Next Article in Journal
SVD-SLAM: Stereo Visual SLAM Algorithm Based on Dynamic Feature Filtering for Autonomous Driving
Previous Article in Journal
Image Style Transfer Based on Dynamic Convolutional Manifold Alignment of Halo Attention
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System

1
State Grid Economic and Technological Research Institute Co., Ltd., Beijing 102200, China
2
School of Cyberspace Security, University of Chinese Academy of Sciences, Beijing 100049, China
3
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(8), 1882; https://doi.org/10.3390/electronics12081882
Submission received: 29 January 2023 / Revised: 16 February 2023 / Accepted: 19 February 2023 / Published: 17 April 2023

Abstract

:
A vehicle charging network system has to access large-scale heterogeneous terminals to collect charging pile status information, which may also give malicious terminals an opportunity to access. Though some general access authentication solutions aimed at only allowing trusted terminals have been proposed, they are difficult to work with in a vehicle charging network system. First, among various heterogeneous terminals with significant differences in computing capabilities, there are inevitably terminals that cannot support computations required for cryptography-based access authentication schemes. Second, though access authentication schemes based on device fingerprints are independent of terminal computing capabilities, their authentication performance is weak in robustness and high in overhead. Third, the access authentication delay is huge since the system cannot withstand heavy concurrent access requests from large-scale terminals. To address the above problems, we propose a reliable and lightweight trusted access authentication solution for terminals in the vehicle charging network system. By cloud, edge, and local servers cooperating to execute authentication tasks, our Cloud-Edge-End Collaborative architecture effectively alleviates the authentication delay caused by high concurrent requests. Each server in the architecture deploys our well-designed unified trusted access authentication (UATT) model based on device fingerprints. With ingenious data construction and the powerful swin-transformer network, the UATT model can provide robust and low-overhead authentication services for heterogeneous terminals. To minimize authentication latency, we further design an A2C-based authentication task scheduling scheme to decide which server executes the current task. Comprehensive experiments demonstrate our solution can authenticate terminals with an accuracy higher than 98% while reducing the required data packets by two orders of magnitude, and it can effectively reduce authentication latency.

1. Introduction

As vehicle technology merges with energy, the Internet of Things (IoT), and communication fields, vehicles are developing towards electrification and intelligence. Considering the limited battery power of electric vehicles during long-distance travel, a vehicle charging network system that can provide a real-time travel charging solution will surely appear. Predictably, in order to collect nearby charging piles status information, the system has to allow access to large-scale heterogeneous terminal devices. For example, there are numerous video sensors and smoke sensors to monitor whether the charging environment is safe, voltage and current sensors to detect the power condition of all charging piles, and mobile terminals to activate charging piles for massive users, etc. Since a large number of terminal devices are difficult to monitor, malicious terminals will have the opportunity to access. Once malicious illegal terminals access the system, they can easily crash the charging facility, steal charging vehicles’ information, and even further implant viruses to make vehicles uncontrollable. Though the 5G protocol optimizes identity security by introducing temporary identification [1], malicious illegal devices can still access the system by forging legal identification. Therefore, it is necessary to design a more reliable access authentication scheme for a vehicle charging network system to ensure system security and full function.
Some trusted access authentication schemes have been proposed [2,3,4,5]. However, they are difficult to work in the vehicle charging network system with large-scale heterogeneous terminal access. First, since the vehicle charging network system accesses various heterogeneous terminals, there are inevitably terminals whose computing capabilities are insufficient to support the general access authentication solution based on cryptography (i.e., PKI [6,7]). To provide verification information, terminals need to have the computing capability of encryption and decryption. Unfortunately, some terminals with poor or even no computing capabilities (such as smoke sensors) cannot complete the encryption and decryption. Thus, they may be denied access to sensitive information, which will prevent the system from functioning well. Therefore, it is necessary to design a unified authentication solution for heterogeneous terminals in the vehicle charging network system.
Second, access authentication based on device fingerprint [8] is an available unified solution, but its authentication robustness is relativity poor and the processing overhead is relativity high. Specifically, the device fingerprint can be extracted according to the radio frequency (RF) wireless signal difference caused by the hardware defects inherent in terminal manufacturing. Through identifying the legitimacy of the device fingerprint, the system can decide whether to allow terminal access. Nonetheless, due to the RF wireless signal difference caused by hardware defects is subtle, the fingerprint features extracted under different environments (such as occluded materials and weather conditions) vary greatly. This will inevitably result in poor authentication robustness. Additionally, though the authentication scheme based on device fingerprint eliminates encryption and decryption, the overhead brought by fingerprint identification is still not negligible. This will lead to a high authentication delay required for trusted access.
Third, since there are massive terminals in a vehicle charging network system, all access authentication requests processed by the cloud server will bring huge delay overhead. Specifically, in order to meet the charging needs of all electric vehicle users, the number of charging piles provided in the vehicle charging network system is huge. Correspondingly, the amount of terminals that need to access the system is even greater. This means that highly concurrent access authentication requests will widely exist in the system. In this case, the centralized authentication request processing architecture that is authenticated locally by the system or delivers all the device fingerprints to the cloud server for identification will bring a huge authentication waiting overhead.
To address the above challenges, we propose a trusted access authentication solution based on end-edge-cloud collaboration for the terminals in a vehicle charging network system. Our solution provides an efficient and reliable device identification method for large-scale heterogeneous terminals in the system, and only allows the identified legal terminals access to ensure the vehicle charging network system’s security. Specifically, our contributions are listed as follows:
(1) End-Edge-Cloud Collaborative Authentication Framework. To alleviate the non-negligible authentication waiting latency when large-scale heterogeneous terminals concurrently access requests in a vehicle charging network system, we propose an End-Edge-Cloud Collaboration framework. Through the cooperation of local servers, edge servers, and one center cloud server jointly executing access requests from massive terminals, the framework can provide efficient and reliable access authentication services for large-scale terminals. This effectively improves the quality of service (QoS) of delay-sensitive and computation-intensive access authentication tasks in a vehicle charging network system.
(2) Unified Trusted Access Authentication Model. To address the problem of heterogeneous terminal access in a vehicle charging network system, we designed a novel unified trusted access authentication (UTAA) model based on device fingerprints. Taking the feature of RF signal transmitted by terminals as the device fingerprint, the UTAA model provides a bypass authentication solution which is independent of the computing and storage capabilities of terminals. Via well-designed data construction and the powerful feature extraction capabilities of Swin-Transformer [9], the UTAA model effectively mitigates environmental interference and improves the robustness of fingerprint recognition. This ensures the reliability of access authentication. Moreover, benefiting from the feature extraction capabilities of Swin-Transformer, only a small amount of fingerprint data can accurately identify the legitimacy of terminals, which actually reduces the authentication overhead.
(3) Access Authentication Overhead Minimization. Although our UTAA model optimizes the authentication overhead for a single terminal, there still exists a heavy access authentication response latency for vehicle charging network systems with numerous and dynamic authentication requests. To further optimize authentication latency, authentication tasks that cannot be executed locally are transmitted to appropriate edge or cloud servers for cooperative execution. Then, the global access authentication response time can be expressed as the sum of transmission delay and authentication delay. With the goal of minimizing global access authentication response time, we design an authentication task scheduling scheme based on Advantage Actor Critic (A2C) [10] to decide which server the current authentication tasks are offloaded to for executing.
(4) Experimental Evaluation in Real Environment. We conduct comprehensive experiments to evaluate the proposed scheme in this paper. Experimental results demonstrate that the device fingerprints extracted by our UTAA model have environment stability, time stability, and location stability. Compared with traditional manual feature extraction schemes, the UTAA model reduces the number of packets required for authentication by two orders of magnitude, while ensuring superior authentication performance. Moreover, our end-edge-cloud collaborative authentication framework reduces the global authentication latency by about two times compared to the centralized processing schemes. Such results indicate that our solution can ensure trusted and reliable access authentication for a vehicle charging network system with large-scale heterogeneous terminals.

2. Related Work

The vehicle network system has to connect complex and massive terminals, which will give malicious terminals the opportunity to access. To ensure system security, trusted access schemes that allow legitimate terminals and deny illegal terminals are necessary. The common trusted access technologies are usually implemented based on cryptography [6,7,11,12]. Taking the PKI-based authentication scheme as an example, through the certification authority which verifies whether the current terminal is legal, the scheme can ensure that only trusted terminals have access [6,7]. This scheme has been widely adopted for quite some time, but there is a risk of key disclosure [13]. To overcome the shortcoming, some trusted authentication schemes combined with emerging potential technologies were proposed. For example, Lai et al. [14] proposed an authentication scheme based on 5G infrastructure, but the security of the 5G network architecture is still insufficient. Thanks to the distributed nature of blockchain, Guo et al. [15] proposed a PKI security enhancement scheme based on the blockchain, but there is a non-negligible energy overhead. Aiming to provide weightless and secure identity authentication, trusted authentication methods through fingerprint (i.e., biometric fingerprint [16], device fingerprint [17,18,19,20,21]) are expected to show their strengths.
Identifying the terminals legitimacy based on device fingerprints [17,18,19,20,21] is considered an innovative access authentication scheme. Due to the unique benign hardware defects that inevitably exist in the manufacturing process of terminal devices, there will be subtle differences in the RF signals emitted by different terminals. The subtle signal differences are impossible to forge, as existing strategies cannot calibrate this unique slight difference [22]. Thus, extracting device fingerprints from the channel state information (CSI) of RF signals is widely appreciated. Nevertheless, there are difficulties in extracting accurate device fingerprints based on CSI since the channel characteristics are easily affected by environmental interference. Firstly, buildings in the propagation path of individual subcarriers in the signal can cause varying degrees of transmission loss to the subcarriers, resulting in changes in the recovered CSI [23,24]. Secondly, in the case of such vehicle charging network systems with high terminal mobility and intensive human activities, the change of channel characteristics is more complicated [25]. These device fingerprints extracted from CSI, which change with the environment and location, will drastically reduce the accuracy of terminal legitimacy identification.
There have been several works dedicated to extracting fingerprints with environmental stability and location stability from CSI. For example, Hua et al. [26] pointed out that using the carrier frequency offset (CFO, which can be inferred from CSI) of the wireless RF signal as a device fingerprint can effectively improve the stability of fingerprint features. Liu et al. [27] proposed a solution that extracts the nonlinear phase error (which can be inferred from CSI) between different subcarriers of the RF signal as a device fingerprint. Specifically, nonlinear phase errors are due to in-phase/quadrature (I/Q) component imbalances or oscillator imperfections. This phase characteristic remains consistent among subcarriers and does not vary with location and external environment, which ensures the stability of device fingerprints. Similarly, Lin et al. [28] proposed a fingerprint extraction mechanism based on signal amplitude vibrations, and they further devised a method to remove amplitude disturbances such as those caused by resolution errors of variable gain amplifiers. Though the above works resist certain environmental and location interference, the authentication accuracy based on the device fingerprint under complex environments is still poor. This is because the current extraction of fingerprint features usually relies on the experience of experts to extract them manually. Manually extracted fingerprints may ignore some invisible features, causing invalid fingerprints in complex environments. Moreover, the above methods require more fingerprint data to ensure the accuracy of access authentication, which will lead to greater authentication overhead.
Since the authentication overhead of only a single terminal is already high, the authentication overhead in the vehicle charging network system connected by large-scale terminals with high concurrent access requests is even more immeasurable. Massive authentication tasks will cause heavy pressure on the system. To alleviate the pressure on the system, the cloud computing solution that uploads the authentication task to the central cloud server for processing is greatly appreciated [29,30,31]. However, there will be a certain queuing delay on account of the relatively long distance and less central cloud. Accordingly, distributed computing architecture solutions such as edge computing came into existence [32,33,34]. By distributing computing resources close to users, edge computing architecture can effectively overcome the shortcomings of centralized cloud architecture. Nevertheless, it is difficult to bear excessive computing requests because edge nodes usually have poor computing power. Once there are too many authentication requests within the scope of the edge server, queuing delays will inevitably occur. This therefore will introduce a problem of computational task offloading. To fully utilize the resources of edge computing and cloud computing, we consider an end-edge-cloud collaborative solution to process the massive authentication requests, which can provide a trusted access authentication service for vehicle charging network systems with large-scale terminals.

3. System Design

In this section, we introduce the detailed design of trusted access authentication scheme that can address the large-scale heterogeneous terminal access challenge faced by a vehicle charging network system.

3.1. Overview of the Framework

To address the challenges of large-scale heterogeneous terminals access authentication in vehicle charging network systems, we propose an End-Edge-Cloud Cooperation framework. The framework takes the advantage of edge computing and cloud computing to provide efficient and reliable authentication service for large-scale terminals. Moreover, our novel unified trusted access authentication (UTAA) model based on the robust and unforgeable terminal fingerprint characteristics offers a lightweight and fast authentication for the heterogeneous terminals in the framework.
As shown in Figure 1, the framework contains three layers. The first one is the center cloud layer equipped with a center cloud node. The center cloud node has sufficient computing and storage resources but may be far from the terminals. The second one is the edge cloud layer equipped with many edge cloud nodes. Each edge cloud node has many mobile edge computing (MEC) servers located between the center cloud and the terminals. Therefore, it has much more computing and storage resources than the terminals, but maybe less than the center cloud. Particularly, all the MEC servers at different edge cloud nodes can process the access authentication tasks cooperatively to provide feasible, secure, and scalable authentication services. In this way, it can improve the quality of service (QoS) for the access authentication tasks which are time-delay sensitive and computing-intensive. The third layer is the access request layer. At this layer, a tremendous amount of access requests is generated from different types of terminals. Many of them are limited in terms of computer and storage resources. This may prevent them from performing common authentication algorithms [6,7,11,12] that require encryption and decryption calculations.
To address the problem of heterogeneous terminals access authentication, in the proposed end-edge-cloud cooperative authentication framework, the center cloud node and all the edge cloud nodes are configured with our novel unified trusted access authentication (UTAA) model. The UTAA model provides a bypass authentication method based on the fingerprint characteristics extracted from the wireless signal between the terminal and the authentication nodes. Therefore, it is independent of the computing and storage ability of terminals. The access authentication response time contains transmission delay the UTAA model is two orders less than that of the previous studies [26,27,28]. This enables the UTAA model to largely reduce the authentication delay for a single terminal. Furthermore, combined with the elaborate design of data preprocessing, data expansion, data augmentation in constructing a model training dataset, the UTAA model can achieve accurate, robust, and fast authentication for heterogeneous terminals.
Although our UTAA model optimizes the authentication delay for a single terminal, there still exists a heavy access authentication response time overhead for large-scale vehicle charging network systems with numerous and dynamic authentication requests. If all the authentication tasks are offloaded to the center node, it must lead to a certain transmission delay caused by the heavy request traffic and the long transmission distance. Actually, it is inappropriate for heavy authentication requests to occupy too many core network processing resources. This is because it will hinder the processing of core services. However, if all the authentication tasks are offloaded to the edge cloud node nearest from the terminals locally, it may cause the inability of some nodes to process the task timely due to the imbalance authentication request distribution in space. As a result, our goal is to optimize the global access authentication response time by offloading the authentication task to the appropriate UTAA model collaboratively.

3.2. Unified Trusted Access Authentication (UTAA) Model

To address the limitations of the current device fingerprint-based authentication, we propose a unified trusted access authentication (UTAA) model. As shown in Figure 2, the UTAA model contains two key stages, i.e., model offline training and online access authentication. Before being deployed in a practical vehicle charging network system to process online access authentication tasks, we need to train a robust Swin-Transformer-based authentication module at the model offline training stage. As shown in Figure 2, the different steps of the model offline training stage are connected by the dotted arrows. We first collect the channel state information (CSI) from different terminals. Then, after the processes of data preprocessing, data expansion, and data augmentation in the step of constructing a model training dataset, we obtain diverse and sufficient input samples to train a robust and lightweight Swin-Transformer-based authentication module.
The arrows with solid line represent the steps of the online access authentication stage in Figure 2. The well-trained Swin-Transformer-based authentication module will be deployed in all the edge cloud nodes and the center cloud layer of the practical vehicle charging network system. Once an access authentication request is generated from a terminal, the UTAA model collects its channel state information (CSI) from the wireless signal between the terminal and the authentication nodes. After the step of data preprocessing, the valid phase and amplitude information are extracted from CSI and will be input to the Swin-Transformer-based authentication module for correct access authentication.
Unlike previous studies [26,27,28] that only manually extracted a single feature from the amplitude or phase information of CSI, we aim to extract unforgeable and robust hardware features from the amplitude and phase of the CSI as device fingerprints. By integrating with the vehicle charging network system, the Swin-Transformer-based terminal authentication scheme can provide bi-directional authentication between the charging system heterogeneous sensor terminals and edge nodes. It effectively reduces the security risks of existing authentication mechanisms. Moreover, our solution requires only a small number of packets to authenticate the access of a single terminal. This greatly eases the computational overhead of access authentication and reduces the network burden.

3.2.1. Constructing Model a Training Dataset

In order to obtain a robust and lightweight authentication model, we first need to construct a model training dataset with diverse and sufficient samples to address the problems of overfitting and instability caused by different environment interference. The training dataset construction is divided into three steps: (1) data preprocessing; (2) data expansion; (3) data augmentation. The purpose of data preprocessing is to extract valid phase and amplitude information from CSI. Then, the data expansion is responsible to expand the number of samples by using a sliding window to extract more samples from time-series CSI datasets. At last, data augmentation will largely enhance the sample diversity and further increase the number of samples to achieve a robust and correct access authentication model.
(1) Data Preprocessing. Orthogonal Frequency Division Multiplexing (OFDM) technology is widely used in 5G terminal equipment communication. Each OFDM signal consists of 64 subcarriers, including 52 orthogonal subcarriers and 12 additional null-subcarriers for calculating Inverse Fast Fourier Transform (IFFT). Channel State Information (CSI) is a sampled version of the Channel Frequency Response (CFR) and it directly reveals the phase, frequency, and amplitude information of the OFDM communication system channel. In addition, CSI is not only affected by propagation obstacles, signal reflections, and baseband data patterns, but also affected by the design of the signal processing circuit of the transmitter. Every signal processing circuit of different transmitters unavoidably has its unique and unforgeable hardware defect caused by the random errors in the production process [22]. Therefore, CSI can be used as the basis of trusted device identification.
  • Remove invalid values. The extra 12 null-subcarriers are added for calculating the IFFT instead of transmitting the real communication data. The collected CSI from the 12 subcarriers is considered as invalid values. Since there is no channel state and hardware defect information in them, the invalid values should be removed. Then, 52 valid subcarriers are finally selected as model inputs.
  • Extract amplitude and phase. A set of CSI { H k } k = 1 K is a set of K discrete samples of the CFR within the bandwidth, using the subcarrier frequency difference as the frequency sampling interval. K is 64 in the OFDM signal. The CSI value of the k t h subcarrier is represented by a complex number H k :
    H k = I k + j Q k
    where I is the real part and Q is the imaginary part. Based on Equation (1), the phase and amplitude of the k t h subcarrier can be extracted according to the following two equations:
    Φ k = tan 1 ( Q k I k )
    Ψ k = ( Q k ) 2 + ( I k ) 2
    where Φ k and Ψ k represent phase and amplitude of the k t h subcarrier, respectively [27].
  • Unwrap Phase. As shown in Equation (2), the arctangent function is required to calculate the system phase. Due to the limitation of the arctangent function, the calculated subcarrier phase will be phase-wrapped, i.e., there will be some jumps in the phase. While the true subcarrier phase is smooth, it is impossible that any jumps can occur. Therefore, in order to obtain the true subcarrier phase, an unwrapping operation is required. We randomly selected one data packet and calculated the raw phase of its 52 valid CSI subcarriers of a camera in our testbed. As shown in Figure 3a, there are some jumps in the raw phase. After the phase unwrapping is performed on the raw phase, the subcarrier phase tends to smooth out in Figure 3b.
Figure 3. Phase unwrapping.
Figure 3. Phase unwrapping.
Electronics 12 01882 g003
(2) Data Expansion. Collecting CSI datasets is time-consuming and labor-intensive [35]. It is difficult even impossible to build a complete CSI dataset with enough number of samples in all possible authentication environments with different objects movements or weather conditions. Due to the above limitations, it may lead to over-fitting problems in the trained model, i.e., poor generalization of the models to fit the unknown data distribution. Furthermore, it is difficult for traditional machine learning and deep learning techniques to effectively extract device fingerprint features from a small number of CSI samples.
In order to obtain as many data samples as possible, we perform data expansion on CSI data at this step. The sliding window is a direct but effective data expansion method for time-series datasets. We can collect one CSI sample from the corresponding packet. Accordingly, the CSI data can be considered as time-series data. Naturally, the sliding window data expansion method can be applied to it. An example of data expansion using a sliding window is shown in Figure 4. By pre-setting the window size L as well as sliding stride S, the sliding window will slide forward the time-series CSI data over S CSI samples every time. In this way, the size of the datasets can easily be enlarged by L / S times finally.
(3) Data Augmentation. To further increase the number and diversity of training datasets, we introduce five data augmentation methods in this step. In reality, there may be unpredictable signal hiding, jitter, drift or interference caused by the changes of authentication environment, e.g., the movement of people, cars or weather variations. In order to enhance the robustness of terminal authentication for the device fingerprint extraction task, we use five specific data augmentation methods including adding Gaussian noise and the changes of dropout, crop, drift, and timewarp on the raw data to imitate the possible effect in different environments. In this way, the UTAA model can increase the diversity of training data and thus improve the augmentation stability against changeable environment interference. In particular, all the methods are applicable to both amplitude and phase data. What is more, they all can be easily applied to the model offline training stage. The detailed design of the five data augmentation methods is introduced as follows.
  • Gaussian noise adding: Add an independent and identically distributed additive Gaussian noise with expectation μ = 0 and standard deviation σ to the data according to the probability P g . This method is a straightforward and basic way to improve the robustness of the model, which is to add random noise to the training data.
  • Dropout change: Discard values of some random points in a series of data according to the probability P d and set the corresponding point value to the value of the previous point of the dropout point, which can imitate the loss of random points in practice.
  • Crop change: Crop the subsequence with a randomly specified number of subcarriers according to probability P c . To ensure consistent model input data format, the data are adjusted to a fixed length by linear interpolation. This method can imitate the loss of successive points in practice.
  • Drift change: Make data values randomly and smoothly drift away from their original values according to probability P d r . The degree of offset is controlled by the maximum offset u and the number of offset points v.
  • TimeWarp change: Smoothly distort the time interval between samples according to probability P t . The TimeWarp change can be used to change the temporal position of the samples.
    Based on our real training data collected from a camera, Figure 5 shows the effects of the five data augmentation methods used in our work. Figure 5a shows the raw phase data of 36 consecutive packets for the subcarrier with index k = 25 . Figure 5b shows the effect after applying an additive Gaussian noise with μ = 0 and σ = 0.1 to the raw phase. Figure 5c shows the effect after randomly dropping out the points in the raw phase and setting the corresponding point value to the value of the previous point of the discarded point. Figure 5d demonstrates the effect of expanding the subsequence to the raw sequence length using linear interpolation after randomly cropping a subsequence from packet 30 to packet 35 for the raw phase. Figure 5e shows the effect after random drifts of the raw phase. Figure 5f shows the effect of smoothing the raw phase with time warping. From Figure 5, we can see that the sample diversity can be largely increased by the five data augmentation methods, and the number of samples is also increased.

3.2.2. Swin-Transformer-Based Authentication Module

Although we have constructed a robust training dataset after the operations of data preprocessing, data expansion, and data augmentation, a lightweight and effective authentication method is needed. It should extract effective characteristics from the dataset automatically to perform fast and robust access authentication. In 2021, researchers proposed Swin-Transformer [9]. Swin-Transformer uses a hierarchical Transformer structure with a shift-based self-attentive mechanism of non-overlapping windows, which gives Swin-Tansformer a faster computational speed and more flexible modeling capabilities. In this paper, we use Swin-Transformer as the backbone network to train the terminal class classifier. With the powerful feature extraction capability of our Swin-Transformer-based authentication module (STAM), we are able to extract multiple hardware features from the CSI as device fingerprints. The overall architecture of STAM is shown in Figure 6. We introduce the details of our careful design of input, multi-characteristics extraction, and output classification in STAM.
Input of STAM. The input of STAM can be considered as two “pictures” of length H, width W, where W denotes the number of valid subcarriers and H denotes the number of packets. Based on Section 3.2.1, we can see that W is 52. H can directly affect the speed and accuracy of access authentication. Intuitively, a larger H can provide more information to gain a more accurate classification and authentication but more collecting time and data processing time for a specific classification scheme are required. A w , h denotes the amplitude collected from the w t h CSI subcarrier extracted from the h t h packet, where w { 0 , W 1 } and h { 0 , H 1 } . P w , h denotes the phase collected from the w t h CSI subcarrier extracted from the h t h packet. Therefore, the size of input is W × H × 2.
Multi-characteristics extraction of STAM. As shown in Figure 6, the input first passes through the block partitioning layer, which splits every “picture” into “sub-pictures” of size 2 × 2 . Every sub-block contains one “sub-picture” of amplitude and one “sub-picture” of phase. Consequently, each sub-block has a dimension of 2 × 2 × 2 = 8 . Each sub-block is then projected to dimension C through a linear embedding layer, thus the output size of this layer becomes H 2 × W 2 × C . The STAM backbone consists of four stages, with stages 1, 2 and 4 containing two blocks and stage 3 containing six blocks. After the Swin-Transformer layer and the block merge layer in stage 1, the sub-block size increases by 2 × 2 = 4 times, and the sub-block dimension is converted to 2 C . Both stage 2 and stage 3 contain a Swin-Transformer layer and a block merge layer as stage 1, both of which increase the sub-block size of the previous stage by a factor of 4 and expand the sub-block dimension by a factor of 2. The output dimension of stage 3 is H 16 × W 16 × C and stage 4 contains only the Swin-Transformer layer without changing the dimension. We collect the CSI samples and classification of every legal terminal in our training data. Their effective multi-characteristics with unique and unforgeable hardware defect information can be captured and recorded in the Swin-Transformer layers after offline training using supervised learning.
Output classification of STAM. The final output is classified after averaging the pooling layer with a multilayer perceptron. Because our training dataset has samples of all legal terminals, if a terminal is not in our training data, the output will label it as illegal. In this case, it will be denied to the network. Otherwise, it is labeled as legal and allowed to access the network. What is more, if it is labeled as legal, STAM also output its specific classification. An example of output is illustrated in Table 1.
The number of packets H is the key to affect the speed of access authentication [27]. If a classification scheme has the ability to extract more effective information from less packets, it will achieve faster classification while maintaining high accuracy. Benefits from the robust multi-characteristics extraction capability, the number of packets of STAM to obtain equal or more accurate authentication is two orders less than that of the previous studies [26,27,28] based on the extensive evaluations in Section 4. This enables our UTAA model to largely reduce the authentication delay for a single terminal.

3.3. End-Edge-Cloud Cooperative Authentication Task Scheduling

Though the UTAA model optimizes the authentication delay of a single terminal, the authentication response time overhead for a vehicle charging network system with massive terminal access is still extremely heavy. In order to alleviate the authentication pressure, the authentication task can be delivered to the center cloud nodes with sufficient computing and storage resources for processing. However, it is difficult for the center cloud node, which is small in number and far away from the terminal, to process dynamic numerous authentication requests in real time. Moreover, the number of edge nodes is large and close to the terminal, but it is difficult to handle high concurrent authentication tasks due to their less computing and storage resources. To provide efficient authentication services for vehicle charging network system, we therefore consider a distributed end-edge-cloud collaborative solution that combines the advantages of cloud nodes and edge nodes. By dynamically offloading the authentication task to appropriate nodes, our solution is able to minimize the global authentication response time overhead.
To dynamically solve the optimal authentication task scheduling scheme, we model the end-edge-cloud collaborative solution in advance. As illustrated in Figure 1, we consider a trusted access authentication architecture consisting of a set of terminals N = 1 , 2 , , N that initiate authentication requests, a series of edge nodes E = 1 , 2 , E with certain computing resources, one remote cloud node c with sufficient computing resources, and local computing node l in a vehicle charging network system.
Each edge node e E , cloud node c, and local node l are deployed with the UTTA model for authenticating whether the terminal is trusted. Only trusted terminals are allowed to access. Accordingly, we mathematically formulate the problem of minimizing the authentication response latency and solve it based on the A2C algorithm. Details are as follows.

3.3.1. Task Scheduling Decision

The authentication tasks that cannot be executed by the local node l in the vehicle charging network system will be transmitted to the network operator. At each time slot t, the network operator should decide which external node should be used (i.e., edge node e E or cloud node c) to schedule the trusted authentication task. For ease of notation, we use E ¯ = E c l to denote all computation nodes (i.e., edge nodes E , cloud node c, and local node l), and  i E ¯ to indicate each computation node. Then, the computation capacities of each computation node i can be represented by Υ i . To indicate the authentication task scheduling decision of terminal n N at time slot t, we introduce a binary variable x n , i t . Specifically, x n , i t = 1 if the authentication task initiated by n is offloaded to the external computation node for executing. In addition, x n , i t = 0 if the authentication task is executed by the local node l. Accordingly, we obtain the following constraints:
x n , i t { 0 , 1 } i E ¯ x n , i t = 1

3.3.2. Transmission Delay

Since authentication tasks need to be transmitted to an edge node e or cloud node c, transmission delay will inevitably occur when the authentication task is executed by external node. Specifically, a vehicle charging network system transmits the terminal n’s authentication task to the external computing node through wireless channel applying the general OFDM technology. In addition, there is no transmission process if the authentication task is executed by local node l. We denote the average noise power of wireless channel interference as ϵ n , i , the power to transmit the authentication task as P n , i , and channel power gain which can be predicted by the network operator as h n , i t . Then, according to the Shannon formula, the wireless transmission rate R n , i t between terminals n and computing node i when the average link bandwidth is B can be expressed as:
R n , i t = B l o g 2 ( 1 + h n , i t · P n , i ϵ n , i )
Assuming that the size of terminal n’s authentication task transmitted by a vehicle charging network system to the computing node i is Λ n t , then the transmission delay d n , i t r ( t ) at time slot t can be expressed as:
d n , i t r ( t ) = Λ n t R n , i t x n , i t

3.3.3. Authentication Delay

To respond quickly to the massive authentication requests, we consider that the terminal n’s authentication tasks can be scheduled to different external nodes i E ¯ for execution. In this case, the total authentication response delay includes not only the transmission delay d n , i t r ( t ) , but also the authentication delay d n , i a u ( t ) for executing terminal n’s authentication tasks by UATT models deployed on local node l and each external node i. According to the UTAA model described in Section 3.2, the authentication delay d n , i a u ( t ) mainly contains the time overhead caused by data preprocessing and terminal legitimacy identification based on swin-transformer. The time overhead caused by these two procedures is proportional to the total number of terminals N in the vehicle charging network system. Using δ n , i to indicate the computational requirements that are related to the total number of terminals N, and  γ n , i t to indicate the allocated computing resources for terminal n at computation node i, then the authentication delay d n , i a u ( t ) at time slot t can be expressed as:
d n , i a u ( t ) = Λ n t · N δ n , i γ n , i t x n , i t

3.3.4. Objective Function

In order to quickly respond to the authentication requests of large-scale terminals in the vehicle charging network system, our goal is to minimize the global authentication response latency that contains transmission delay d n , i t r ( t ) and authentication delay d n , i a u ( t ) . Let ω 1 t and ω 2 t represent the weights of transmission delay d n , i t r ( t ) and authentication delay d n , i a u ( t ) , respectively, then the objective function of our optimization problem can be expressed as:
P 1 : m i n E ( { t = 1 T n = 1 N i = 1 | E ¯ | ω 1 t d n , i t r ( t ) + ω 2 t d n , i a u ( t ) } )
s . t . C 1 : x n , i t { 0 , 1 }
C 2 : i E ¯ x n , i t = 1
C 3 : n = 1 N γ n , i t Υ i ( t )
where constraint C 1 restricts that the authentication task scheduling decision is a binary vector with values 0 and 1, that is, the authentication task is either executed by a local node or by an external node. Constraint C 2 restricts that terminal n’s authentication task can only be executed by one computing node i at time slot t. Using Υ i to denote the total computational power of computing node i, constraint C 3 restricts that the allocated computing resources for terminal n at computation node i cannot exceed the total computational power of computing node i.

3.3.5. A2C-Based Authentication Task Scheduling Algorithm

To solve the objective function and overcome the dynamical authentication request in a vehicle charging network system, we propose a task scheduling algorithm based on A2C reinforcement learning. The optimal scheduling policy π that minimizes the objective function is learned by the agent (i.e., the network operator in the remote cloud) through interacting with the environment over time. Specifically, we have:
(1)
State space: The state space S of this algorithm can be defined as h n , i t , Λ n t , a t 1 , γ n , i t , where the a t 1 represents the scheduling decisions at the last time slot.
(2)
Action space: The action space A is defined as x n , i t 0 , 1 N ( E + 2 ) . As a N ( E + 2 ) matrix, A ’s rows denote a set of terminals N , and  A ’s columns indicate a series of computation nodes (i.e., E edge nodes, one cloud node, and one local node).
(3)
Reward: Since the objective is to minimize the total authentication delay, the total accumulated reward R t can be defined as R t = t = 1 δ t 1 r t   = t = 1 n = 1 N i = 1 E δ t 1   ( ω 1 t d n , i t r ( t ) + ω 2 t d n , i a u ( t ) ) , where δ means the discount factor.
According to A2C reinforcement learning, the agent that learns authentication task scheduling will introduce two neural networks to approximate actor and critic, respectively. Specifically, the actor with parameter θ π n maintains a policy function π n ( a t n | s t n ; θ π n ) to control the authentication task scheduling action. By estimating the value function V n ( s t n ; θ v n ) , the critic with parameter θ v n can evaluate the pros and cons of an actor’s certain state. Based on critic’s each evaluation results, the actor will continuously update policy function π n ( a t n | s t n ; θ π n ) . The gradient update formula of the policy function Δ θ π n can be expressed as:
Δ θ π n = α · θ π n l o g π n ( a t n | s t n ; θ π n ) · A ( s t n , a t n ; θ π n , θ v n )
where α is the learning rate, θ π n l o g π n ( a t n | s t n ; θ π n ) is the policy gradient that controls the direction of parameter updates, A ( s t n , a t n ; θ π n , θ v n ) indicates “advantage”, and  R t V n ( s t n ) means the advantage of action a t at state s t . Details of the proposed solution for optimizing the global access authentication time are described in Algorithm 1. Specifically, the operator agent first selects a scheduling decision a t n for authentication tasks each time according to actor policy. Then, the actor executes the a t n to obtain the authentication latency R t , while the critic computes the advantage function A ( s t n , a t n ; θ π n , θ v n ) based on the R t over time, and evaluates the policy. Finally, the parameters θ π n and θ v n will be updated until the optimal task scheduling policy is obtained. Detailed flowchart of the algorithm operation is shown in Appendix B.
Algorithm 1 A2C-based Task Scheduling Algorithm
1:
Input:  N , E , Υ i , B, h n , i t ;
2:
Output: scheduling decisions A , global access authentication response time R t ;
3:
Initialization:  θ π n , θ v n , number of training iterations R m a x , number of time steps in each episode T m a x .
4:
End initialization
5:
for  r = 1 , 2 , , R m a x  do
6:
   for  t = 1 , 2 , , T m a x  do
7:
     for  n = 1 , 2 , , N  do
8:
        Select authentication task scheduling decision from policy a t n π n ( a t n | s t n ; θ π n ) ;
9:
        Execute authentication task scheduling decision a t n and observe the state at next time slot s t + 1 n and reward R t ;
10:
     end for
11:
   end for
12:
   Evaluate the policy by advantage function A ( s t n , a t n ; θ π n , θ v n ) ;
13:
   Update network parameters θ π n θ π n + Δ θ π n and θ v n θ v n + Δ θ v n .
14:
end for

4. Evaluation

In this section, we conduct comprehensive experiments to evaluate the performance of our end-edge-cloud collaborative trusted access authentication which is carefully designed for large-scale heterogeneous terminals in a vehicle charging network system.

4.1. Evaluation Setup

We build a CSI adcquisition device using a Raspberry Pi, a wireless network card, an ESP32 module, and an IPEX antenna. The physical picture of the acquisition equipment and a brief introduction are shown in Appendix A. To monitor a practical and normal charging environment, we collect CSI data from 43 wireless terminals in two authentication environment cases. The first is a large open space nearly without signal occlusion and object movement. The second is an indoor test scene as illustrated in Figure 7. We also collect CSI data of terminals in different locations L = L 1 , L 2 , , L 6 . In this case, there exists signal occlusion and interference caused by unpredictable movements of people and indoor objects. This case is the default case in our performance studies. After collecting 2.4 GB of CSI, we finally obtain a dataset with 848,386 CSI samples. For data expansion, the window size L is set to 5 and the sliding stride S is set to 3. The probability parameters P g , P d , P c , P d r , and P t used for data augmentation in Section 3.2.1 are set as 0.1, 1.0, 1.0, 0.2, 1.0, respectively. Specifically, the maximum offset u and the number of offset points v for drift change are 0.8 and 3, respectively. The dimension number C of the STAM sub-block is set to 128. The number of packets H is 20 by default.
For comparison, we implement 3 state-of-the-art terminal identification schemes that are based on device fingerprints extracted from CSI as our baseline. It includes PE-Au [27] that extracts the phase error (PE) from CSI as device fingerprint for access authentication, CFO-Au [26] that extracts carrier frequency offset (CFO) from CSI as device fingerprint for access authentication, and NF-Au [28] that extracts power amplifier nonlinear features (NF) from CSI as device fingerprint for access authentication. For the baseline schemes, we adopt the default parameters taken from the corresponding literature. To further assess the impact of data expansion and data augmentation, we also implement the method UTAA-wo-Exp by removing the design of data expansion in Section 3.2.1, the method UTAA-wo-Aug by removing the design of data augmentation in Section 3.2.1. The method UTAA-wo-Exp&Aug denotes the version of UTAA without applying data expansion and augmentation.
According to the extensive evaluations of UTAA, the practical authentication overhead for a single terminal can be achieved. To further evaluate the global access authentication response time of the proposed authentication task scheduling scheme, we simulate large-scale access authentication requests under Python 3.6 and the TensorFlow framework. Specifically, we use the T-Drive Taxi Trajectories [36] to indicate the location of terminals. The locations of edge nodes are determined by terminals’ distribution within longitude range [116.0, 116.8] and latitude range [39.5, 40.3]. Moreover, the computing capacities of edge node Υ e , local node Υ l , and cloud node Υ c are uniformly distributed in [10, 20] GHz, [0.5, 1.5] GHz, and 100 GHz, respectively. Based on [37], the wireless network bandwidth B is 10 MHz. The average noise power ϵ n , i = 1 e 3 . The power that a terminal can provide is P n , i [ 5 , 100 ] mW. For the neural network parameters, the learning rate is 0.05, δ = 0.95 , batch size is 300, and the number of hidden units of actor and critic neural network is 256. Particularly, the classic stochastic gradient descent will be used in our algorithm.
All the evaluations are conducted on a server equipped with 24 CPU kernels (Intel Xeon CPU E5-2620 [email protected]) and 128 GB of RAM.

4.2. Accuracy and Delay Analysis of UTAA

4.2.1. Performance Comparison

In Table 2, all the schemes gain high accuracy larger than 0.96, while the authentication delay for a single terminal is largely different. We can see that UTAA achieves the best accuracy and authentication delay performance against other algorithms. Specifically, the accuracy of UTAA is about 0.98 and the authentication delay of UTAA is 1.8 s. CFO-Au gains the second smallest authentication delay of about 10 s. The authentication delay of PE-Au and NF-Au is all about 20 s. The rate of packets is generally stable for a specific terminal. From Table 2, we can see that a larger number of packets will lead to a larger authentication delay. This further validates that the number of packets H is the key factor to affect the speed with enough accuracy. It demonstrates that the number of packets to obtain enough accuracy of the UTAA model is two orders less than the baselines. This further validates that the proposed UTAA has the ability to extract more effective information from less packets while maintaining high accuracy. PE-Au and NF-Au have the same authentication delay but NF-Au has less packets than PE-Au. This may be because NF-Au has a larger computation delay than PE-Au.

4.2.2. Accuracy over Different Packet Number

In this section, we vary the number of packets to evaluate the accuracy in Figure 8. In terms of the number of packets, a small H may lose necessary information and achieve poor accuracy performance, while a large H may enlarge the time cost but gain high accuracy performance. As Figure 8 shows, when H is 5, the accuracy of UTAA is only about 0.9. When H is larger than 10, UTAA achieves a high and stable accuracy performance about 0.98. The stable performance of high accuracy demonstrates the robustness of UTAA over the parameter H.

4.2.3. Impact Study of Data Expansion and Data Augmentation

To dive into the impact of data expansion and data augmentation, we evaluate the performance of the two components of UTAA separately in Figure 9. We can see that UTAA achieves high accuracy above 0.98, while UTAA-wo-Exp&Aug achieves the worst performance with accuracy less than 0.7. When removing either the data expansion component or the data augmentation component, the performance decreases significantly. This validates the high accuracy gain of the combined design of data expansion and data augmentation in UTAA. Interestingly, the performance of UTAA-wo-Exp is significantly better than the performance of UTAA-wo-Aug. This may be because data augmentation has a stronger ability to enlarge the richness of SCI samples than data expansion.

4.3. The Stability Performance of Device Fingerprint Extracted by UTAA

The accuracy and robustness of access authentication schemes based on device fingerprints are strongly related to the stability of device fingerprints. It is obvious that the more stable the extracted fingerprint features are, the better the subsequent terminal legitimacy identification will be. To evaluate the stability performance of our UTAA model for extracting device fingerprints, we conduct detailed experiments in different environments, different times, and different locations. By collecting and saving a certain amount of device fingerprints of test terminals in advance, we obtain a device fingerprint library. Using the cosine similarity between fresh fingerprints extracted under various cases and the fingerprints stored in the library to characterize the fingerprint stability, we evaluate the environmental stability, time stability, and location stability of the device fingerprint extracted by the UTAA model, respectively, as illustrated in Figure 10.

4.3.1. Stability Analysis in Different Environment

As shown in Figure 10a, we evaluate the environmental stability of device fingerprints of six terminals (i.e., T 1 , T 2 , , T 6 ) extracted by UTAA in a large open outdoor scene, and in an indoor scene with normal signal occlusion and object movement, respectively. It can be clearly found that each block in Figure 10a has a darker color, which means that our UTAA model is capable of extracting environmentally stable fingerprints for various terminals in practical environments including indoors and outdoors. Particularly, the device fingerprint of terminal T 2 can be extracted with a stability of 0.99 in a large and open outdoor environment. In a more complex and practical indoor environment, the device fingerprint extracted by UTAA has a stability of at least 0.86, or even 0.96, which implies the satisfactory practical value of UTAA.

4.3.2. Stability Analysis over Time

Similarly, we evaluate the time stability of device fingerprints by extracting the device fingerprints of six terminals based on UTAA at different times during the ten days from 15 December 2021 to 24 December 2021. As shown in Figure 10b, the blocks representing the device fingerprint stability of the 6 terminals within these ten days all have relatively dark colors, especially the blocks of terminal T 2 from 17 to 24 December. This indicates that the device fingerprints of various terminals extracted at different time periods maintain considerable similarity (at least 0.8) with the fingerprints in the library. That is, device fingerprints extracted by the UTAA model will not be interfered by time.

4.3.3. Stability Analysis over Location

As shown in Figure 10c, we also evaluate the location stability of device fingerprints extracted by UTAA model through testing cosine similarity between the fingerprints of six terminals (i.e., T 1 , T 2 , , T 6 ) in six different locations (i.e., L 1 , L 2 , L 6 ) and the device fingerprint library. It can be found that all color blocks have a cosine similarity higher than 0.8, which means the considerable stability of device fingerprints extracted in different locations. In particular, there are some fingerprints such as those from terminal T 2 extracted at local L 1 and L 5 with location stability as high as 0.98. Thus, UTAA will achieve satisfactory location stability in practice.

4.4. Performance Study of Authentication Task Scheduling

The convergence of training: To verify the effectiveness of the proposed A2C-based authentication task scheduling scheme in solving optimization problems, we first evaluate how our algorithm loss converges in training iterations. The critic loss over training iteration with the number of terminals N = 50 is elaborated in Figure 11. It can be found that the critic loss decreases rapidly in the first 80 iterations and then oscillates steadily. In addition, the training process of the proposed algorithm can converge quickly. This means that our scheduling scheme can quickly and efficiently select the optimal authentication task execution node with the goal of minimizing the global authentication latency.
The scheme performance comparison: We compare the performance of the proposed authentication task scheduling scheme with the local only scheme and the Cloud only scheme when the number of terminals is 20, 30, 40, 50, 60. As shown in Figure 12, the proposed scheme can obtain the smallest authentication latency, i.e., better authentication performance. Moreover, offloading the authentication tasks to the remote cloud, although it results in a larger transmission latency, the obtained authentication latency is smaller compared to the local only scheme. In other words, computing all authentication tasks locally will result in the worst authentication performance.

5. Conclusions and Discussion

In this paper, we proposed a robust and lightweight trusted access authentication solution for terminals in a vehicle charging network system. By well-designed device fingerprint extraction and End-Edge-Cloud Collaborative fingerprint identification, our solution effectively addresses the difficulty of real-time unified authentication for large-scale heterogeneous terminals faced by the system. This will contribute to the security of the Internet of Vehicles, which is under intense development. Moreover, although the solution in this paper is designed for vehicle charging networks, it can actually be applied to many other systems with similar challenges.
However, there are still shortcomings in our work. First, although our solution achieves high authentication accuracy, the swin-transformer network with large volume and many parameters will inevitably lead to relatively high resource overhead. In response to this problem, in the future, we will further explore a lightweight trusted access scheme that can balance authentication accuracy and resource overhead. Second, in this paper, a part of our dataset is obtained through data expansion and data augmentation. This improves data richness to some extent, but the effect is limited. Therefore, one of our future tasks is to collect more data from the real environment to build a more complete dataset.

Author Contributions

Conceptualization, J.Z., P.X. and Z.X.; investigation, J.F. and T.L.; methodology, J.Z., P.X. and Z.X.; project administration, Y.L.; validation, H.H.; writing—original draft, J.F., T.L. and H.H.; writing—review and editing, S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The work in the paper is sponsored by science and technology project of state grid corporation of China: Research on critical technology of secondary system planning and design of distribution network for novel power system (No. 5400-202256273A-2-0-XG).

Data Availability Statement

No applicable.

Conflicts of Interest

The authors declare there is no conflict of interest regarding the publication of this paper.

Appendix A

As shown in Figure A1, we additionally provide a physical picture of the fingerprint collection device, hoping that it will be helpful for the reader. The acquisition device consists of a Raspberry Pi, a wireless network card, an ESP32 module, and an IPEX antenna. By writing the captured data to the CSV file at a certain time interval, we can obtain the original CSI of each terminal from the real environment.
Figure A1. Physical picture of CSI collection equipment.
Figure A1. Physical picture of CSI collection equipment.
Electronics 12 01882 g0a1

Appendix B

To explain Algorithm 1 more clearly, we further describe the algorithm in the form of a flowchart. The detailed process of the algorithm is shown in Figure A2.
Figure A2. The detailed process of Algorithm 1.
Figure A2. The detailed process of Algorithm 1.
Electronics 12 01882 g0a2

References

  1. Saeed, M.M.; Hasan, M.K.; Obaid, A.J.; Saeed, R.A.; Mokhtar, R.A.; Ali, E.S.; Akhtaruzzaman, M.; Amanlou, S.; Hossain, A.Z. A comprehensive review on the users’ identity privacy for 5G networks. IET Commun. 2022, 16, 384–399. [Google Scholar] [CrossRef]
  2. Cai, T.; Yang, Z.; Chen, W.; Zheng, Z.; Yu, Y. A blockchain-assisted trust access authentication system for solid. IEEE Access 2020, 8, 71605–71616. [Google Scholar] [CrossRef]
  3. Yao, S.; Guan, J.; Wu, Y.; Xu, K.; Xu, M. Toward secure and lightweight access authentication in SAGINs. IEEE Wirel. Commun. 2020, 27, 75–81. [Google Scholar] [CrossRef]
  4. Gupta, R.; Reebadiya, D.; Tanwar, S.; Kumar, N.; Guizani, M. When blockchain meets edge intelligence: Trusted and security solutions for consumers. IEEE Netw. 2021, 35, 272–278. [Google Scholar] [CrossRef]
  5. Chen, Y.; Dong, G.; Bai, J.; Hao, Y.; Li, F.; Peng, H. Trust enhancement scheme for cross domain authentication of PKI system. In Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guilin, China, 17–19 October 2019; pp. 103–110. [Google Scholar]
  6. Qiu, H.; Qiu, M.; Lu, R. Secure V2X communication network based on intelligent PKI and edge computing. IEEE Netw. 2019, 34, 172–178. [Google Scholar] [CrossRef]
  7. Li, F.; Liu, Z.; Li, T.; Ju, H.; Wang, H.; Zhou, H. Privacy-aware PKI model with strong forward security. Int. J. Intell. Syst. 2022, 37, 10049–10065. [Google Scholar] [CrossRef]
  8. Guo, X.; Zhang, Z.; Chang, J. Survey of mobile device authentication methods based on RF fingerprint. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April–2 May 2019; pp. 1–6. [Google Scholar]
  9. Liu, Z.; Lin, Y.; Cao, Y.; Hu, H.; Wei, Y.; Zhang, Z.; Lin, S.; Guo, B. Swin Transformer: Hierarchical Vision Transformer Using Shifted Windows. arXiv 2021, arXiv:2103.14030. [Google Scholar]
  10. Zhu, D.; Li, T.; Tian, H.; Yang, Y.; Liu, Y.; Liu, H.; Geng, L.; Sun, J. Speed-Aware and Customized Task Offloading and Resource Allocation in Mobile Edge Computing. IEEE Commun. Lett. 2021, 25, 2683–2687. [Google Scholar] [CrossRef]
  11. Aghabagherloo, A.; Delavar, M.; Mohajeri, J.; Salmasizadeh, M.; Preneel, B. An efficient and physically secure privacy-preserving authentication scheme for Vehicular Ad-hoc NETworks (VANETs). IEEE Access 2022, 10, 93831–93844. [Google Scholar] [CrossRef]
  12. Tan, H.; Zheng, W.; Guan, Y.; Lu, R. A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications. IEEE Trans. Veh. Technol. 2022, 72, 3622–3635. [Google Scholar] [CrossRef]
  13. Heng, X.; Qin, S.; Xiao, Y.; Wang, J.; Tao, Y.; Zhang, R. A strong secure V2I authentication scheme from PKI and accumulator. In Proceedings of the 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China, 14–16 January 2022; pp. 98–103. [Google Scholar]
  14. Lai, C.; Lu, R.; Zheng, D.; Shen, X. Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw. 2020, 34, 37–45. [Google Scholar] [CrossRef]
  15. Guo, S.; Hu, X.; Zhou, Z.; Wang, X.; Qi, F.; Gao, L. Trust access authentication in vehicular network based on blockchain. China Commun. 2019, 16, 18–30. [Google Scholar] [CrossRef]
  16. Nakisa, B.; Ansarizadeh, F.; Oommen, P.; Shrestha, S. Technology Acceptance Model: A Case Study of Palm Vein Authentication Technology. IEEE Access 2022, 10, 120436–120449. [Google Scholar] [CrossRef]
  17. Al-Shawabka, A.; Restuccia, F.; D’Oro, S.; Jian, T.; Rendon, B.C.; Soltani, N.; Dy, J.; Ioannidis, S.; Chowdhury, K.; Melodia, T. Exposing the fingerprint: Dissecting the impact of the wireless channel on radio fingerprinting. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 646–655. [Google Scholar]
  18. Sánchez, P.M.S.; Valero, J.M.J.; Celdrán, A.H.; Bovet, G.; Pérez, M.G.; Pérez, G.M. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. IEEE Commun. Surv. Tutor. 2021, 23, 1048–1077. [Google Scholar] [CrossRef]
  19. Soltanieh, N.; Norouzi, Y.; Yang, Y.; Karmakar, N.C. A review of radio frequency fingerprinting techniques. IEEE J. Radio Freq. Identif. 2020, 4, 222–233. [Google Scholar] [CrossRef]
  20. Shen, G.; Zhang, J.; Marshall, A.; Cavallaro, J.R. Towards scalable and channel-robust radio frequency fingerprint identification for LoRa. IEEE Trans. Inf. Forensics Secur. 2022, 17, 774–787. [Google Scholar] [CrossRef]
  21. Babun, L.; Aksu, H.; Ryan, L.; Akkaya, K.; Bentley, E.S.; Uluagac, A.S. Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–7. [Google Scholar]
  22. Zhuo, Y.; Zhu, H.; Xue, H. Identifying a new non-linear CSI phase measurement error with commodity WiFi devices. In Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), Wuhan, China, 13–16 December 2016; pp. 72–79. [Google Scholar]
  23. Wang, Z.; Guo, B.; Yu, Z.; Zhou, X. Wi-Fi CSI-based behavior recognition: From signals and actions to activities. IEEE Commun. Mag. 2018, 56, 109–115. [Google Scholar] [CrossRef]
  24. Hong, F.; Wang, X.; Yang, Y.; Zong, Y.; Zhang, Y.; Guo, Z. WFID: Passive device-free human identification using WiFi signal. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Hiroshima, Japan, 28 November–1 December 2016; pp. 47–56. [Google Scholar]
  25. Wang, Y.; Wu, K.; Ni, L.M. Wifall: Device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 2016, 16, 581–594. [Google Scholar] [CrossRef]
  26. Hua, J.; Sun, H.; Shen, Z.; Qian, Z.; Zhong, S. Accurate and efficient wireless device fingerprinting using channel state information. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 1700–1708. [Google Scholar]
  27. Liu, P.; Yang, P.; Song, W.Z.; Yan, Y.; Li, X.Y. Real-time identification of rogue WiFi connections using environment-independent physical features. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 190–198. [Google Scholar]
  28. Lin, Y.; Gao, Y.; Li, B.; Dong, W. Accurate and robust rogue access point detection with client-agnostic wireless fingerprinting. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), Austin, TX, USA, 23–27 March 2020; pp. 1–10. [Google Scholar]
  29. Sadeeq, M.M.; Abdulkareem, N.M.; Zeebaree, S.R.; Ahmed, D.M.; Sami, A.S.; Zebari, R.R. IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Acad. J. 2021, 1, 1–7. [Google Scholar] [CrossRef]
  30. Bello, S.A.; Oyedele, L.O.; Akinade, O.O.; Bilal, M.; Delgado, J.M.D.; Akanbi, L.A.; Ajayi, A.O.; Owolabi, H.A. Cloud computing in construction industry: Use cases, benefits and challenges. Autom. Constr. 2021, 122, 103441. [Google Scholar] [CrossRef]
  31. Alam, T. Cloud Computing and its role in the Information Technology. IAIC Trans. Sustain. Digit. Innov. (ITSDI) 2020, 1, 108–115. [Google Scholar] [CrossRef]
  32. Saeik, F.; Avgeris, M.; Spatharakis, D.; Santi, N.; Dechouniotis, D.; Violos, J.; Leivadeas, A.; Athanasopoulos, N.; Mitton, N.; Papavassiliou, S. Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions. Comput. Netw. 2021, 195, 108177. [Google Scholar] [CrossRef]
  33. Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An overview on edge computing research. IEEE Access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
  34. Qiu, T.; Chi, J.; Zhou, X.; Ning, Z.; Atiquzzaman, M.; Wu, D.O. Edge computing in industrial Internet of Things: Architecture, advances and challenges. IEEE Commun. Surv. Tutorials 2020, 22, 2462–2488. [Google Scholar] [CrossRef]
  35. Zhang, J.; Wu, F.; Wei, B.; Zhang, Q.; Huang, H.; Shah, S.W.; Cheng, J. Data Augmentation and Dense-LSTM for Human Activity Recognition Using WiFi Signal. IEEE Internet Things J. 2021, 8, 4628–4641. [Google Scholar] [CrossRef]
  36. Yuan, J.; Zheng, Y.; Xie, X.; Sun, G. Driving with knowledge from the physical world. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 21–24 August 2011; pp. 316–324. [Google Scholar]
  37. Kwak, J.; Kim, Y.; Lee, J.; Chong, S. DREAM: Dynamic resource and task allocation for energy minimization in mobile cloud systems. IEEE J. Sel. Areas Commun. 2015, 33, 2510–2523. [Google Scholar] [CrossRef]
Figure 1. The end-edge-cloud cooperative authentication framework.
Figure 1. The end-edge-cloud cooperative authentication framework.
Electronics 12 01882 g001
Figure 2. The Unified Trusted Access Authentication (UTAA) Model.
Figure 2. The Unified Trusted Access Authentication (UTAA) Model.
Electronics 12 01882 g002
Figure 4. An example of data expansion using sliding window.
Figure 4. An example of data expansion using sliding window.
Electronics 12 01882 g004
Figure 5. The effects of five data augmentation methods.
Figure 5. The effects of five data augmentation methods.
Electronics 12 01882 g005
Figure 6. Architecture of Swin-Transformer-based authentication module (STAM).
Figure 6. Architecture of Swin-Transformer-based authentication module (STAM).
Electronics 12 01882 g006
Figure 7. The illustration of indoor environment case.
Figure 7. The illustration of indoor environment case.
Electronics 12 01882 g007
Figure 8. Accuracy over different packet numbers.
Figure 8. Accuracy over different packet numbers.
Electronics 12 01882 g008
Figure 9. Impact study of data expansion and data augmentation.
Figure 9. Impact study of data expansion and data augmentation.
Electronics 12 01882 g009
Figure 10. The evaluation results of environmental stability, time stability, and location stability of device fingerprints extracted by UTAA.
Figure 10. The evaluation results of environmental stability, time stability, and location stability of device fingerprints extracted by UTAA.
Electronics 12 01882 g010
Figure 11. The critic loss over training iterations.
Figure 11. The critic loss over training iterations.
Electronics 12 01882 g011
Figure 12. The performance comparison between our proposed scheme, local only scheme, and cloud only scheme.
Figure 12. The performance comparison between our proposed scheme, local only scheme, and cloud only scheme.
Electronics 12 01882 g012
Table 1. Output examples and the corresponding network access control.
Table 1. Output examples and the corresponding network access control.
NumberClassAccess Network (Y/N)
0illegal terminalNo
1legal cameraYes
2legal smoke sensorYes
3legal fire sensorYes
4legal voltage sensorYes
Table 2. Performance comparison of different baselines.
Table 2. Performance comparison of different baselines.
NumberFeatureAccuracyAuthentication
Delay
Number of
Packets
0PE-Au97.30%20 s5000
1CFO-Au96.00%10 s2000
2NF-Au96.55%20 s4000
3UTAA98.49%1.8 s20
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zou, J.; Xin, P.; Xiao, Z.; Fang, J.; Li, T.; He, H.; Zhuang, S.; Liu, Y. Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System. Electronics 2023, 12, 1882. https://doi.org/10.3390/electronics12081882

AMA Style

Zou J, Xin P, Xiao Z, Fang J, Li T, He H, Zhuang S, Liu Y. Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System. Electronics. 2023; 12(8):1882. https://doi.org/10.3390/electronics12081882

Chicago/Turabian Style

Zou, Jing, Peizhe Xin, Zhihong Xiao, Jiang Fang, Ting Li, Haonan He, Shangyuan Zhuang, and Yinlong Liu. 2023. "Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System" Electronics 12, no. 8: 1882. https://doi.org/10.3390/electronics12081882

APA Style

Zou, J., Xin, P., Xiao, Z., Fang, J., Li, T., He, H., Zhuang, S., & Liu, Y. (2023). Trusted Access Authentication Technology for Large-Scale Heterogeneous Terminals in a Vehicle Charging Network System. Electronics, 12(8), 1882. https://doi.org/10.3390/electronics12081882

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop