Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication

نویسندگان

چکیده

In this paper we consider authentication at the physical layer, in which authenticator aims distinguishing a legitimate supplicant from an attacker on basis of characteristics set parallel wireless channels, are affected by time-varying fading. Moreover, attacker's channel has spatial correlation with supplicant's one. setting, assess and compare performance achieved different approaches under conditions. We first use two statistical decision methods, prove that using large number references (in form estimates) levels fading is not beneficial security point view. then classification methods based machine learning. order to face worst case scenario provided no forged messages during training, one-class classifiers. When instead training includes some messages, resort more conventional binary classifiers, considering cases such either labelled or not. For latter case, exploit clustering algorithms label set. The both nearest neighbor (NN) support vector (SVM) techniques evaluated. Through numerical examples, show same probability false alarm, (OCC) achieve lowest missed detection when small exists between main adversary one, while advantageous channels large.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Mining: Machine Learning and Statistical Techniques

The interdisciplinary field of Data Mining (DM) arises from the confluence of statistics and machine learning (artificial intelligence). It provides a technology that helps to analyze and understand the information contained in a database, and it has been used in a large number of fields or applications. Specifically, the concept DM derives from the similarity between the search for valuable in...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

on the comparison of keyword and semantic-context methods of learning new vocabulary meaning

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2020.3033454