Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information
Abstract
:1. Introduction
1.1. Related Work
1.2. Contributions of This Paper
- By setting up a real wireless communication environment, we completed the collection of CSI data for Wi-Fi and preliminarily demonstrated the ability of CSI data to support device identity discrimination through data processing and analysis.
- Furthermore, an identity authentication method on the basis of deep Q-network (DQN) has been proposed. By processing CSI and setting parameters including state space as well as action space, the method realizes lightweight mapping of the CSI features and device identity.
- Finally, we verified the performance of the proposed method and the comparative methods based on the collected CSI data. A large number of experiments showed that the proposed method has better authentication accuracy compared with the comparative methods.
2. System Model and CSI Collection
2.1. CSI Model
2.2. CSI Data Collection
3. Preliminaries
3.1. Deep Reinforcement Learning
3.2. CSI Data Feature Analysis
4. Proposed Intelligent Identification Method
4.1. State Space
4.2. Action Space
4.3. Action Reward
4.4. Other Settings
4.5. Summary of the Method
Algorithm 1: The proposed DQN-PIA method |
|
5. Simulation and Performance Analysis
5.1. Simulation Settings
- SVM, the support vector machine method [42], which creates a predictive classification model based on the given features of the dataset elements and uses radial basis function kernels in simulation.
- MLP, the multi-layer perceptron method [24], which is a feedforward supervised neural network trained with a standard backward transmission algorithm. In the simulation, the network structure is set as two hidden layers, and the number of units is 15 and 10, respectively.
- KNN, the K-nearest neighbor method [20], which determines the type of sample by finding the K-closest samples in the feature space and observing the attribute labels of the latter. We set K = 20.
- RF, the random forest method [43], which is a classifier that includes multiple decision trees. The mode of the category output by individual classification trees determines the output category of the method. In this paper, the maximum number of features was set as 15 in the simulation.
- LR, the logistic regression method [44], involves using linear or non-linear models to associate inputs and outputs. The LR model is a classic statistical method that has advantages in practicality. In this paper, a penalty term of two norm was set for the method in simulation.
- LSTM, the long short-term memory method [45], is an improved method of recurrent neural networks that utilizes a three-gate structure for the proper handling of historical information through reasonable planning. In the simulation, three hidden layers were set, including 15, 25, and 20 blocks, respectively.
5.2. Performance and Analysis
5.3. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
DRL | deep reinforcement learning |
DQN | deep Q-Network |
SNR | signal-to-noise ratio |
MDP | signal-to-interference-noise ratio |
ResNet | residual network |
MDP | Markov decision process |
DNN | deep neural network |
QoS | quality of service |
UE | user equipment |
CSI | channel state information |
RSS | receive signal strength |
CIR | channel impulse response |
CFO | carrier frequency offset |
SVM | support vector machine |
NIC | network interface card |
AP | access point |
PCA | principal component analysis |
MLP | multi-layer perceptron |
KNN | K-nearest neighbor |
RF | random forest |
LR | logistic regression |
LSTM | long short-term memory |
CNN | convolutional neural networks |
References
- Tran-Dang, H.; Krommenacker, N.; Charpentier, P.; Kim, D.-S. Toward the Internet of Things for Physical Internet: Perspectives and Challenges. IEEE Internet Things J. 2020, 7, 4711–4736. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Niyato, D.; Dobre, O.; Poor, H.V. 6G Internet of Things: A Comprehensive Survey. IEEE Internet Things J. 2022, 9, 359–383. [Google Scholar] [CrossRef]
- You, X.; Wang, C.X.; Huang, J.; Gao, X.; Zhang, Z.; Wang, M.; Huang, Y.; Zhang, C.; Jiang, Y.; Wang, J.; et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 2021, 64, 1–74. [Google Scholar] [CrossRef]
- Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Karagiannidis, G.K.; Fan, P. 6G Wireless Networks: Vision, Requirements, Architecture, and Key Technologies. IEEE Veh. Technol. Mag. 2019, 14, 28–41. [Google Scholar] [CrossRef]
- Alsharif, M.H.; Jahid, A.; Kelechi, A.H.; Kannadasan, R. Green IoT: A Review and Future Research Directions. Symmetry 2023, 15, 757. [Google Scholar] [CrossRef]
- Cui, T.; Yang, R.; Fang, C.; Yu, S. Deep Reinforcement Learning-Based Resource Allocation for Content Distribution in IoT-Edge-Cloud Computing Environments. Symmetry 2023, 15, 217. [Google Scholar] [CrossRef]
- Kanellopoulos, D.; Sharma, V.K. Dynamic Load Balancing Techniques in the IoT: A Review. Symmetry 2022, 14, 2554. [Google Scholar] [CrossRef]
- Abbas, G.; Mehmood, A.; Carsten, M.; Epiphaniou, G.; Lloret, J. Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Netw. 2022, 11, 38. [Google Scholar] [CrossRef]
- De Santis, A.; Ferrara, A.L.; Flores, M.; Masucci, B. Continuous Entity Authentication in the Internet of Things Scenario. Appl. Sci. 2023, 13, 5945. [Google Scholar] [CrossRef]
- Falayi, A.; Wang, Q.; Liao, W.; Yu, W. Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology. Future Internet 2023, 15, 178. [Google Scholar] [CrossRef]
- Chen, C.; Guo, H.; Wu, Y.; Shen, B.; Ding, M.; Liu, J. A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System. Sensors 2023, 23, 3991. [Google Scholar] [CrossRef] [PubMed]
- Thapa, S.; Bello, A.; Maurushat, A.; Farid, F. Security Risks and User Perception towards Adopting Wearable Internet of Medical Things. Int. J. Environ. Res. Public Health 2023, 20, 5519. [Google Scholar] [CrossRef] [PubMed]
- Bhushan, B.; Kumar, A.; Agarwal, A.K.; Kumar, A.; Bhattacharya, P.; Kumar, A. Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends. Sustainability 2023, 15, 6177. [Google Scholar] [CrossRef]
- Budati, A.K.; Vulapula, S.R.; Shah, S.B.H.; Al-Tirawi, A.; Carie, A. Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks. Electronics 2023, 12, 1638. [Google Scholar] [CrossRef]
- Zhao, J.; Hu, H.; Huang, F.; Guo, Y.; Liao, L. Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics 2023, 12, 1812. [Google Scholar] [CrossRef]
- Chahoushi, M.; Nabati, M.; Asvadi, R.; Ghorashi, S.A. CSI-Based Human Activity Recognition Using Multi-Input Multi-Output Autoencoder and Fine-Tuning. Sensors 2023, 23, 3591. [Google Scholar] [CrossRef]
- Mesa-Cantillo, C.M.; Sánchez-Rodríguez, D.; Alonso-González, I.; Quintana-Suárez, M.A.; Ley-Bosch, C.; Alonso-Hernández, J.B. A Non Intrusive Human Presence Detection Methodology Based on Channel State Information of Wi-Fi Networks. Sensors 2023, 23, 500. [Google Scholar] [CrossRef]
- Chen, B.; Song, Y.; Zhu, Z.; Gao, S.; Wang, J.; Hu, A. Authenticating Mobile Wireless Device through Per-packet Channel State Information. In Proceedings of the 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Taipei, Taiwan, 21–24 June 2021; pp. 78–84. [Google Scholar] [CrossRef]
- Wang, S.; Huang, K.; Xu, X.; Zhong, Z.; Zhou, Y. CSI-Based Physical Layer Authentication via Deep Learning. IEEE Wirel. Commun. Lett. 2022, 11, 1748–1752. [Google Scholar] [CrossRef]
- Yang, S.; Wang, Y.; Yu, X.; Gu, Y.; Ren, F. User Authentication leveraging behavioral information using Commodity WiFi devices. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020; pp. 530–535. [Google Scholar] [CrossRef]
- Yu, B.; Yang, C.; Ma, J. Continuous Authentication for the Internet of Things Using Channel State Information. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Kong, H.; Lu, L.; Yu, J.; Chen, Y.; Tang, F. Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi. IEEE Trans. Mob. Comput. 2021, 20, 3148–3162. [Google Scholar] [CrossRef]
- Liu, H.; Wang, Y.; Liu, J.; Yang, J.; Chen, Y.; Poor, H.V. Authenticating Users Through Fine-Grained Channel Information. IEEE Trans. Mob. Comput. 2018, 17, 251–264. [Google Scholar] [CrossRef]
- Li, X.; Huang, K.; Wang, S.; Xu, X. A physical layer authentication mechanism for IoT devices. China Commun. 2022, 19, 129–140. [Google Scholar] [CrossRef]
- Furrer, S.; Dahlhaus, D. Multiple-Antenna Signaling Over Fading Channels with Estimated Channel State Information: Capacity Analysis. IEEE Trans. Inf. Theory 2007, 53, 2028–2043. [Google Scholar] [CrossRef]
- Sutivong, A.; Chiang, M.; Cover, T.M.; Kim, Y.-H. Channel capacity and state estimation for state-dependent Gaussian channels. IEEE Trans. Inf. Theory 2005, 51, 1486–1495. [Google Scholar] [CrossRef]
- Liu, J.; Elia, N.; Tatikonda, S. Capacity-Achieving Feedback Schemes for Gaussian Finite-State Markov Channels with Channel State Information. IEEE Trans. Inf. Theory 2015, 61, 3632–3650. [Google Scholar] [CrossRef] [Green Version]
- Aubry, A.; Tulino, A.M.; Venkatesan, S. Multiple-access channel capacity region with incomplete channel state information. In Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 2313–2317. [Google Scholar] [CrossRef]
- Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. Tool release: Gathering 802.11n traces with channel state information. ACM Sigcomm Comput. Commun. Rev. 2011, 41, 53. [Google Scholar] [CrossRef]
- Zuo, P.; Sun, G.; Li, Z.; Guo, C.; Li, S.; Wei, Z. Towards Secure Transmission in Fog Internet of Things Using Intelligent Resource Allocation. IEEE Sens. J. 2023, 23, 12263–12273. [Google Scholar] [CrossRef]
- Sutton, R.S.; Barto, A.G. Reinforcement Learning: An Introduction; MIT Press: Cambridge, MA, USA, 2018. [Google Scholar]
- Zhao, X.; Yang, R.; Zhang, Y.; Yan, M.; Yue, L. Deep Reinforcement Learning for Intelligent Dual-UAV Reconnaissance Mission Planning. Electronics 2022, 11, 2031. [Google Scholar] [CrossRef]
- Ud Din, A.F.; Mir, I.; Gul, F.; Mir, S.; Saeed, N.; Althobaiti, T.; Abbas, S.M.; Abualigah, L. Deep Reinforcement Learning for Integrated Non-Linear Control of Autonomous UAVs. Processes 2022, 10, 1307. [Google Scholar] [CrossRef]
- Zuo, P.; Wang, C.; Wei, Z.; Li, Z.; Zhao, H.; Jiang, H. Deep Reinforcement Learning Based Load Balancing Routing for LEO Satellite Network. In Proceedings of the 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 19–22 June 2022; pp. 1–6. [Google Scholar]
- Yu, Y.; Wang, T.; Liew, S.C. Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks. IEEE J. Sel. Areas Commun. 2019, 37, 1277–1290. [Google Scholar] [CrossRef] [Green Version]
- Lange, S.; Riedmiller, M. Deep auto-encoder neural networks in reinforcement learning. In Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN), Barcelona, Spain, 18–23 July 2010; pp. 1–8. [Google Scholar]
- Yang, J.; Zhang, D.; Frangi, A.F.; Yang, J.Y. Two-dimensional PCA: A new approach to appearance-based face representation and recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 131–137. [Google Scholar] [CrossRef] [Green Version]
- Dahl, G.E.; Sainath, T.N.; Hinton, G.E. Improving deep neural networks for LVCSR using rectified linear units and dropout. In Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada, 26–31 May 2013; pp. 8609–8613. [Google Scholar] [CrossRef] [Green Version]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar] [CrossRef] [Green Version]
- Keras: Deep Learning for Humans. Available online: https://keras.io/ (accessed on 21 April 2023).
- Ziegler, J.L.; Arn, R.T.; Chambers, W. Modulation recognition with GNU radio, keras, and HackRF. In Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD, USA, 6–9 March 2017; pp. 1–3. [Google Scholar] [CrossRef]
- Huang, G.-B.; Zhou, H.; Ding, X.; Zhang, R. Extreme Learning Machine for Regression and Multiclass Classification. IEEE Trans. Syst. Man Cybern. Part (Cybern.) 2012, 42, 513–529. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ham, J.; Chen, Y.; Crawford, M.M.; Ghosh, J. Investigation of the random forest framework for classification of hyperspectral data. IEEE Trans. Geosci. Remote Sens. 2005, 43, 492–501. [Google Scholar] [CrossRef] [Green Version]
- Krishnapuram, B.; Carin, L.; Figueiredo, M.A.T.; Hartemink, A.J. Sparse multinomial logistic regression: Fast algorithms and generalization bounds. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 957–968. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
Hyper-Parameter | Value |
---|---|
Total number of CSI data entries | 10,000 |
Number of training set entries | 8000 |
Number of test set entries | 2000 |
Number of sampling points per entry | 500 |
Decay rate of , | 0.995 |
The minimal value of , | 0.005 |
Experience–Replay memory capacity | 500 |
Number of Wi-Fi terminals | 6 |
Update threshold of the target network F | 500 |
Experience–Replay minibatch size | 32 |
Discount factor | 0.9 |
Learning rate | 0.01 |
Number of principal components M | 6 |
Deep reinforcement learning platform | Keras |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, Y.; Wang, Y.; Liu, X.; Zuo, P.; Li, H.; Jiang, H. Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information. Symmetry 2023, 15, 1404. https://doi.org/10.3390/sym15071404
Li Y, Wang Y, Liu X, Zuo P, Li H, Jiang H. Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information. Symmetry. 2023; 15(7):1404. https://doi.org/10.3390/sym15071404
Chicago/Turabian StyleLi, Yuanlong, Yiyang Wang, Xuewen Liu, Peiliang Zuo, Haoliang Li, and Hua Jiang. 2023. "Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information" Symmetry 15, no. 7: 1404. https://doi.org/10.3390/sym15071404
APA StyleLi, Y., Wang, Y., Liu, X., Zuo, P., Li, H., & Jiang, H. (2023). Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information. Symmetry, 15(7), 1404. https://doi.org/10.3390/sym15071404