Reliable resource allocation with RF fingerprinting authentication in secure IoT networks  被引量:1

在线阅读下载全文

作  者:Weiwei WU Su HU Di LIN Gang WU 

机构地区:[1]National Key Laboratory of Science and Technology on Communications,University of Electronic Science and Technology of China,Chengdu 610054,China

出  处:《Science China(Information Sciences)》2022年第7期47-62,共16页中国科学(信息科学)(英文版)

基  金:partially supported by Science and Technology Program of Sichuan Province (Grant No.2021YFG0330);Intelligent Terminal Key Laboratory of Si Chuan Province (Grant No. SCITLAB-0001);Fundamental Research Funds for the Central Universities (Grant No. ZYGX2019J076);National Natural Science Foundation of China (Grant No.61971092);Province Sichuan Foundation for Distinguished Young Scholars (Grant No. 2020JDJQ0023)。

摘  要:The unprecedented growth of the Internet of Things(Io T) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service(QoS) of authenticated users rather than that of all users. By acknowledging this limitation,we realise that user authentication would be a big issue in Io T networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious attacks and the relevant complicated computations restrict Io T deployments. In this paper, a radio frequency(RF)fingerprinting based authentication scheme is proposed under the architecture of convolutional neural network(CNN). It can effectively prevent unauthenticated users from consuming valuable wireless resources and significantly improve QoS performance for legitimate users. By solving an NP-hard optimization problem with the objective of minimizing efficient energy density, we demonstrate an approximate optimal resource allocation scheme in consideration of an RF-fingerprinting based authentication process. The analytic results show that our proposed scheme can dramatically reduce the efficient energy density compared with traditional cryptography based authentication schemes.

关 键 词:user authentication Internet of things convolutional neural network RF fingerprinting NP-hard optimization problem 

分 类 号:TN915.08[电子电信—通信与信息系统] TP391.44[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象