kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0001-5638-3213
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0003-4961-5973
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0001-9307-484X
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0003-1835-2963
Show others and affiliations
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

5G and beyond 5G low power wireless networks make Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications capable of serving massive amounts of devices and machines. Due to the broadcast nature of wireless networks, it is crucial to secure the communication between these devices and machines from spoofing and interception attacks. This paper is concerned with the security of carrier frequency offset (CFO) based continuous physical layer authentication. The interaction between an attacker and a defender is modeled as a dynamic discrete leader-follower game with imperfect information. In the considered model, a legitimate user (Alice) communicates with the defender/operator (Bob) and is authorized by her CFO continuously. The attacker (Eve), by listening/eavesdropping the communication between Alice and Bob, tries to learn the CFO characteristics of Alice and aims to inject malicious packets to Bob by impersonating Alice. First, by showing that the optimal attacker strategy is a threshold policy, an optimization problem of the attacker with exponentially growing action space is reduced to a tractable integer optimization problem with a single parameter, then the corresponding defender cost is derived. Extensive simulations illustrate the characteristics of optimal strategies/utilities of the players depending on the actions, and show that the defender's optimal false positive rate causes attack success probabilities to be in the order of 0.99. The results show the importance of the parameters while finding the balance between system security and efficiency.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2021.
Series
IEEE International Conference on Communications, ISSN 1550-3607
Keywords [en]
physical layer authentication, carrier frequency offset, continuous authentication, adversarial learning, threshold policy, binary hypothesis testing
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-306518DOI: 10.1109/ICC42927.2021.9500824ISI: 000719386003084Scopus ID: 2-s2.0-85115698633OAI: oai:DiVA.org:kth-306518DiVA, id: diva2:1621962
Conference
IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada
Note

QC 20211221

Part of proceeding: ISBN 978-172817122-7

Available from: 2021-12-21 Created: 2021-12-21 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Saritas, SerkanForssell, KarlThobaben, RagnarSandberg, HenrikDán, György

Search in DiVA

By author/editor
Saritas, SerkanForssell, KarlThobaben, RagnarSandberg, HenrikDán, György
By organisation
Information Science and EngineeringDecision and Control Systems (Automatic Control)Network and Systems Engineering
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 76 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf