Abstract
The unprecedented growth of the Internet of Things (IoT) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service (QoS) of authenticated users rather than that of all users. By acknowledging this limitation, we realise that user authentication would be a big issue in IoT networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious attacks and the relevant complicated computations restrict IoT deployments. In this paper, a radio frequency (RF) fingerprinting based authentication scheme is proposed under the architecture of convolutional neural network (CNN). It can effectively prevent unauthenticated users from consuming valuable wireless resources and significantly improve QoS performance for legitimate users. By solving an NP-hard optimization problem with the objective of minimizing efficient energy density, we demonstrate an approximate optimal resource allocation scheme in consideration of an RF-fingerprinting based authentication process. The analytic results show that our proposed scheme can dramatically reduce the efficient energy density compared with traditional cryptography based authentication schemes.
Similar content being viewed by others
References
Liu X, Jia M, Zhang X, et al. A novel multichannel Internet of Things based on dynamic spectrum sharing in 5G communication. IEEE Internet Things J, 2019, 6: 5962–5970
Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63: 220302
Li S L, Zhai D, Du P F, et al. Energy-efficient task offloading, load balancing, and resource allocation in mobile edge computing enabled IoT networks. Sci China Inf Sci, 2019, 62: 029307
You X H, Wang C-X, Huang J, et al. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2021, 64: 110301
Liang B, Fan R, Hu H, et al. Nonlinear pricing based distributed offloading in multi-user mobile edge computing. IEEE Trans Veh Technol, 2021, 70: 1077–1082
Kakkavas G, Tsitseklis K, Karyotis V, et al. A software defined radio cross-layer resource allocation approach for cognitive radio networks: from theory to practice. IEEE Trans Cogn Commun Netw, 2020, 6: 740–755
Cui J, Wei L, Zhang J, et al. An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst, 2019, 20: 1621–1632
Peng L, Hu A, Zhang J, et al. Design of a hybrid RF fingerprint extraction and device classification scheme. IEEE Internet Things J, 2019, 6: 349–360
Das R, Gadre A, Zhang S, et al. A deep learning approach to IoT authentication. In: Proceedings of IEEE International Conference on Communications (ICC), Kansas City, 2018. 1–6
Hao P, Wang X. Integrating PHY security into NDN-IoT networks by exploiting MEC: authentication efficiency, robustness, and accuracy enhancement. IEEE Trans Signal Inf Process over Networks, 2019, 5: 792–806
Chen D, Zhang N, Qin Z, et al. S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J, 2017, 4: 88–100
Xu D Y, Ren P Y, Ritcey J A. Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans Inform Forensic Secur, 2019, 14: 387–402
Tobi W. Weak password policies: a lack of corporate social responsibility. J Colloq Inf Syst Sec Educ, 2020, 8: 7–8
Radhakrishnan S V, Uluagac A S, Beyah R. GTID: a technique for physical device and device type fingerprinting. IEEE Trans Dependable Secure Comput, 2015, 12: 519–532
Fan X, Wang F, Wang F, et al. When RFID meets deep learning: exploring cognitive intelligence for activity identification. IEEE Wireless Commun, 2019, 26: 19–25
Wu Q, Feres C, Kuzmenko D, et al. Deep learning based RF fingerprinting for device identification and wireless security. Electron lett, 2018, 54: 1405–1407
Wang X, Wang X, Mao S. RF sensing in the Internet of Things: a general deep learning framework. IEEE Commun Mag, 2018, 56: 62–67
Youssef K, Bouchard L, Haigh K, et al. Machine learning approach to RF transmitter identification. IEEE J Radio Freq Identif, 2018, 2: 197–205
Jian T, Rendon B C, Ojuba E, et al. Deep learning for RF fingerprinting: a massive experimental study. IEEE Internet Things M, 2020, 3: 50–57
Sankhe K, Belgiovine M, Zhou F, et al. Oracle: optimized radio classification through convolutional neural networks. In: Proceedings of IEEE Conference on Computer Communications, 2019. 370–378
Chatterjee B, Das D, Maity S, et al. RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J, 2019, 6: 388–398
Riyaz S, Sankhe K, Ioannidis S, et al. Deep learning convolutional neural networks for radio identification. IEEE Commun Mag, 2018, 56: 146–152
Roy D, Mukherjee T, Chatterjee M, et al. RFAL: adversarial learning for RF transmitter identification and classification. IEEE Trans Cogn Commun Netw, 2020, 6: 783–801
Cohen R, Katzir L. The generalized maximum coverage problem. Inf Processing Lett, 2008, 108: 15–22
Li X, Dang Y, Aazam M, et al. Energy-efficient computation offloading in vehicular edge cloud computing. IEEE Access, 2020, 8: 37632–37644
He K, Sun J. Convolutional neural networks at constrained time cost. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. 5353–5360
Acknowledgements
This work was partially supported by Science and Technology Program of Sichuan Province (Grant No. 2021YFG0330), Intelligent Terminal Key Laboratory of SiChuan Province (Grant No. SCITLAB-0001), Fundamental Research Funds for the Central Universities (Grant No. ZYGX2019J076), National Natural Science Foundation of China (Grant No. 61971092), and Province Sichuan Foundation for Distinguished Young Scholars (Grant No. 2020JDJQ0023).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, W., Hu, S., Lin, D. et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci. China Inf. Sci. 65, 170304 (2022). https://doi.org/10.1007/s11432-021-3284-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-021-3284-y