Loading…

A Malicious Node Identification Method Based on Edge Computing

Edge computing can meet the needs of many industries in real-time business control, security and privacy protection. In the process of massive heterogeneous terminals accessing the network through edge devices, it is very challenging to achieve fast and reliable authentication. The physical layer au...

Full description

Saved in:
Bibliographic Details
Published in:IOP conference series. Earth and environmental science 2020-01, Vol.428 (1), p.12019
Main Authors: Xu, Aidong, Cao, Minggui, Liao, Runfa, Zhang, Yunan, Jiang, Yixin, Chen, Yi, Wen, Hong, Du, Jinran
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Edge computing can meet the needs of many industries in real-time business control, security and privacy protection. In the process of massive heterogeneous terminals accessing the network through edge devices, it is very challenging to achieve fast and reliable authentication. The physical layer authentication technology authenticates through the channel characteristics, which has the characteristics of lightweight, and can well adapt to the authentication scenario of massive heterogeneous terminal access. In order to identify malicious nodes, this paper proposes an attack identification scheme of malicious nodes under edge computing. The new channel response information vector is constructed by using the correlation between the channel information of consecutive frames. Two or more time slot channel frequency response vectors are averaged to obtain a new channel response vector. It has the advantages of low computational complexity and high recognition accuracy. And combined with the channel frequency response based on the deep neural network to identify malicious nodes, the data set in the factory environment is simulated.
ISSN:1755-1307
1755-1315
DOI:10.1088/1755-1315/428/1/012019