TY - GEN
T1 - Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
AU - Ardizzon, Francesco
AU - Diamant, Roee
AU - Casari, Paolo
AU - Tomasin, Stefano
N1 - Publisher Copyright: © 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - We propose a technique to authenticate received packets in underwater acoustic networks based on the physicallayer features of the underwater acoustic channel (UWAC). Several sensors a) locally estimate features (e.g., the number of taps or the delay spread) of the UWAC over which the packet is received, b) obtain a compressed feature representation through a neural network (NN), and c) transmit their representations to a central sink node that, using a NN, decides whether the packet has been transmitted by the legitimate node or by an impersonating attacker. Although the purpose of the system is to make a binary decision as to whether a packet is authentic or not, we show the importance of having a rich set of compressed features, while still taking into account transmission rate limits among the nodes. We consider both global training, where all NNs are trained together, and local training, where each NN is trained individually. For the latter scenario, several alternatives for the NN structure and loss function were used for training.
AB - We propose a technique to authenticate received packets in underwater acoustic networks based on the physicallayer features of the underwater acoustic channel (UWAC). Several sensors a) locally estimate features (e.g., the number of taps or the delay spread) of the UWAC over which the packet is received, b) obtain a compressed feature representation through a neural network (NN), and c) transmit their representations to a central sink node that, using a NN, decides whether the packet has been transmitted by the legitimate node or by an impersonating attacker. Although the purpose of the system is to make a binary decision as to whether a packet is authentic or not, we show the importance of having a rich set of compressed features, while still taking into account transmission rate limits among the nodes. We consider both global training, where all NNs are trained together, and local training, where each NN is trained individually. For the latter scenario, several alternatives for the NN structure and loss function were used for training.
UR - http://www.scopus.com/inward/record.url?scp=85141633324&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/UComms56954.2022.9905689
DO - https://doi.org/10.1109/UComms56954.2022.9905689
M3 - Conference contribution
T3 - 2022 6th Underwater Communications and Networking Conference, UComms 2022
BT - 2022 6th Underwater Communications and Networking Conference, UComms 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th Underwater Communications and Networking Conference, UComms 2022
Y2 - 30 August 2022 through 1 September 2022
ER -