| Literature DB >> 31142016 |
Run-Fa Liao1, Hong Wen2, Jinsong Wu3, Fei Pan4, Aidong Xu5, Yixin Jiang6, Feiyi Xie7, Minggui Cao8.
Abstract
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes' authentication method, the convolutional neural network (CNN)-based sensor nodes' authentication method, and the convolution preprocessing neural network (CPNN)-based sensor nodes' authentication method, have been adopted to implement the PHY-layer authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed method can implement a lightweight authentication for the sensor nodes under the edge computing (EC) system in IWSNs.Entities:
Keywords: PHY-layer; WSN; industrial; light-weight authentication; neural network
Year: 2019 PMID: 31142016 PMCID: PMC6603790 DOI: 10.3390/s19112440
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The deep neural network.
Figure 2The convolutional neural network. CSI, channel state information.
Figure 3The system model of DL-based PHY-layer authentication in IWSNs.
Figure 4DL-based PHY-layer authentication flow chart.
The computational complexity in the authentication phase.
| Algorithms | Computational Complexity | Simulation |
|---|---|---|
| DNN-based |
|
|
| CNN-based |
|
|
| CPNN-based |
|
|
The number of parameters in the retraining phase.
| Algorithms | Number of Parameters | Simulation |
|---|---|---|
| DNN-based |
|
|
| CNN-based |
|
|
| CPNN-based |
|
|
The time delay of the sixth path of 12 sensor nodes.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 5The authentication performance with different sensor nodes. (a) The cost value under different numbers of sensor nodes with the DNN-based method; (b) The authentication rate under different numbers of sensor nodes with the DNN-based method.
Figure 6The authentication performance with different numbers of hidden layers. (a) The authentication rate of different numbers of hidden layers; (b) The authentication rate of different numbers of hidden layers after training was stabilized.
Figure 7The authentication performance with different algorithms. (a) The authentication rate of different algorithms under different numbers of sensor nodes; (b) The time in the training phase of different algorithms under different numbers of sensor nodes.
Figure 8The network topology.
Figure 9The location of the wireless sensor nodes in the practical industrial scenario.
Figure 10The authentication rate with USRPs.