Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

03/27/2023
by   He Fang, et al.
0

The conventional device authentication of wireless networks usually relies on a security server and centralized process, leading to long latency and risk of single-point of failure. While these challenges might be mitigated by collaborative authentication schemes, their performance remains limited by the rigidity of data collection and aggregated result. They also tend to ignore attacker localization in the collaborative authentication process. To overcome these challenges, a novel collaborative authentication scheme is proposed, where multiple edge devices act as cooperative peers to assist the service provider in distributively authenticating its users by estimating their received signal strength indicator (RSSI) and mobility trajectory (TRA). More explicitly, a distributed learning-based collaborative authentication algorithm is conceived, where the cooperative peers update their authentication models locally, thus the network congestion and response time remain low. Moreover, a situation-aware secure group update algorithm is proposed for autonomously refreshing the set of cooperative peers in the dynamic environment. We also develop an algorithm for localizing a malicious user by the cooperative peers once it is identified. The simulation results demonstrate that the proposed scheme is eminently suitable for both indoor and outdoor communication scenarios, and outperforms some existing benchmark schemes.

READ FULL TEXT

page 1

page 2

page 13

research
08/27/2019

Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication...
research
08/27/2019

Authentication and Hand-Over Algorithms for IoT Group

Current advancements in mobility of devices and also Internet of Things ...
research
04/26/2022

PP-MARL: Efficient Privacy-Preserving MARL for Cooperative Intelligence in Communication

Artificial intelligence (AI) has been introduced in communication networ...
research
06/30/2019

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

The fifth generation (5G) and beyond wireless networks are critical to s...
research
09/30/2021

A Group Key Establishment Scheme

Group authentication is a method of confirmation that a set of users bel...
research
06/14/2022

An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems

In most PUF-based authentication schemes, a central server is usually en...

Please sign up or login with your details

Forgot password? Click here to reset