• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Waqas, Muhammad (Waqas, Muhammad.) | Bano, Shehr (Bano, Shehr.) | Hassan, Fatima (Hassan, Fatima.) | Tu, Shanshan (Tu, Shanshan.) | Abbas, Ghulam (Abbas, Ghulam.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.)

Indexed by:

EI Scopus SCIE

Abstract:

Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect cyber-attacks. Still, the cyber-physical systems (CPS) have relatively large computational requirements and require more communication resources, thus making it impossible to achieve a low latency target. These methods perform well but only in stationary scenarios. We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios. The features are fed to ensemble learning algorithms, such as AdaBoost, LogitBoost and Gentle Boost, to classify data. The authentication of the received signal is considered a binary classification problem. The transmitted data is labeled as legitimate information, and spoofing data is illegitimate information. Therefore, this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks. It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile. The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time.

Keyword:

cyber-physical systems Physical layer authentication machine learning security

Author Community:

  • [ 1 ] [Waqas, Muhammad]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 2 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 3 ] [Bano, Shehr]GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 4 ] [Hassan, Fatima]GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 5 ] [Abbas, Ghulam]GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
  • [ 6 ] [Waqas, Muhammad]Edith Cowan Univ, Sch Engn, Joondalup Perth, WA 6027, Australia
  • [ 7 ] [Abbas, Ziaul Haq]GIK Inst Engn Sci & Technol, Fac Elect Engn, Topi 23460, Pakistan

Reprint Author's Address:

Show more details

Related Keywords:

Related Article:

Source :

CMC-COMPUTERS MATERIALS & CONTINUA

ISSN: 1546-2218

Year: 2022

Issue: 3

Volume: 73

Page: 4489-4499

3 . 1

JCR@2022

3 . 1 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:46

JCR Journal Grade:3

CAS Journal Grade:4

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:433/5316116
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.