Skip to main content
Log in

Reliable resource allocation with RF fingerprinting authentication in secure IoT networks

  • Research Paper
  • Special Focus on Cyber Security in the Era of Artificial Intelligence
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The unprecedented growth of the Internet of Things (IoT) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service (QoS) of authenticated users rather than that of all users. By acknowledging this limitation, we realise that user authentication would be a big issue in IoT networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious attacks and the relevant complicated computations restrict IoT deployments. In this paper, a radio frequency (RF) fingerprinting based authentication scheme is proposed under the architecture of convolutional neural network (CNN). It can effectively prevent unauthenticated users from consuming valuable wireless resources and significantly improve QoS performance for legitimate users. By solving an NP-hard optimization problem with the objective of minimizing efficient energy density, we demonstrate an approximate optimal resource allocation scheme in consideration of an RF-fingerprinting based authentication process. The analytic results show that our proposed scheme can dramatically reduce the efficient energy density compared with traditional cryptography based authentication schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Liu X, Jia M, Zhang X, et al. A novel multichannel Internet of Things based on dynamic spectrum sharing in 5G communication. IEEE Internet Things J, 2019, 6: 5962–5970

    Article  Google Scholar 

  2. Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63: 220302

    Article  MathSciNet  Google Scholar 

  3. Li S L, Zhai D, Du P F, et al. Energy-efficient task offloading, load balancing, and resource allocation in mobile edge computing enabled IoT networks. Sci China Inf Sci, 2019, 62: 029307

    Article  Google Scholar 

  4. You X H, Wang C-X, Huang J, et al. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2021, 64: 110301

    Article  Google Scholar 

  5. Liang B, Fan R, Hu H, et al. Nonlinear pricing based distributed offloading in multi-user mobile edge computing. IEEE Trans Veh Technol, 2021, 70: 1077–1082

    Article  Google Scholar 

  6. Kakkavas G, Tsitseklis K, Karyotis V, et al. A software defined radio cross-layer resource allocation approach for cognitive radio networks: from theory to practice. IEEE Trans Cogn Commun Netw, 2020, 6: 740–755

    Article  Google Scholar 

  7. Cui J, Wei L, Zhang J, et al. An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst, 2019, 20: 1621–1632

    Article  Google Scholar 

  8. Peng L, Hu A, Zhang J, et al. Design of a hybrid RF fingerprint extraction and device classification scheme. IEEE Internet Things J, 2019, 6: 349–360

    Article  Google Scholar 

  9. Das R, Gadre A, Zhang S, et al. A deep learning approach to IoT authentication. In: Proceedings of IEEE International Conference on Communications (ICC), Kansas City, 2018. 1–6

  10. Hao P, Wang X. Integrating PHY security into NDN-IoT networks by exploiting MEC: authentication efficiency, robustness, and accuracy enhancement. IEEE Trans Signal Inf Process over Networks, 2019, 5: 792–806

    Article  MathSciNet  Google Scholar 

  11. Chen D, Zhang N, Qin Z, et al. S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J, 2017, 4: 88–100

    Article  Google Scholar 

  12. Xu D Y, Ren P Y, Ritcey J A. Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans Inform Forensic Secur, 2019, 14: 387–402

    Article  Google Scholar 

  13. Tobi W. Weak password policies: a lack of corporate social responsibility. J Colloq Inf Syst Sec Educ, 2020, 8: 7–8

    Google Scholar 

  14. Radhakrishnan S V, Uluagac A S, Beyah R. GTID: a technique for physical device and device type fingerprinting. IEEE Trans Dependable Secure Comput, 2015, 12: 519–532

    Article  Google Scholar 

  15. Fan X, Wang F, Wang F, et al. When RFID meets deep learning: exploring cognitive intelligence for activity identification. IEEE Wireless Commun, 2019, 26: 19–25

    Article  Google Scholar 

  16. Wu Q, Feres C, Kuzmenko D, et al. Deep learning based RF fingerprinting for device identification and wireless security. Electron lett, 2018, 54: 1405–1407

    Article  Google Scholar 

  17. Wang X, Wang X, Mao S. RF sensing in the Internet of Things: a general deep learning framework. IEEE Commun Mag, 2018, 56: 62–67

    Article  Google Scholar 

  18. Youssef K, Bouchard L, Haigh K, et al. Machine learning approach to RF transmitter identification. IEEE J Radio Freq Identif, 2018, 2: 197–205

    Article  Google Scholar 

  19. Jian T, Rendon B C, Ojuba E, et al. Deep learning for RF fingerprinting: a massive experimental study. IEEE Internet Things M, 2020, 3: 50–57

    Article  Google Scholar 

  20. Sankhe K, Belgiovine M, Zhou F, et al. Oracle: optimized radio classification through convolutional neural networks. In: Proceedings of IEEE Conference on Computer Communications, 2019. 370–378

  21. Chatterjee B, Das D, Maity S, et al. RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J, 2019, 6: 388–398

    Article  Google Scholar 

  22. Riyaz S, Sankhe K, Ioannidis S, et al. Deep learning convolutional neural networks for radio identification. IEEE Commun Mag, 2018, 56: 146–152

    Article  Google Scholar 

  23. Roy D, Mukherjee T, Chatterjee M, et al. RFAL: adversarial learning for RF transmitter identification and classification. IEEE Trans Cogn Commun Netw, 2020, 6: 783–801

    Article  Google Scholar 

  24. Cohen R, Katzir L. The generalized maximum coverage problem. Inf Processing Lett, 2008, 108: 15–22

    Article  MathSciNet  MATH  Google Scholar 

  25. Li X, Dang Y, Aazam M, et al. Energy-efficient computation offloading in vehicular edge cloud computing. IEEE Access, 2020, 8: 37632–37644

    Article  Google Scholar 

  26. He K, Sun J. Convolutional neural networks at constrained time cost. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. 5353–5360

Download references

Acknowledgements

This work was partially supported by Science and Technology Program of Sichuan Province (Grant No. 2021YFG0330), Intelligent Terminal Key Laboratory of SiChuan Province (Grant No. SCITLAB-0001), Fundamental Research Funds for the Central Universities (Grant No. ZYGX2019J076), National Natural Science Foundation of China (Grant No. 61971092), and Province Sichuan Foundation for Distinguished Young Scholars (Grant No. 2020JDJQ0023).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Su Hu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, W., Hu, S., Lin, D. et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci. China Inf. Sci. 65, 170304 (2022). https://doi.org/10.1007/s11432-021-3284-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-021-3284-y

Keywords

Navigation