| Literature DB >> 31430988 |
Songlin Chen1, Hong Wen2, Jinsong Wu3,4, Aidong Xu5, Yixin Jiang5, Huanhuan Song1, Yi Chen1.
Abstract
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combines with a two-layer model is proposed to realize authentications for a large number of resource-constrained terminals under the mobile edge computing (MEC) scenario without relying on encryption-based methods. In the first layer, signal collection, extraction of RF fingerprint features, dynamic feature database storage, and access authentication decision are carried out by the MEC devices. In the second layer, learning features, generating decision models, and implementing machine learning algorithms for recognition are performed by the remote cloud. By this means, the authentication rate can be improved by taking advantage of the machine-learning training methods and computing resource support of the cloud. Extensive simulations are performed under the IoT application scenario. The results show that the novel method can achieve higher recognition rate than that of traditional RFFID method by using wavelet feature effectively, which demonstrates the efficiency of our proposed method.Entities:
Keywords: IoT; Mobile edge computing; RF Fingerprinting; authentication
Year: 2019 PMID: 31430988 PMCID: PMC6720791 DOI: 10.3390/s19163610
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Mobile edge computing-Internet-of-Things (MEC-IoT) architecture.
Figure 2Radio frequency fingerprinting identification (RFFID) authentication method.
Figure 3Detailed authentication process.
Figure 4Flow chart of RFFID-MEC method algorithm.
Notations of frequently-used variables.
| Symbol | Description |
|---|---|
|
| The |
|
| Discrete points of signal acquisition |
|
| The |
|
| The total |
|
| The vector after remove the outline from the |
|
| The set after remove the outline from the set |
|
| The data normalization of vector |
|
| The data normalization of set |
|
| The vector |
|
| The set |
|
| The training data set |
|
| The category of the instance |
Figure 5Typical application scenarios of RFFID-MEC authentication method.
Figure 6Correct identification probability versus SNR for RFFID-MEC and RFFID using four different RF fingerprint features including: Envelope, phase, STFT, and wavelet feature.