GMM based semi-supervised learning for channel-based authentication scheme

Nikhil Gulati, Rachel Greenstadt, Kapil R. Dandekar, John M. Walsh

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Authentication schemes based on wireless physical layer channel information have gained significant attention in recent years. It has been shown in recent studies, that the channel based authentication can either cooperate with existing higher layer security protocols or provide some degree of security to networks without central authority such as sensor networks. We propose a Gaussian Mixture Model based semi-supervised learning technique to identify intruders in the network by building a probabilistic model of the wireless channel of the network users. We show that even without having a complete apriori knowledge of the statistics of intruders and users in the network, our technique can learn and update the model in an online fashion while maintaining high detection rate. We experimentally demonstrate our proposed technique leveraging pattern diversity and show using measured channels that miss detection rates as low as 0.1% for false alarm rate of 0.4% can be achieved.

    Original languageEnglish (US)
    Title of host publication2013 IEEE 78th Vehicular Technology Conference, VTC Fall 2013
    DOIs
    StatePublished - 2013
    Event2013 IEEE 78th Vehicular Technology Conference, VTC Fall 2013 - Las Vegas, NV, United States
    Duration: Sep 2 2013Sep 5 2013

    Publication series

    NameIEEE Vehicular Technology Conference
    ISSN (Print)1550-2252

    Conference

    Conference2013 IEEE 78th Vehicular Technology Conference, VTC Fall 2013
    Country/TerritoryUnited States
    CityLas Vegas, NV
    Period9/2/139/5/13

    ASJC Scopus subject areas

    • Computer Science Applications
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'GMM based semi-supervised learning for channel-based authentication scheme'. Together they form a unique fingerprint.

    Cite this