计算机应用 ›› 2016, Vol. 36 ›› Issue (11): 3103-3107.DOI: 10.11772/j.issn.1001-9081.2016.11.3103

• 网络空间安全 • 上一篇    下一篇

基于支持向量机的4G室内物理层认证算法

杨建喜1,2, 戴楚屏2, 姜停停1, 丁正光1   

  1. 1. 北京电子科技学院 通信工程系, 北京 100070;
    2. 西安电子科技大学 通信工程学院, 西安 710071
  • 收稿日期:2016-04-25 修回日期:2016-06-16 出版日期:2016-11-10 发布日期:2016-11-12
  • 通讯作者: 戴楚屏
  • 作者简介:杨建喜(1973-),男,山西原平人,副教授,博士,主要研究方向:无线网络安全、通信网络信号抗干扰处理;戴楚屏(1990-),女,安徽黄山人,硕士研究生,主要研究方向:4G无线通信、无线通信物理层安全、机器学习;姜停停(1989-),女,山东临沂人,硕士研究生,主要研究方向:云计算网络安全、软件定义网络;丁正光(1993-),男,安徽合肥人,硕士研究生,主要研究方向:云计算网络安全、Docker。
  • 基金资助:
    中央高校基本科研业务费资助项目(328201537)。

4G indoor physical layer authentication algorithm based on support vector machine

YANG Jianxi1,2, DAI Chuping2, JIANG Tingting1, DING Zhengguang1   

  1. 1. Department of Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China;
    2. College of Communication Engineering, Xidian University, Xi'an Shaanxi 710071, China
  • Received:2016-04-25 Revised:2016-06-16 Online:2016-11-10 Published:2016-11-12
  • Supported by:
    This work is partially supported by the Fundamental Research Funds for the Central Universites (328201537).

摘要: 针对传统的物理层安全算法没有充分利用信道特性这一问题,提出一种物理层信道检测方案。针对4G无线信道的本质特性,结合假设检验方法,利用支持向量机(SVM)对信道向量指标进行挖掘,从而判决是否存在仿冒攻击者。仿真实验中,所提算法在线性核函数下的判决准确率为98%以上,在径向基函数(RBF)下的判决准确率为99%以上。实验结果表明,所提算法能够充分利用空间不同位置的无线信道特性,实现逐条信息源的认证,增强系统的安全性。

关键词: 4G-LTE, 无线网络安全, 物理层认证, 支持向量机, 假设检验

Abstract: Aimming at the problem that the traditional physical layer security algorithm does not make full use of the channel,a new physical layer channel detection algorithm was proposed. In view of the essential properties of 4G wireless channel, combined with the hypothesis testing, Support Vector Machine (SVM) was used to analyse the metrics of channel vector to decide whether there are counterfeit attackers or not. Simulation experiments show that the accuracy of the proposed algorithm based on linear kernel is more than 98%, and the accuracy of the proposed algorithm based on Radial Basis Function (RBF) is more than 99%. The proposed algorithm can make full use of the wireless channel characteristics of different spatial locations to implement authenticaton of information source one by one, and hence enhances the security of the system.

Key words: 4th-Generation Long Term Evolution (4G-LTE), wireless network security, physical layer authentication, Support Vector Machine (SVM), Hypothesis testing

中图分类号: