Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019 May 28;19(11):2440.
doi: 10.3390/s19112440.

Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks

Affiliations

Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks

Run-Fa Liao et al. Sensors (Basel). .

Abstract

In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes' authentication method, the convolutional neural network (CNN)-based sensor nodes' authentication method, and the convolution preprocessing neural network (CPNN)-based sensor nodes' authentication method, have been adopted to implement the PHY-layer authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed method can implement a lightweight authentication for the sensor nodes under the edge computing (EC) system in IWSNs.

Keywords: PHY-layer; WSN; industrial; light-weight authentication; neural network.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The deep neural network.
Figure 2
Figure 2
The convolutional neural network. CSI, channel state information.
Figure 3
Figure 3
The system model of DL-based PHY-layer authentication in IWSNs.
Figure 4
Figure 4
DL-based PHY-layer authentication flow chart.
Figure 5
Figure 5
The authentication performance with different sensor nodes. (a) The cost value under different numbers of sensor nodes with the DNN-based method; (b) The authentication rate under different numbers of sensor nodes with the DNN-based method.
Figure 6
Figure 6
The authentication performance with different numbers of hidden layers. (a) The authentication rate of different numbers of hidden layers; (b) The authentication rate of different numbers of hidden layers after training was stabilized.
Figure 7
Figure 7
The authentication performance with different algorithms. (a) The authentication rate of different algorithms under different numbers of sensor nodes; (b) The time in the training phase of different algorithms under different numbers of sensor nodes.
Figure 8
Figure 8
The network topology.
Figure 9
Figure 9
The location of the wireless sensor nodes in the practical industrial scenario.
Figure 10
Figure 10
The authentication rate with USRPs.

References

    1. Christin D., Mogre P.S., Hollick M. Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives. Future Internet. 2010;2:96–125. doi: 10.3390/fi2020096. - DOI
    1. Low K.S., Win W.N.N., Er M.J. Wireless sensor networks for industrial environments; Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06); Vienna, Austria. 28–30 November 2005; pp. 271–276.
    1. Bal M. Industrial applications of collaborative wireless sensor networks: A survey; Proceedings of the 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE); Istanbul, Turkey. 1–4 June 2014; pp. 1463–1468.
    1. Zoppi S., Van Bemten A., Gürsu H.M., Vilgelm M., Guck J., Kellerer W. Achieving Hybrid Wired/Wireless Industrial Networks with WDetServ: Reliability-Based Scheduling for Delay Guarantees. IEEE Trans. Ind. Informat. 2018;14:2307–2319. doi: 10.1109/TII.2018.2803122. - DOI
    1. Pan F., Pang Z., Luvisotto M., Xiao M., Wen H. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions. IEEE Ind. Electron. Mag. 2018;12:18–27. doi: 10.1109/MIE.2018.2874385. - DOI

LinkOut - more resources