pr (yi = 0|Hi ) = . (3)
1 + eβ0 +βHi function. The corresponding index of the direction denoted by
ψ is given by
If Pr(yi = 1|Hi ) > Pr(yi = 0|Hi ), we have β0 + βHi > 0 by
(2) and (3) after simplification, and assume that message i is ψ = arg max |∇f (β)j | . (12)
1≤j≤M N
sent by Alice with ŷi = 1. Otherwise, message i is assumed
to be sent by Eve with ŷi = 0 if β0 + βHi ≤ 0, i.e., The optimal descent direction of the cost function in terms
of β is given by sgn(−∇f (β)ψ )Ceψ − β. The iteration step
1, if β0 + βHi > 0, 2
ŷi = (4) size at iteration n denoted by γ is set to be γ = n+2 by [11].
0, otherwise. Therefore, the subsequent iteration point after moving step
Without knowing the distribution of the RSSI vector, Bob size γ along the optimal the descent direction at the current
can use the logistic regression technique to authenticate mes- iteration point is updated with
sage i according to channel vector Hi , and apply the previous β ← (1 − γ)β + γsgn (−∇f (β)ψ ) Ceψ , (13)
T channel vectors, (i.e., {Hk }i−T −1≤k≤i−1 ) as the training
data to estimate the coefficients of the logistic regression where eψ is the all zeros M N -dimensional vector except 1 at
model. More specifically, the minus log-likelihood of the T the ψ-th entry. The flag to stop the iteration is denoted by χ
training data denoted by f (β) is given by and given by
i−1 M N
f (β) = − ln Pr (yk |Hk ) χ= βj ∇f (β)j + C |∇f (β)ψ | . (14)
k=i−T −1 j=1
i−1
The approximation quality of the above FW algorithm to
=− yk (β0 + βHk ) − ln 1 + eβ0 +βHk .
solve the convex problem in (9), denoted by , means that
k=i−1−T
(5) the estimated β̂ is at least -close to the optimal β. If χ <
, Bob obtains the -approximate of β and then uses (4) to
The coefficient vector β is estimated by the maximum log- detect message i. By (4), if ŷi = 1 Bob receives message i.
likelihood method following the 1 -norm regularization. The Otherwise, Bob sends the spoofing alarm, if ŷi = 0.
cost function f (β) given by (5) is minimized under the 1 - In summary, the FW-based authentication calculates the
norm penalty to restrict the complexity of the logistic regres- local gradient of each landmark to find the largest overall
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on November 24,2020 at 11:37:33 UTC from IEEE Xplore. Restrictions apply.
IEEE ICC 2017 Communication and Information Systems Security Symposium
eβ0 +βHk 1
=− yk ln + (1 − yk ) ln (8)
1 + eβ0 +βHk 1 + eβ0 +βHk
k=i−1−T
i−1
=− yk (β0 + βHk ) − ln 1 + eβ0 +βHk ,
k=i−1−T
where (6) is obtained by (4), and (8) is derived by (2) and (3).
gradient of the cost function of the training data and determine a few channel information instead of the entire channel vector.
the subsequent iteration point to estimate β in the logistic More specifically, we use Am = {(m − 1)N + 1, · · ·, mN },
regression model. Therefore, the resulting communication i.e., the set of the column indices in both ∇f (β) and β
overhead between the security agent Bob and the M landmarks that associated with landmark m. Thus the local gradient
depends on the landmark topology and can be prohibitive of landmark m is given by the elements in ∇f (β) with
under a large number of landmarks and antennas. The PHY- indices belonging to Am . At iteration n, similar to (12) in
layer authentication with FW is summarized in Algorithm 1. FW, landmark m identifies the largest component of its local
gradient in absolute value, whose indice in the gradient is
denoted by ψm and given by
Algorithm 1 PHY-layer Authentication based on FW
1: Initialize: β = 0, n = 0, χ, , and C. ψm = arg max |∇f (β)j |. (15)
j∈Am
2: Channel estimation to form Hi
3: Calculate β̂0 via (10) Landmark m calculates the local flag to stop the iteration
4: While χ > do denoted by Sm and given by [15] as
5: Compute ψ via (12)
6: Set γ = n+2 2 Sm = βj ∇f (β)j . (16)
j∈Am
7: Update β via (13)
8: Compute χ via (14) Then the information set, {∇f (β)ψm , ψm , Sm } is sent by
9: n ← n + 1 landmark m to Bob. Upon receiving the information set from
10: End while all the M landmarks, Bob identifies the landmark with the
11: Obtain β̂ = β largest overall gradient, whose index is denoted by ρ and given
12: Calculate ŷi via (4) by
13: If ŷi = 1 then
ρ = arg max |∇f (β)ψm |. (17)
14: Accept message i m∈[1,M ]
15: Else
16: Send spoofing alarm for message i Bob computes the flag to stop the iteration χ by
17: End if M
χ= Sm + C|∇f (β)ψρ |. (18)
m=1
V. PHY- LAYER AUTHENTICATION BASED ON D FW If χ > , Bob broadcasts {ψρ , ∇f (β)ψρ } to the M landmarks,
In order to reduce the communication overhead of the FW- and then each landmark updates the coefficient vector accord-
based authentication, the PHY-layer authentication can apply ingly by
the dFW algorithm as described in [15] to solve the convex op-
β ← (1 − γ)β + γsgn(−∇f (β)ψρ )Ceψρ . (19)
timization problem with the 1 -norm regularization in (9). As
an advanced FW algorithm designed for distributed systems, Each landmark also determines whether to broadcast its local
the dFW-based authentication requires each landmark to send channel information to other landmarks. For simplicity, let
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on November 24,2020 at 11:37:33 UTC from IEEE Xplore. Restrictions apply.
IEEE ICC 2017 Communication and Information Systems Security Symposium
Otherwise, if χ ≤ , Bob stops the iteration and notifies all 1.6 FW, N=6
DFW, N=2
Communication cost
the landmarks about it. At this time, landmark m obtains the 1.4
FW, N=2
⎩
0, otherwise. (a) Communication cost
Simulations are performed based on the channel model as Pm, FW, N=2
20 log10 (4πd0 /λ), where λ is wavelength and d0 = 100m, (b) Average error rate
τ = 4, σ = 0.2dB. If not specified otherwise, we set M = 6,
N = 6, T = 100, C = 10, and = 0.1. Fig. 2. Comparison between dFW and FW in authentication performance and
communication cost with M = 6, T = 100, and C = 10 in the simulation
As shown in Fig. 2(a), the dFW-based authentication re- with channel vector generated by (1).
duces the communication overhead compared with the FW
algorithm, e.g., the overhead is reduced by 44.0% at iteration
15 with N = 6, because only a small portion of the data,
{∇f (β)ψm , ψm , Sm , ψρ , ∇f (β)ψρ } are transmitted between number of iterations as small as 15. The communication cost
Bob and the landmarks at each iteration and dFW requires a for FW is a constant with iteration because landmarks send all
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on November 24,2020 at 11:37:33 UTC from IEEE Xplore. Restrictions apply.
IEEE ICC 2017 Communication and Information Systems Security Symposium
the collected RSSIs to Bob before iteration. As shown in Fig. estimates the coefficients of the logistic regression model by
2(b), both authentication schemes provide accurate spoofing maximizing the posterior probability under the 1 -norm type
detection, e.g., their average error rate is less than 3% at constraint to reduce the computational complexity and avoid
iteration 15. over-fitting in the learning process. The overall communication
overhead between the landmarks and the security agent is
further reduced by applying the distributed FW algorithm
14000 DFW, N=6
FW, N=6
to replace FW. Simulation results show that the proposed
12000
authentication system can improve the spoofing detection
accuracy, e.g., both the false alarm rate and miss detection
10,000
rate are 95% less than the benchmark system that locates 2
Communication cost
0.1 [4] L. Xiao, T. Chen, G. Han, W. Zhuang, and L. Sun, “PHY-game theoretic
study on channel-based authentication in MIMO systems,” IEEE Trans.
0.08
Vehicular Technology, Jan. 2017.
0.06 [5] J. Yang, Y. Chen, W. Trappe, and J. Cheng, “Detection and localization
of multiple spoofing attackers in wireless networks,” IEEE Trans.
0.04
Parallel and Distributed systems, vol. 24, no. 1, pp. 44–58, Jan. 2013.
0.02 [6] F. J. Liu, X. Wang, and S. L. Primak, “A two dimensional quantization
0.01 algorithm for cir-based physical layer authentication,” in Proc. IEEE
0
1 2 3 4 5 6 7 8 Int’l Conf. Commun. (ICC), pp. 4724–4728, Budapest, Jun. 2013.
Number of landmark
[7] H. Liu, Y. Wang, J. Liu, J. Yang, and Y. Chen, “Practical user authenti-
cation leveraging channel state information (CSI),” in Proc. ACM Symp.
(b) Average error rate Inform., Computer and Commun. Security, pp. 389–400, Kyoto, Jun.
2014.
Fig. 3. Spoofing detection performance of the PHY-layer authentication [8] L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-layer spoofing
system with N antennas at each landmark with C = 10, T = 100, and detection with reinforcement learning in wireless networks,” IEEE Trans.
= 0.1. Vehicular Technology, vol. 65, no. 12, pp. 10037–10047, Dec. 2016.
[9] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Channel-
based spoofing detection in frequency-selective Rayleigh channels,”
As shown in Fig. 3, the communication overheads of both IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948–5956, Jan.
authentication schemes increase with the number of landmarks 2009.
[10] T. J. Hastie, R. J. Tibshirani, and J. H. Friedman, The elements of
and the performance gain of dFW over FW regarding the statistical learning: Data mining, inference, and prediction. Springer,
overhead increases with M . For example, the performance 2011.
gain increases from 15.8% to 34.7%, if M changes from 2 [11] M. Jaggi, “Revisiting Frank-Wolfe: Projection-free sparse convex opti-
mization,” in Proc. Int’l Conf. Machine Learning (ICML), pp. 427–435,
to 8 and N = 6. The detection accuracy of the dFW-based Atlanta, Jun. 2013.
authentication decreases with both the number of landmarks [12] Q. Xiong, Y. Liang, K. H. Li, and Y. Gong, “An energy-ratio-based
and antennas, e.g., Pf and Pm reduce by 89.8% and 88.9%, approach for detecting pilot spooing attack in multiple-antenna systems,”
IEEE Trans. Information Forensics and Security, vol. 10, no. 5, pp. 932–
respectively, as M changes from 2 to 5, if N = 6. In another 940, May 2015.
example, Pf and Pm reduce by 95.6% and 96.1%, as N [13] L. Xiao, Y. Li, G. Liu, Q. Li, and W. Zhuang, “Spoofing detection
changes from 1 to 6, if M = 8. with reinforcement learning in wireless networks,” in Proc. IEEE Global
Commun. Conf. (GLOBECOM), San Diego, CA, Dec. 2015.
[14] V. Erceg, L. J. Greenstein, and et al., “An empirically based path loss
VII. C ONCLUSIONS model for wireless channels in suburban environments,” IEEE J. Select.
In this paper, we proposed a PHY-layer authentication Areas Commun., vol. 17, no. 7, pp. 1205–1211, Jul. 1999.
[15] A. Bellet, Y. Liang, and et al., “A distributed Frank-Wolfe algorithm
system that applies multiple landmarks each equipped with for communication-efficient sparse learning,” in Proc. SIAM Int’l Conf.
multiple antennas to estimate the received signal strength of Data Mining, pp. 478–486, Vancouver, Apr. 2015.
the message to improve the spoofing detection accuracy. The
logistic regression based authentication does not being restrict-
ed to the known radio channel model. The FW algorithm
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on November 24,2020 at 11:37:33 UTC from IEEE Xplore. Restrictions apply.