An Efficient Spoofing Attack Detection Using Deep Learning-based Physical Layer Security Technique.
Abstract
Spoofing attack detection plays a crucial role in the defence field, involving critical and highly secured data processing. The accurate attack detection mechanism prevents unauthorised access to sensitive information, thereby protecting National security. Physical Layer Security (PLS) is a promising emerging technique that uses the wireless channel's randomness to secure the communication network. The spoofing attack is one of the severe threats to the wireless network, where the attacker imitates the legitimate user to launch an attack against the network. This paper investigates the channel characteristics-based physical layer technique to detect spoofing attacks. For static radio environments, the two-sample independent hypothesis testing is used to identify the spoofing attack, showing an improvement in detection accuracy of 97 %. The attack detection problem is considered a Reinforcement Learning (RL) based classification problem for a challenging dynamic radio environment. It is simulated using the actor-critic-based Deep Reinforcement Learning (DRL) technique with the help of the Reformed Deep Deterministic Policy Gradient (Re-DDPG) algorithm. The simulated results show that the proposed method performs better than the existing strategies and achieves a Receiver Operating Characteristics (ROC) value of 0.96. The detection accuracy of the proposed method can reach up to 98 %, with precision and recall of about 98 % and 99 %, respectively.
Subjects
DEEP reinforcement learning; REINFORCEMENT learning; WIRELESS communications security; PHYSICAL layer security; DEEP learning; DENIAL of service attacks
Description
Indexed in scopushttps://openurl.ebsco.com/EPDB%3Agcd%3A8%3A28280904/detailv2?sid=ebsco%3Aplink%3Aresult-item&id=ebsco%3Adoi%3A10.14429%2Fdsj.74.19468&bquery=Defence%20Science%20Journal&page=1&link_origin=www.google.com |
Article metrics10.31763/DSJ.v5i1.1674 Abstract views : | PDF views : |
Cite |
Full Text![]() |
Conflict of interest
“Authors state no conflict of interest”
Funding Information
This research received no external funding or grants
Peer review:
Peer review under responsibility of Defence Science Journal
Ethics approval:
Not applicable.
Consent for publication:
Not applicable.
Acknowledgements:
None.