Skip to main content

Research on Physical Layer Authentication Method of Internet of Things Based on Contour Stellar Images and Convolutional Neural Network

  • Conference paper
  • First Online:
6GN for Future Wireless Networks (6GN 2023)

Abstract

Wireless communication networks are prone to information security issues due to the openness of radio transmission. User information security relies heavily on reliable identification and authentication methods. To address the channel differences between different users, this paper proposes a physical layer identity authentication method using contour stellar images. By converting one-dimensional signals into two-dimensional contour stellar images using measured channel information from two channel scenarios, and enhancing the data set with data enhancement technology, a convolutional neural network is employed to classify and recognize 800 contour stellar images in two scenarios. This achieves the goal of different user identity authentication. Additionally, the CNN model and SVM model are compared under the same conditions. The results indicate that the proposed CNN model achieves 98.3% recognition accuracy, demonstrating strong robustness and authentication efficacy in real-world scenarios.

Sponsored by Shanghai Rising-Star Program (No. 23QA1403800), National Natural Science Foundation of China (No. 62076160) and Natural Science Foundation of Shanghai (No. 21ZR1424700).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yong, H.: Research on Physical Layer Security Authentication Technology for Internet of Things. Huazhong University of Science and Technology (2022). https://doi.org/10.27157/d.cnki.ghzku.2022.000002

  2. Jiang, H., Wang, S., Zhao, K.: Individual identification method of communication radiation source based on differential equipotential star map J. Jinan Univ. (Nat. Sci. Ed.) 35(05), 433–438+451 (2021). https://doi.org/10.13349/j.cnki.jdxbn.20210323.003

  3. Wan, C.: Research on Watermarking technology of Physical Layer based on TD-LTE. Huazhong University of Science and Technology (2021). https://doi.org/10.27157/d.cnki.ghzku.2021.001167

  4. Li, M., Xie, J., Yang, H.: RFID fingerprint recognition technology based on feature fusion of frequency hopping signal. Comput. Measur. Control 30(12), 319–325 (2022). https://doi.org/10.16526/j.cnki.11-4762/tp.2022.12.047

  5. Jiajun, W.: Research and system implementation of wireless device Authentication Technology based on physical layer RF fingerprint. Nanjing University of Posts and Telecommunications (2022). https://doi.org/10.27251/d.cnki.gnjdc.2022.000982

  6. Chaofan, X.: Research on Physical Layer Security Authentication based on Deep learning. Nanjing University of Posts and Telecommunications (2022). https://doi.org/10.27251/d.cnki.gnjdc.2022.000628

  7. Wang, Y., Zhou, T., Tao, C.: Scene identification of high-speed rail wireless channel based on LSTM and multi-feature fusion. J. Radio Sci. 36(03), 453–459+476 (2021)

    Google Scholar 

  8. Cao, Y.: Research and design of space - time coding in MIMO eavesdropping Channel. Donghua University (2017)

    Google Scholar 

  9. Zhiyuan, Z.: Research on Physical Layer Authentication Technology based on Machine learning. Beijing University of Posts and Telecommunications (2021). https://doi.org/10.26969/d.cnki.gbydu.2021.002658

  10. Gang, Z.: Remote sensing image scene classification based on deep Learning lightweight Convolutional Neural network. Nanjing University of Posts and Telecommunications (2022). https://doi.org/10.27251/d.cnki.gnjdc.2022.000193

  11. Qiuping, H., Xiaofeng, L., Qiubin, G.: Research on feedback of large-scale antenna channel state Information based on Artificial Intelligence. Telecommun. Sci. 38(03), 74–83 (2022)

    Google Scholar 

  12. Wang, Q., Hu, C., Li, F.: Scene recognition method based on deep transfer learning and multi-scale feature fusion. Electron. Technol. 1–9 (2023). https://doi.org/10.16180/j.cnki.issn1007-7820.2023.11.004

  13. Zhanjian, W.: Research on indoor positioning technology based on channel state information and depth image. Nanjing University of Posts and Telecommunications (2022). https://doi.org/10.27251/d.cnki.gnjdc.2022.001088

  14. Shuangde, L.: Research on wireless channel Measurement, simulation and modeling for 5G hotspot scene. Nanjing University of Posts and Telecommunications (2022). https://doi.org/10.27251/d.cnki.gnjdc.2022.000006

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingchao Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lu, Y., Li, J., Ying, Y., Zhang, B., Shi, T., Zhao, H. (2024). Research on Physical Layer Authentication Method of Internet of Things Based on Contour Stellar Images and Convolutional Neural Network. In: Li, J., Zhang, B., Ying, Y. (eds) 6GN for Future Wireless Networks. 6GN 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 553. Springer, Cham. https://doi.org/10.1007/978-3-031-53401-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-53401-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-53400-3

  • Online ISBN: 978-3-031-53401-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics