Skip to main content
Log in

Physical layer authentication in UAV-enabled relay networks based on manifold learning

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

An unmanned aerial vehicle (UAV) relay network is a promising solution in the next-generation wireless networks due to its high capacity and unlimited geography. However, because of the openness of wireless channels and UAV mobility, it is remarkably challenging to guarantee the secure access of UAV relay. In this paper, we investigate the physical layer authentication (PLA) to verify the identity of the UAV relay for preventing unauthorized access to users’ information or network service. Unlike most existing PLA methods for UAV, the proposed PLA scheme fully considers the time-varying of physical layer attributes caused by UAV mobility, and transforms the authentication problem into recognizing nonlinearly separable physical layer data. Particularly, we propose a manifold learning-based PLA scheme that can authenticate the mobile UAV relay in real time by establishing the local correlation of physical layer attributes. The Markov chain of physical layer data in the time domain is established to evaluate UAV state transition probability through the proposed diffusion map algorithm. The legitimate UAV and spoofing attackers can always be authenticated by the different motion states. Performance analysis offered a comprehensive understanding of the proposed scheme. Extensive simulations confirm that the performance of the proposed scheme improves over 18% in resisting the intelligent spoofing UAV compared with the traditional methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wang H, Zhao H, Zhang J, et al. Survey on unmanned aerial vehicle networks: a cyber physical system perspective. IEEE Commun Surv Tut, 2020, 22: 1027–1070

    Article  Google Scholar 

  2. Li B, Fei Z, Zhang Y. UAV communications for 5G and beyond: recent advances and future trends. IEEE Internet Things J, 2019, 6: 2241–2263

    Article  Google Scholar 

  3. Shi W, Li J, Cheng N, et al. Multi-drone 3-D trajectory planning and scheduling in drone-assisted radio access networks. IEEE Trans Veh Technol, 2019, 68: 8145–8158

    Article  Google Scholar 

  4. Sun X, Ng D W K, Ding Z, et al. Physical layer security in UAV systems: challenges and opportunities. IEEE Wireless Commun, 2019, 26: 40–47

    Article  Google Scholar 

  5. You X H, Wang C-X, Huang J, et al. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2021, 64: 110301

    Article  Google Scholar 

  6. Guo Y, Wu M, Tang K, et al. Covert spoofing algorithm of UAV based on GPS/INS-integrated navigation. IEEE Trans Veh Technol, 2019, 68: 6557–6564

    Article  Google Scholar 

  7. Li B, Fei Z, Zhang Y, et al. Secure UAV communication networks over 5G. IEEE Wireless Commun, 2019, 26: 114–120

    Article  Google Scholar 

  8. Bikos A N, Sklavos N. LTE/SAE security issues on 4G wireless networks. IEEE Secur Privacy, 2013, 11: 55–62

    Article  Google Scholar 

  9. Jiang L, Chang X, Bai J, et al. Dependability analysis of 5G-AKA authentication service from server and user perspectives. IEEE Access, 2020, 8: 89562–89574

    Article  Google Scholar 

  10. Zhang M X, Fang Y. Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wireless Commun, 2005, 4: 734–742

    Article  Google Scholar 

  11. Wang H M, Zhang X, Jiang J C. UAV-involved wireless physical-layer secure communications: overview and research directions. IEEE Wireless Commun, 2019, 26: 32–39

    Article  Google Scholar 

  12. Wang H M, Zhang X. UAV SECURE DOWNlink NOMA transmissions: a secure users oriented perspective. IEEE Trans Commun, 2020, 68: 5732–5746

    Article  Google Scholar 

  13. Ji X S, Huang K Z, Jin L, et al. Overview of 5G security technology. Sci China Inf Sci, 2018, 61: 081301

    Article  Google Scholar 

  14. Xiao L, Wan X, Han Z. PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wireless Commun, 2018, 17: 1676–1687

    Article  Google Scholar 

  15. Fang H, Wang X, Hanzo L. Learning-aided physical layer authentication as an intelligent process. IEEE Trans Commun, 2019, 67: 2260–2273

    Article  Google Scholar 

  16. Liao R F, Wen H, Chen S, et al. Multiuser physical layer authentication in Internet of Things with data augmentation. IEEE Internet Things J, 2020, 7: 2077–2088

    Article  Google Scholar 

  17. Abdelaziz A, Burton R, Barickman F, et al. Enhanced authentication based on angle of signal arrivals. IEEE Trans Veh Technol, 2019, 68: 4602–4614

    Article  Google Scholar 

  18. Hou W, Wang X, Chouinard J Y, et al. Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans Commun, 2014, 62: 1658–1667

    Article  Google Scholar 

  19. Fu Q Y, Feng Y H, Wang H M, et al. Initial satellite access authentication based on Doppler frequency shift. IEEE Wireless Commun Lett, 2021, 10: 498–502

    Article  Google Scholar 

  20. Huang K W, Wang H M. Combating the control signal spoofing attack in UAV systems. IEEE Trans Veh Technol, 2018, 67: 7769–7773

    Article  Google Scholar 

  21. Hoang T M, Nguyen N M, Duong T Q. Detection of eavesdropping attack in UAV-aided wireless systems: unsupervised learning with one-class SVM and k-means clustering. IEEE Wireless Commun Lett, 2020, 9: 139–142

    Article  Google Scholar 

  22. Wang H, Fang H, Wang X. Safeguarding cluster heads in UAV swarm using edge intelligence: linear discriminant analysis-based cross-layer authentication. IEEE Open J Commun Soc, 2021, 2: 1298–1309

    Article  Google Scholar 

  23. Jiang C, Fang Y, Zhao P, et al. Intelligent UAV identity authentication and safety supervision based on behavior modeling and prediction. IEEE Trans Ind Inf, 2020, 16: 6652–6662

    Article  Google Scholar 

  24. Wang H M, Zhang Y, Zhang X, et al. Secrecy and covert communications against UAV surveillance via multi-hop networks. IEEE Trans Commun, 2020, 68: 389–401

    Article  Google Scholar 

  25. Song Q H, Zeng Y, Xu J, et al. A survey of prototype and experiment for UAV communications. Sci China Inf Sci, 2021, 64: 140301

    Article  Google Scholar 

  26. Wang N, Jiang T, Lv S, et al. Physical-layer authentication based on extreme learning machine. IEEE Commun Lett, 2017, 21: 1557–1560

    Article  Google Scholar 

  27. Pan F, Pang Z, Wen H, et al. Threshold-free physical layer authentication based on machine learning for industrial wireless CPS. IEEE Trans Ind Inf, 2019, 15: 6481–6491

    Article  Google Scholar 

  28. Qiu X, Jiang T, Wu S, et al. Physical layer authentication enhancement using a Gaussian mixture model. IEEE Access, 2018, 6: 53583–53592

    Article  Google Scholar 

  29. Ma Y, Fu Y. Manifold Learning Theory and Applications. Boca Raton: CRC Press, 2012

    Google Scholar 

  30. Olson C C, Judd K P, Nichols J M. Manifold learning techniques for unsupervised anomaly detection. Expert Syst Appl, 2018, 91: 374–385

    Article  Google Scholar 

  31. Lindenbaum O, Salhov M, Yeredor A, et al. Gaussian bandwidth selection for manifold learning and classification. Data Min Knowl Disc, 2020, 34: 1676–1712

    Article  MathSciNet  Google Scholar 

  32. Mishne G, Cohen I. Multiscale anomaly detection using diffusion maps. IEEE J Sel Top Signal Process, 2013, 7: 111–123

    Article  Google Scholar 

  33. Song Q, Zheng F C, Zeng Y, et al. Joint beamforming and power allocation for UAV-enabled full-duplex relay. IEEE Trans Veh Technol, 2019, 68: 1657–1671

    Article  Google Scholar 

  34. Zeng Y, Zhang R, Lim T J. Throughput maximization for UAV-enabled mobile relaying systems. IEEE Trans Commun, 2016, 64: 4983–4996

    Article  Google Scholar 

  35. Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63: 222302

    Article  MathSciNet  Google Scholar 

  36. Xia S, Tao X, Li N, et al. Multiple correlated attributes based physical layer authentication in wireless networks. IEEE Trans Veh Technol, 2021, 70: 1673–1687

    Article  Google Scholar 

  37. Zhang S, Zhang H, He Q, et al. Joint trajectory and power optimization for UAV relay networks. IEEE Commun Lett, 2018, 22: 161–164

    Article  Google Scholar 

  38. He X F, Dai H Y, Ning P. HMM-based malicious user detection for robust collaborative spectrum sensing. IEEE J Sel Areas Commun, 2013, 31: 2196–2208

    Article  Google Scholar 

  39. Camastra F, Staiano A. Intrinsic dimension estimation: advances and open problems. Inf Sci, 2016, 328: 26–41

    Article  Google Scholar 

  40. Lindenbaum O, Yeredor A, Salhov M, et al. Multi-view diffusion maps. Inf Fusion, 2020, 55: 127–149

    Article  Google Scholar 

  41. Granata D, Carnevale V. Accurate estimation of the intrinsic dimension using graph distances: unraveling the geometric complexity of datasets. Sci Rep, 2016, 6: 31377

    Article  Google Scholar 

  42. Erba V, Gherardi M, Rotondo P. Intrinsic dimension estimation for locally undersampled data. Sci Rep, 2019, 9: 17133

    Article  Google Scholar 

  43. Mo D Y, Huang S H. Fractal-based intrinsic dimension estimation and its application in dimensionality reduction. IEEE Trans Knowl Data Eng, 2012, 24: 59–71

    Article  Google Scholar 

  44. Singer A, Erban R, Kevrekidis I G, et al. Detecting intrinsic slow variables in stochastic dynamical systems by anisotropic diffusion maps. Proc Natl Acad Sci USA USA, 2009, 106: 16090–16095

    Article  Google Scholar 

  45. Cayton L. Algorithms for Manifold Learning. Technical Report, University of California, San Diego, 2005, 12: 1–17

    Google Scholar 

  46. Khanduri R, Rattan S S. Performance comparison analysis between IEEE 802. 11a/b/g/n standards. Int J Comput Appl Tech, 2013, 78: 13–20

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61932005, 61941105), Shenzhen Science and Technology Innovation Commission Free Exploring Basic Research Project (Grant No. 2021Szvup008), and 111 Project of China (Grant No. B16006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Tao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xia, S., Tao, X., Li, N. et al. Physical layer authentication in UAV-enabled relay networks based on manifold learning. Sci. China Inf. Sci. 65, 222302 (2022). https://doi.org/10.1007/s11432-021-3410-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-021-3410-2

Keywords

Navigation