Contact Us Search Paper

Physical Layer Authentication in the Internet of Vehicles based on Signal Propagation Attribute Prediction

Mubarak Umar1,2,3,*, Jiandong Wang1,2, Lei Liu4, Zewei Guo1,2, and Shuguang Wang5

Corresponding Author:

Mubarak Umar

Affiliation(s):

1 School of Computer Science and Technology, Xidian University, Xi’an 710071, China

2 Xidian University Qingdao Institute of Computing Technology, Qingdao, China

3 Department of Information Technology, Bayero University, Kano 700241, Nigeria

4 Software College, Shandong University, China

5 Shandong Institute of Standardization, No.146-6, Lishan Road, Jinan City, China

*Corresponding author

Abstract:

Physical layer authentication (PLA) has emerged as a promising alternative to complex cryptographic-based authentication schemes, especially for the Internet of Vehicles (IoV) scenarios with resource-limited onboard units (OBUs). However, the existing PLA schemes securing the IoV against GPS location spoofing/falsification attacks consider only insider attackers. Moreover, they cannot be used by mobile vehicles to validate GPS locations. To address these issues, this paper proposes a PLA scheme based on the Gaussian process (GP) path loss prediction, where channel state information (CSI) is used to track the variation of the channel characteristics and predict the next legitimate path loss (PL) of the signal from a transmitter for authentication. The key ideas in the proposed scheme are to first establish a mapping between the historical CSI attributes and PL features of the transmitter’s signal and use this mapping to predict the next PL, which is then used to cross-verify the transmitter’s reported location information. Extensive simulation experiments are conducted using generated radio channel characteristics from the quasideterministic radio channel generator (QuaDRiGa) to demonstrate the effectiveness of the proposed approach. The results of the experiments show that our system efficiently addressed the limitations of the existing works and improves the authentication performance in IoV environments.

Keywords:

Internet of vehicles (IoV), Gaussian process (GP), machine learning (ML), physical layer authentication (PLA), path loss (PL)

Downloads: 77 Views: 582
Cite This Paper:

Mubarak Umar, Jiandong Wang, Lei Liu, Zewei Guo, and Shuguang Wang (2023). Physical Layer Authentication in the Internet of Vehicles based on Signal Propagation Attribute Prediction. Journal of Networking and Network Applications, Volume 3, Issue 1, pp. 1–10. https://doi.org/10.33969/J-NaNA.2023.030101.

References:

[1] H. Qiu, M. Qiu, and R. Lu, “Secure v2x communication network based on intelligent pki and edge computing,” IEEE Network, vol. 34, no. 2, pp. 172–178, 2020.

[2] D. Xu, P. Ren, and J. A. Ritcey, “Phy-layer cover-free coding for wireless pilot authentication in iov communi-cations: Protocol design and ultra-security proof,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 171–187, 2019.

[3] N. V. Abhishek, M. N. Aman, T. J. Lim, and B. Sikdar, “Drive: Detecting malicious roadside units in the internet of vehicles with low latency data integrity,” IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3270–3281, 2022.

[4] J. Contreras-Castillo, S. Zeadally, and J. A. Guerrero-Iba˜nez, “Internet of vehicles: Architecture, protocols, and security,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3701–3709, 2018.

[5] L. Wang and X. Liu, “Notsa: Novel obu with three-level security architecture for internet of vehicles,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3548–3558, 2018.

[6] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park, “Akm-iov: Authenticated key management protocol in fog computing-based internet of vehicles deployment,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8804–8817, 2019.

[7] J. McEntyre and B. Kihei, “Zero-knowledge proof for enabling privacy-preserving electronic toll collection with vehicle-to-everything communications,” in 2022 IEEE International Conference on Consumer Electronics (ICCE), 2022, pp. 1–6.

[8] R. Ma, J. Cao, Y. Zhang, C. Shang, L. Xiong, and H. Li, “A group-based multicast service authentication and data transmission scheme for 5g-v2x,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 23976–23992, 2022.

[9] H. Tan, Z. Gui, and I. Chung, “A secure and efficient certificateless authentication scheme with unsupervised anomaly detection in vanets,” IEEE Access, vol. 6, pp. 74260–74276, 2018.

[10] M. Yang, S. Wei, R. Jiang, F. Ali, and B. Yang, “Single-message-based cooperative authentication scheme for in-telligent transportation systems,” Computers & Electrical Engineering, vol. 96, p. 107390, 2021.

[11] H. Qiu, M. Qiu, and R. Lu, “Secure v2x communication network based on intelligent pki and edge computing,” IEEE Network, vol. 34, no. 2, pp. 172–178, 2020.

[12] S. Taha, M. Alhassany, and X. Shen, “Lightweight handover authentication scheme for 5g-based v2x com-munications,” in 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1–6.

[13] J. Zhang, H. Zhong, J. Cui, Y. Xu, and L. Liu, “Smaka: Secure many-to-many authentication and key agreement scheme for vehicular networks,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1810–1824, 2021.

[14] H. M. Wang and Q. Y. Fu, “Channel-prediction-based one-class mobile iot device authentication,” IEEE Inter-net of Things Journal, vol. 9, no. 10, pp. 7731–7745, 2022.

[15] J. Wang, Y. Shao, Y. Ge, and R. Yu, “Physical-layer authentication based on adaptive kalman filter for v2x communication,” Vehicular Communications, vol. 26, p. 100281, 2020.

[16] S. Wang, K. Huang, X. Xu, Z. Zhong, and Y. Zhou, “Csi-based physical layer authentication via deep learning,” IEEE Wireless Communications Letters, vol. 11, no. 8, pp. 1748–1752, 2022.

[17] A. Abdelaziz, R. Burton, F. Barickman, J. Martin, J. We-ston, and C. E. Koksal, “Enhanced authentication based on angle of signal arrivals,” IEEE Transactions on Vehic-ular Technology, vol. 68, no. 5, pp. 4602–4614, 2019.

[18] J. Wang, Y. Shao, Y. Wang, Y. Ge, and R. Yu, “Physical layer authentication based on nonlinear kalman filter for v2x communication,” IEEE Access, vol. 8, pp. 163746–163757, 2020.

[19] X. Yin, X. Fang, N. Zhang, P. Yang, X. Sha, and J. Qiu, “Online learning aided adaptive multiple attribute-based physical layer authentication in dynamic environments,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1106–1116, 2021.

[20] H. Fang, X. Wang, and L. Hanzo, “Learning-aided phys-ical layer authentication as an intelligent process,” IEEE Transactions on Communications, vol. 67, no. 3, pp. 2260–2273, 2019.

[21] Y. Chen, P. H. Ho, H. Wen, S. Y. Chang, and S. Real, “On physical-layer authentication via online transfer learn-ing,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1374–1385, 2022.

[22] F. Pan, Z. Pang, H. Wen, M. Luvisotto, M. Xiao, R. F. Liao, and J. Chen, “Threshold-free physical layer authentication based on machine learning for industrial wireless cps,” IEEE Transactions on Industrial Informat-ics, vol. 15, no. 12, pp. 6481–6491, 2019.

[23] V. L. Nguyen, P. C. Lin, and R.-H. Hwang, “Enhancing misbehavior detection in 5g vehicle-to-vehicle communications,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 9417–9430, 2020.

[24] S. So, J. Petit, and D. Starobinski, “Physical layer plausi-bility checks for misbehavior detection in v2x networks,” in Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec ’19. New York, NY, USA: Association for Computing Machinery, 2019, p. 84–93.

[25] C. E. Rasmussen and C. K. I. Williams, Gaussian Pro-cesses for Machine Learning. Cambridge, MA, USA: MIT Press, 2006.

[26] S. Jaeckel, L. Raschkowski, K. B¨orner, and L. Thiele, “Quadriga: A 3-d multi-cell channel model with time evolution for enabling virtual field trials,” IEEE Trans-actions on Antennas and Propagation, vol. 62, no. 6, pp. 3242–3256, 2014.