An Efficient Spoofing Attack Detection Using Deep Learning-based Physical Layer Security Technique

Received: 14 Mar 2024, Revised: 10 Aug 2024, Accepted: 29 August 2024, Available online: 30 sep 2024, Version of Record: 30 sep 2024

Swethambri Mohan, Atchaya Annadurai, K. Gunaseelan

Abstract



Spoofing attack detection plays a crucial role in the defence field, involving critical and highly secured data processing. The accurate attack detection mechanism prevents unauthorised access to sensitive information, thereby protecting National security. Physical Layer Security (PLS) is a promising emerging technique that uses the wireless channel’s randomness to secure the communication network. The spoofing attack is one of the severe threats to the wireless network, where the attacker imitates the legitimate user to launch an attack against the network. This paper investigates the channel characteristics-based physical layer technique to detect spoofing attacks. For static radio environments, the two-sample independent hypothesis testing is used to identify the spoofing attack, showing an improvement in detection accuracy of 97 %. The attack detection problem is considered a Reinforcement Learning (RL) based classification problem for a challenging dynamic radio environment. It is simulated using the actor-critic-based Deep Reinforcement Learning (DRL) technique with the help of the Reformed Deep Deterministic Policy Gradient (Re-DDPG) algorithm. The simulated results show that the proposed method performs better than the existing strategies and achieves a Receiver Operating Characteristics (ROC) value of 0.96. The detection accuracy of the proposed method can reach up to 98 %, with precision and recall of about 98 % and 99 %, respectively.
Proposed methodology for attack detection in dynamic radio environment.

Proposed methodology for attack detection in dynamic radio environment.
… 
Block diagram of proposed Re-DDPG-based attack detection model.

Block diagram of proposed Re-DDPG-based attack detection model.
… 
Flow diagram of proposed spoofing attack detection model.

Flow diagram of proposed spoofing attack detection model.
… 
P f VS P d for the traditional and proposed scheme in static radio environment.

P f VS P d for the traditional and proposed scheme in static radio environment.
… 
Measured metrics with respect to episodes; (a) Episodes vs. Rewards of DRL; (b) Episode vs. Variance of DRL; (c) Episode vs. Loss of DRL; (d) Average rewards for different learning rates.
 



Description



   

Indexed in scopus

https://www.scopus.com/sources.uri
      

Article metrics

10.31763/DSJ.v5i1.1674 Abstract views : | PDF views :

   

Cite

   

Full Text

Download

Conflict of interest


“Authors state no conflict of interest”


Funding Information


This research received no external funding or grants


Peer review:


Peer review under responsibility of Defence Science Journal


Ethics approval:


Not applicable.


Consent for publication:


Not applicable.


Acknowledgements:


None.