Cargando…
Channel Prediction-Based Security Authentication for Artificial Intelligence of Things
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) ap...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422243/ https://www.ncbi.nlm.nih.gov/pubmed/37571494 http://dx.doi.org/10.3390/s23156711 |
_version_ | 1785089157330108416 |
---|---|
author | Qiu, Xiaoying Yu, Jinwei Zhuang, Wenying Li, Guangda Sun, Xuan |
author_facet | Qiu, Xiaoying Yu, Jinwei Zhuang, Wenying Li, Guangda Sun, Xuan |
author_sort | Qiu, Xiaoying |
collection | PubMed |
description | The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky–Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%. |
format | Online Article Text |
id | pubmed-10422243 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104222432023-08-13 Channel Prediction-Based Security Authentication for Artificial Intelligence of Things Qiu, Xiaoying Yu, Jinwei Zhuang, Wenying Li, Guangda Sun, Xuan Sensors (Basel) Article The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky–Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%. MDPI 2023-07-27 /pmc/articles/PMC10422243/ /pubmed/37571494 http://dx.doi.org/10.3390/s23156711 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Qiu, Xiaoying Yu, Jinwei Zhuang, Wenying Li, Guangda Sun, Xuan Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title | Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title_full | Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title_fullStr | Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title_full_unstemmed | Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title_short | Channel Prediction-Based Security Authentication for Artificial Intelligence of Things |
title_sort | channel prediction-based security authentication for artificial intelligence of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422243/ https://www.ncbi.nlm.nih.gov/pubmed/37571494 http://dx.doi.org/10.3390/s23156711 |
work_keys_str_mv | AT qiuxiaoying channelpredictionbasedsecurityauthenticationforartificialintelligenceofthings AT yujinwei channelpredictionbasedsecurityauthenticationforartificialintelligenceofthings AT zhuangwenying channelpredictionbasedsecurityauthenticationforartificialintelligenceofthings AT liguangda channelpredictionbasedsecurityauthenticationforartificialintelligenceofthings AT sunxuan channelpredictionbasedsecurityauthenticationforartificialintelligenceofthings |