phy-layer spoofing detection with reinforcement learning in ... · in wireless networks. the event...

11
1 PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks Liang Xiao, Senior Member, IEEE, Yan Li, Student Member, IEEE, Guoan Han, Student Member, IEEE, Guolong Liu, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract—In this paper, we investigate the PHY-layer authen- tication that exploits radio channel information (such as received signal strength indicators) to detect spoofing attacks in wireless networks. The interactions between a legitimate receiver and spoofers are formulated as a zero-sum authentication game. The receiver chooses the test threshold in the hypothesis test to maximize its utility based on the Bayesian risk in the spoofing detection, while the spoofers determine their attack frequencies to minimize the utility of the receiver. The Nash equilibrium of the static authentication game is derived and its uniqueness is discussed. We also investigate a repeated PHY-layer authentica- tion game for a dynamic radio environment. As it is challenging for the radio nodes to obtain the exact channel parameters in advance, we propose spoofing detection schemes based on Q- learning and Dyna-Q, which achieve the optimal test threshold in the spoofing detection via reinforcement learning. We implement the PHY-layer spoofing detectors over universal software radio peripherals and evaluate their performance via experiments in indoor environments. Both simulation and experimental results have validated the efficiency of the proposed strategies. Index Terms—PHY-layer authentication, spoofing detection, game theory, reinforcement learning. I. I NTRODUCTION Wireless networks are vulnerable to spoofing attacks, in which a spoofer claims to be another node by using a faked identity such as the MAC address of the latter. Spoofers can obtain illegal advantages and further perform man-in-the- middle attacks and denial of service attacks [2]. PHY-layer authentication techniques exploit physical layer properties of wireless communications to detect spoofing attacks. Received signal strengths (RSSs) [2]–[4], channel impulse responses [5], [6], received signal strength indicators (RSSIs), channel state information [7]–[9] and channel frequency responses [10], [11] have been used as the fingerprints of wireless channels to detect spoofing attacks. As the radio channel responses in wideband wireless com- munications are difficult to predict and thus to spoof, the channel-based spoofing detector in [10] discriminates transmit- ters at different locations, in which a hypothesis test compares Copyright (c) 2015 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. L. Xiao, Y. Li, G. Han, and G. Liu are with Dept. Communication Engineering, Xiamen University, 361005 China. E-mail: [email protected]. W. Zhuang is with Dept. Electrical and Computer Engineering, University of Waterloo, Canada. E-mail: [email protected]. This work was supported by 863 high technology plan (Grant No.2015AA01A707). This work was presented in part in a paper [1] presented at IEEE Globecom 2015. the channel frequency responses of the messages with the same MAC address. The accuracy of the PHY-layer spoofing detection depends on the test threshold in the hypothesis test performed at the receiver. It is challenging for the receiver to choose a proper test threshold in the spoofing detector without knowing the exact values of the channel parameters in a dynamic radio environment against spoofers that can flexibly choose their attack probabilities to hide and attack effectively. As both users and attackers have autonomy and flexible con- trol over their transmissions, game theory has shown strengths to improve security in wireless networks, such as jamming attacks [12], [13], and collusion attacks [14]. By applying re- inforcement learning techniques, such as Q-learning, a player can achieve the optimal strategies in a dynamic environment without being aware of the system information. For example, the channel selection strategy with Q-learning in [12] can address jamming attacks, and the channel accessing with Q- learning in [15] copes with jammers in a hostile environment. In addition, Dyna-Q increases the learning speed by utilizing the hypothetical experiences from the world model built from real experiences [16]. In this paper, we apply game theory to investigate the PHY-layer authentication in dynamic wireless networks, which compares the channel states of the data packets to detect spoofing attacks. The authentication process is formulated as a zero-sum authentication game consisting of the spoofers and the receiver. The receiver determines the test threshold in the PHY-layer spoofing detection, while each spoofer chooses its attack frequency to maximize its utility based on the Bayesian risk [17]. Spoofers cooperatively attack the receiver to avoid collisions. We derive the Nash equilibrium (NE) [18] in the static authentication game based on the channel frequency responses. Both the optimal test threshold in the PHY-layer spoofing detection and the optimal spoofing frequency depend on the relative channel time variation and the ratio of channel gains of the spoofer over the legitimate node. Simulation results show that the PHY-layer spoofing detection at the NE is robust against radio environmental changes. We propose the PHY-layer authentication algorithms by exploiting the channel states of the radio packets, which determine the test threshold based on reinforcement learning, in dynamic wireless networks without knowing complete channel parameters such as the channel time variations. More specifically, the optimal test threshold in the hypothesis test is achieved by trial-and-error to maximize the long-term utility in the dynamic PHY-layer authentication game. The proposed PHY-layer authentication can be integrated with traditional

Upload: others

Post on 24-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

1

PHY-layer Spoofing Detection with ReinforcementLearning in Wireless Networks

Liang Xiao, Senior Member, IEEE, Yan Li, Student Member, IEEE, Guoan Han, Student Member, IEEE,Guolong Liu, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE

Abstract—In this paper, we investigate the PHY-layer authen-tication that exploits radio channel information (such as receivedsignal strength indicators) to detect spoofing attacks in wirelessnetworks. The interactions between a legitimate receiver andspoofers are formulated as a zero-sum authentication game.The receiver chooses the test threshold in the hypothesis testto maximize its utility based on the Bayesian risk in the spoofingdetection, while the spoofers determine their attack frequenciesto minimize the utility of the receiver. The Nash equilibrium ofthe static authentication game is derived and its uniqueness isdiscussed. We also investigate a repeated PHY-layer authentica-tion game for a dynamic radio environment. As it is challengingfor the radio nodes to obtain the exact channel parameters inadvance, we propose spoofing detection schemes based on Q-learning and Dyna-Q, which achieve the optimal test threshold inthe spoofing detection via reinforcement learning. We implementthe PHY-layer spoofing detectors over universal software radioperipherals and evaluate their performance via experiments inindoor environments. Both simulation and experimental resultshave validated the efficiency of the proposed strategies.

Index Terms—PHY-layer authentication, spoofing detection,game theory, reinforcement learning.

I. INTRODUCTION

Wireless networks are vulnerable to spoofing attacks, inwhich a spoofer claims to be another node by using a fakedidentity such as the MAC address of the latter. Spooferscan obtain illegal advantages and further perform man-in-the-middle attacks and denial of service attacks [2]. PHY-layerauthentication techniques exploit physical layer properties ofwireless communications to detect spoofing attacks. Receivedsignal strengths (RSSs) [2]–[4], channel impulse responses [5],[6], received signal strength indicators (RSSIs), channel stateinformation [7]–[9] and channel frequency responses [10], [11]have been used as the fingerprints of wireless channels todetect spoofing attacks.

As the radio channel responses in wideband wireless com-munications are difficult to predict and thus to spoof, thechannel-based spoofing detector in [10] discriminates transmit-ters at different locations, in which a hypothesis test compares

Copyright (c) 2015 IEEE. Personal use of this material is permitted.However, permission to use this material for any other purposes must beobtained from the IEEE by sending a request to [email protected].

L. Xiao, Y. Li, G. Han, and G. Liu are with Dept. CommunicationEngineering, Xiamen University, 361005 China. E-mail: [email protected]. Zhuang is with Dept. Electrical and Computer Engineering, University ofWaterloo, Canada. E-mail: [email protected].

This work was supported by 863 high technology plan (GrantNo.2015AA01A707).

This work was presented in part in a paper [1] presented at IEEE Globecom2015.

the channel frequency responses of the messages with thesame MAC address. The accuracy of the PHY-layer spoofingdetection depends on the test threshold in the hypothesis testperformed at the receiver. It is challenging for the receiverto choose a proper test threshold in the spoofing detectorwithout knowing the exact values of the channel parameters ina dynamic radio environment against spoofers that can flexiblychoose their attack probabilities to hide and attack effectively.

As both users and attackers have autonomy and flexible con-trol over their transmissions, game theory has shown strengthsto improve security in wireless networks, such as jammingattacks [12], [13], and collusion attacks [14]. By applying re-inforcement learning techniques, such as Q-learning, a playercan achieve the optimal strategies in a dynamic environmentwithout being aware of the system information. For example,the channel selection strategy with Q-learning in [12] canaddress jamming attacks, and the channel accessing with Q-learning in [15] copes with jammers in a hostile environment.In addition, Dyna-Q increases the learning speed by utilizingthe hypothetical experiences from the world model built fromreal experiences [16].

In this paper, we apply game theory to investigate thePHY-layer authentication in dynamic wireless networks, whichcompares the channel states of the data packets to detectspoofing attacks. The authentication process is formulated asa zero-sum authentication game consisting of the spoofers andthe receiver. The receiver determines the test threshold in thePHY-layer spoofing detection, while each spoofer chooses itsattack frequency to maximize its utility based on the Bayesianrisk [17]. Spoofers cooperatively attack the receiver to avoidcollisions. We derive the Nash equilibrium (NE) [18] in thestatic authentication game based on the channel frequencyresponses. Both the optimal test threshold in the PHY-layerspoofing detection and the optimal spoofing frequency dependon the relative channel time variation and the ratio of channelgains of the spoofer over the legitimate node. Simulationresults show that the PHY-layer spoofing detection at the NEis robust against radio environmental changes.

We propose the PHY-layer authentication algorithms byexploiting the channel states of the radio packets, whichdetermine the test threshold based on reinforcement learning,in dynamic wireless networks without knowing completechannel parameters such as the channel time variations. Morespecifically, the optimal test threshold in the hypothesis test isachieved by trial-and-error to maximize the long-term utilityin the dynamic PHY-layer authentication game. The proposedPHY-layer authentication can be integrated with traditional

Page 2: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

2

authentication mechanisms at MAC and network layers. Forexample, each packet accepted by PHY-layer authenticationcan be further authenticated at MAC/IP levels using the stan-dard schemes based on the specific protocol stack. By combin-ing with higher-layer authentication, the proposed PHY-layerauthentication scheme can save the time and energy to processmost spoofing packets at higher layers. The proposed spoofingdetection schemes are implemented over universal softwareradio peripherals (USRPs) and their performance is verifiedvia field tests in typical indoor environments.

To summarize, the contributions of our work are as follows:(1) We investigate the PHY-layer authentication that exploits

the channel states of the radio packets to detect spoofingattacks, and formulate the authentication process between thespoofers and the receiver as a static zero-sum game;

(2) The NE of the static authentication game based on thechannel frequency responses is derived. The condition and theuniqueness of the NE is presented;

(3) We propose a spoofing detector that applies Q-learningto achieve the optimal test threshold in the hypothesis testbased on the RSSIs of the radio packets in dynamic environ-ments, and further improves the detection accuracy and utilityof the receiver by learning from the hypothetical experiencesvia the Dyna architecture. The spoofing detections are imple-mented over USRPs and verified over experiments in indoorenvironments.

The rest of this paper is organized as follows. Related workis reviewed in Section II. We describe the system model of thespoofing detection in Section III and formulate the PHY-layerauthentication game in Section IV. The NE of the static gameis investigated in Section V, and the learning-based spoofingdetections are presented in Section VI. Experimental resultsare presented in Section VII. Finally, Section VIII concludesthis work.

II. RELATED WORK

The spatial correlation of RSS was exploited in [3] todetect spoofing attacks. The proximity-based authenticationin [4] uses the RSS variations in proximity tests at mobilestations. The channel impulse responses can be exploited todiscriminate transmitters in wireless networks [5]. The channelstate information was utilized to distinguish radio transmitterseven with similar signal fingerprints in [7]. The time-varyingcarrier frequency offsets between the transmit-receive pairswere exploited in the authentication [19]. The channel-phaseresponses in multi-carrier systems can be used in the PHY-layer authentication in [20].

Indirect reciprocity principle was applied to address a widerange of attacks in wireless networks [14]. Frequency hoppingstrategies in [13] was used by secondary users to update theiranti-jamming strategies with imperfect knowledge. The two-layer game model was introduced in [21] to investigate thejoint threats from the advanced persistent threat attackers andthe insiders. A defense mechanism with stochastic learningwas presented in [22] to address jammers. Reinforcementlearning has been applied in [23] for the mobility controlin wireless networks. The event detection algorithm proposed

in [24] accelerates the event detection in wireless sensor andactor networks, in which reinforcement learning techniqueshelp each actor move towards an event.

In [1], we proposed a PHY-layer spoofing detector based onQ-learning and formulated a PHY-layer authentication game.In this work, we extend the study in [1] by proposing aDyna-Q based spoofing detector to improve the authenticationspeed. In addition, we derive the NE of the static PHY-layerauthentication game and evaluate the performance of the PHY-layer spoofing detectors in experiments with USRPs.

III. SYSTEM MODEL

We consider a wireless network that consists of a receiverand N transmitters, including the potential spoofers thatimpersonate another node with a fake MAC address. Forsimplicity, the MAC address of the i-th transmitter is denotedby ζi ∈ L, where L is the set of MAC addresses, with1 ≤ i ≤ N . The i-th spoofer sends a fake packet in a timeslot with a probability denoted by yi ∈ [0, 1].

Once receiving a packet, the receiver estimates the channelstates associated with the packet. More specifically, the pilotsor preambles of the packet can be used to estimate thechannel response of the corresponding transmitter, centeredat frequency f0 with bandwidth W . The receiver samplesthe channel response at the M tones for each packet in thespectrum [f0−W/2, f0+W/2]. The channel vector (or record)of the k-th packet from the i-th transmitter is denoted byrki =

[rki,m

]1≤m≤M (or rki =

[rki,m

]1≤m≤M ), where rki,m

(or rki,m) is the channel vector (or record) at the m-th tone ofthe k-th packet from the i-th transmitter.

A hypothesis test is performed to determine whether apacket with the channel vector rki is indeed sent by the i-th transmitter. Let ϕ(r) be the MAC address of the nodethat sends a packet with the channel vector r. The nullhypothesis H0 indicates that the packet is indeed sent by thei-th transmitter. The alternative hypothesis H1 represents thatthe real transmitter of the packet is not i, i.e., the packet issent by a spoofer in reality. Thus, the spoofing detection isbased on the hypothesis test given by

H0 : ϕ(rki ) = ζi

H1 : ϕ(rki ) = ζi. (1)

Based on the uniqueness of channel states, the receiverauthenticates the k-th packet based on the received signalstrength indicators. If the channel vector based on the RSSIs,rki , and the channel record, rki , are similar, the packet isassumed to be sent from the i-th transmitter; Otherwise, thepacket is spoofing. The statistic of the hypothesis test in thespoofing detector, denoted by L

(rki , r

ki

), is given by

L(rki , r

ki

)=

∥∥rki − rki∥∥2∥∥rki ∥∥2 , (2)

where ∥·∥ is the Frobenius norm. The test statistic L canbe viewed as the normalized Euclidean distance between thechannel vector rki and the channel record rki . If the test statisticis less than the test threshold denoted by x, the receiver accepts

Page 3: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

3

the null hypothesis H0; Otherwise, the receiver accepts H1.Thus the hypothesis test in the PHY-layer spoofing detectionis given by

LH0

≶H1

x. (3)

According to (2), we have L ≥ 0 and thus x ≥ 0.The false alarm rate, denoted by Pf , is the probability that

a legitimate packet is viewed as a spoofing one, i.e.,

Pf = Pr (H1 |H0 ) , (4)

where Pr (· |· ) is the conditional probability. Similarly, themiss detection rate, denoted by Pm, is the probability thata spoofing packet passes the detection, which is given by

Pm = Pr (H0 |H1 ) . (5)

By (4) and (5), the probability for a receiver to accept alegitimate packet is given by Pr (H0 |H0 ) = 1 − Pf and theprobability to reject a spoofing packet is Pr (H1 |H1 ) = 1 −Pm. The detection accuracy of the PHY-layer authenticationin (3) depends on the test threshold x: A large test thresholdincreases the miss detection rate of the spoofing detection,while a small x increases the false alarm rate. Therefore, itis critical for the receiver to choose a proper test threshold inthe spoofing detection.

The receiver applies the higher-layer authentication to pro-cess the packets that pass the PHY-layer authentication. Apacket is accepted if and only if both the PHY-layer andhigher-layer authentications accept it. The channel record, rki ,is updated once a packet from transmitter i is accepted bythe higher-layer authentication, i.e., rki ← rki ; Otherwise,rki ← rk−1

i . For ease of reference, important notations aresummarized in Table I.

IV. PHY-LAYER SPOOFING DETECTION GAME

The one-slot interaction in the PHY-layer spoofing detectionin (3) can be formulated as a zero-sum game consisting ofthe N spoofers and the receiver. The receiver applies thePHY-layer authentication to detect spoofing attacks, whileeach spoofer sends packets using the MAC address of alegitimate transmitter. The receiver chooses the test threshold,x ∈ [0,∞), in the hypothesis test to detect the spoofing.The i-th spoofer chooses its spoofing frequency, denoted byyi ∈ [0, 1], 1 ≤ i ≤ N . The set of spoofing probabilitiesof all the N spoofers is denoted by y = [yi]1≤i≤N . TheN cooperative spoofers sent packets without collisions with∑Ni=1 yi ≤ 1. As no more than one spoofer attacks in a time

slot, the probability for the receiver to obtain a spoofing packetis∑Ni=1 yi.

The utility of the receiver depends on the spoofing detectionaccuracy. The payoff that a receiver obtains by accepting alegitimate packet (or rejecting a spoofing one) is denoted byG1 (or G0). The cost for a receiver to falsely reject a legitimatepacket (or accepting a spoofing one) is denoted by C1 (or C0).The Bayesian risk [17] of the spoofing detection under a prior

TABLE I: Summary of Important Symbols

Symbols NotationsN Number of spoofersyi Spoofing probability of the i-th spooferW BandwidthM Number of tonesrki Channel vector of the k-th packet claiming to be

sent by the transmitter irki Channel record for transmitter iL Test statisticPf False alarm ratePm Miss detection ratex Test thresholdG1/0 Payoff by accepting a legitimate packet (or reject-

ing a spoofing one)C1/0 Cost if falsely rejecting a legitimate packet (or

accepting a spoofing one)us/r(x,y) Utility of the spoofer (or receiver)σ2 Average power gain from the legitimate transmitter

to the receiverρ SINR of the packets sent by the legitimate trans-

mitterb Relative change in the channel gainκ Ratio of the channel gain of the spoofer to that of

the legitimate transmitterT Number of packets received in each time slotUn Sum utility of the receiver in n-th time slotµ ∈ (0, 1] Learning rate of Q-learningδ ∈ (0, 1] Discount factor of Q-learnings State observed by the receiverQ (s, x) Q-function of the receiver choosing threshold x in

sV (s) Best threshold to maximize Q value of the receiver

in sε Probability that the receiver chooses the subopti-

mal actionsΦ Occurrence count vector of each state-action pairΦ′ Occurrence count vector of the next stateR Modeled reward functionR′ Reward recordΠ Probability that the system reaches the next stateJ Additional Q-function updating times

distribution of the spoofing attacks, denoted by Ξ(x,y), isgiven by

Ξ(x,y) =(G1

(1− Pf (x)

)− C1Pf (x)

)(1−

N∑i=1

yi

)

+(G0

(1− Pm(x)

)− C0Pm(x)

) N∑i=1

yi, (6)

where the first term corresponds to the gain from a legitimatepacket, while the second term presents the gain under aspoofing packet.

In the zero-sum game, the utility of the spoofer (or re-ceiver) denoted by us(x,y) (or ur(x,y)) follows us(x,y) =−ur(x,y). Based on the Bayesian risk in (6), the utilities of

Page 4: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

4

the players are given by

ur(x,y) = −us(x,y) = Ξ(x,y)

= G1 + (G0 −G1)

N∑i=1

yi

− (G1 + C1)Pf (x)

(1−

N∑i=1

yi

)

− (G0 + C0)Pm(x)

N∑i=1

yi. (7)

A. Authentication based on Channel Frequency Responses

As a concrete example, we consider the spoofing detector in[10] based on the channel frequency responses associated withthe packets instead of their RSSIs. In this case, the receiverobtains a channel vector for the k-th packet from transmitter i,denoted by Hk

i , and stores the channel records for transmitteri, denoted by Hk

i . Assume small channel time variations,small estimation errors, zero phase drift between the channelmeasurements, and the frequency-selective Rayleigh channelmodels. The generalized likelihood ratio test, denoted by L′,is chosen in [10] by

L′ =∥∥∥Hk

i − Hki

∥∥∥2. (8)

The false alarm rate and the miss detection rate of thehypotheses test as in the spoofing detection in [10] are givenby

Pf (x) = 1− Fχ22M

(2xρ

2σ2 + bρσ2

)(9)

Pm(x) = Fχ22M

(2xρ

2σ2 + (1 + κ)ρσ2

), (10)

where Fχ22M

(·) is the cumulative distribution function of thechi-square distribution with 2M degrees of freedom, σ2 isthe average power gain from the legitimate transmitter atthe receiver, ρ is the signal-to-interference-plus-noise ratio(SINR) of the packets sent by the legitimate transmitter, b isthe relative change in the channel gain due to environmentalchanges, and κ is the ratio of the channel gain of the spooferto that of the legitimate transmitter.

The PHY-layer spoofing detection game based on the chan-nel frequency responses with a single spoofer, denoted byG = ⟨{r, s} , {x, y} , {ur, us}⟩, consists of a receiver (r) and aspoofer (s). The receiver chooses its test threshold, x ∈ [0,∞),while the spoofer determines its attack frequency, y ∈ [0, 1].The utilities of the players in the zero-sum game are given by(7).

V. NASH EQUILIBRIUM IN THE AUTHENTICATION GAME

The Nash equilibrium of a game consists of the best-response strategies, i.e., no player can increase its utility byunilaterally choosing a different strategy [18]. The NE of thestatic PHY-authentication game G is denoted by (x∗, y∗). Thereceiver chooses the test threshold x∗ to maximize its utility

ur(x, y∗) in the spoofing detection, while the spoofer aims to

maximize its utility us(x∗, y). Therefore, we have

x∗ = argmaxx≥0

ur(x, y∗) (11)

y∗ = arg max0≤y≤1

us(x∗, y). (12)

Lemma 1. If b ≤ κ + 1, the unique NE of the static PHY-authentication game G is given by

x∗ = solx

(G1 −G0 − Pf (x)(G1 + C1)

+ Pm(x)(G0 + C0) = 0), (13)

where sol(·) is the solution of the equation, and

y∗ =

(1 +

G0 + C0

G1 + C1

(2 + bρ

2 + (1 + κ)ρ

)Me

(κ+1−b)ρ2x∗

σ2(2+bρ)(2+(1+κ)ρ)

)−1

.

(14)

Otherwise, if b > κ+ 1, no NE exists in the game G.

Proof. See Appendix A.

According to Lemma 1, the NE of the game depends on therelative channel time variation (b) and the ratio of the channelgains of the spoofer to the legitimate node (κ). Under smallrelative channel time variations (i.e., b ≤ κ + 1), both thereceiver and spoofer choose their strategies according to thepayoffs of the receiver in the spoofing detection. Otherwise,under large channel time variations (i.e., b > κ + 1), thechannel responses can not be used as the fingerprint of radiochannels to detect spoofing and thus the receiver does not havean optimal test threshold.

Corollary 1. If b = κ+1, the spoofing detection performanceof the static authentication game G at the NE is given by

Pf = 1− Pm =G1 + C0

G1 + C1 +G0 + C0. (15)

Proof. If b = κ + 1, by (9) and (10), we have Pf (x∗) =

1− Pm(x∗). By (13), we have (15).

As indicated in (15), the false alarm rate increases withboth G1 and C0, while the miss detection rate decreases withthem. Under the high cost to accept a spoofing packet and thehigh payoff to accept a legitimate packet, the spoofer attacksmore frequently and thus the receiver chooses a lower testthreshold to reject the spoofing packets, resulting in a highfalse alarm rate. Similarly, if both the cost to reject a legitimatepacket and the payoff to reject a spoofing packet are high, thetest threshold increases, yielding a small spoofing probability.Consequently, the false alarm rate decreases with G0 and C1,while the miss detection rate increases with them.

VI. SPOOFING DETECTION WITH REINFORCEMENTLEARNING

Reinforcement learning techniques such as Q-learning andDyna-Q can be used to find the optimal strategy in a dynamicenvironment with incomplete information [16]. In a dynamicradio environment with receivers unaware of the channelmodel and spoofing frequency, the optimal test threshold in the

Page 5: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

5

spoofing detection can be achieved by the receiver via trial-and-error. In general, the optimal authentication threshold x∗

decreases with the attack frequency.

A. Authentication with Q-learning

As a simple reinforcement learning technique, Q-learningenables each agent to learn its optimal strategy in dynamicenvironments. In the spoofing detection with Q-learning, thereceiver builds the hypothesis test in (3) to determine thesender for each of the T packets received in the time slot.The test threshold x is chosen from K + 1 levels, i.e.,x ∈ {l/K}0≤l≤K . The state observed by the receiver at timen, denoted by sn, consists of the false alarm rate and missdetection rate of the spoofing detection at time n − 1, i.e.,sn =

[Pn−1f , Pn−1

m

]∈ S, where S is the set of the states

observed by the receiver. For simplicity, both the error ratesare quantized into X + 1 levels, i.e., Pf , Pm ∈ {l/X}0≤l≤X .The receiver chooses its action xn based on the state sn tomaximize its expected sum utility, denoted by Un, which isgiven by

Un =nT∑

k=(n−1)T+1

ukr (x,y), (16)

where ukr is the immediate utility given by (7).The spoofing detection with Q-learning depends on the

learning rate, denoted by µ ∈ (0, 1], which indicates the weightof the current Q-function, denoted by Q(sn, xn). The discountfactor denoted by δ ∈ (0, 1] represents the uncertainty on therewards in the future. The value of the state s, denoted byV (s), is the maximum value of the Q-function. The receiverupdates its Q-function as follows:

Q(sn, xn)← (1− µ)Q(sn, xn) + µ (Un + δV (sn+1)) (17)V (sn)← max

x∈{ lK }0≤l≤K

Q (sn, x) . (18)

The optimal test threshold x∗ is chosen by

x∗ = arg maxx∈{ l

K }0≤l≤K

Q (sn, x) . (19)

Based on the ε-greedy policy, the receiver chooses the sub-optimal actions with a small probability ε, while the optimalaction that maximizes the utility is chosen with probability1− ε. Thus

Pr (x = x) =

{1− ε, x = x∗

εK , x ∈ { lK }0≤l≤K , x = x∗

. (20)

The spoofing detection with Q-learning is summarized inAlgorithm 1.

B. Authentication with Dyna-Q

As an extension of Q-learning, Dyna-Q applies the Dynaarchitecture in [16] to formulate a learned world model thatconsists of the major functions of the on-line planning receiver.By obtaining the hypothetical experiences from the worldmodel, Dyna-Q increases the learning speed in a dynamicenvironment with unknown parameters. The spoofing detection

Algorithm 1 Spoofing detection with Q-learning.

1: Initialize: ε, µ, δ, Q (s, x) = 0, V (s) = 0,∀x ∈ {l/K}0≤l≤K

2: for n = 1, 2, 3, ... do3: Observe the current state sn4: Select a threshold xn via (20)5: for k = 1 to T do6: Read the MAC address ζi of the k-th packet7: Extract ri and ri8: Calculate L via (2)9: if (L ≤ xn and the k-th packet passes the higher-layer

authentication) then10: ri ← ri11: Accept the k-th packet12: else13: Send spoofing alarm14: end if15: end for16: Observe sn+1 and Un

17: Update Q (sn, xn) via (17)18: Update V (sn) via (18)19: end for

with Dyna-Q can improve the performance over Q-learning.As shown in Algorithm 2, the receiver first applies Q-learningto obtain real experiences in the spoofing detection.

At time n, the receiver observes the false alarm rate and missdetection rate of the spoofing detection at the last time slot,i.e., sn =

[Pn−1f , Pn−1

m

]∈ S. Based on state sn, the receiver

applies the test threshold xn chosen based on -greedy policyin (20) in the spoofing detection for the T packets received in atime slot, and then observes the resulting security performanceto estimate its immediate utility and update its sum utility Unas in Eq. (16). The real experiences in the n-th time slot aregiven by (sn, xn, sn+1, Un). Similar to Q-learning, the receiverupdates the Q-function via Eqs. (17) and (18).

After obtaining real experiences, the receiver updates theexperience records for each state-action pair, which consist ofthe occurrence count vector, Φ, the occurrence count vector ofthe next state, Φ′, the modeled reward function, R, the rewardrecord, R′, and the state transition probability, Π. The countvector Φ′ for the current experience increases by 1, i.e.,

Φ′ (sn, xn, sn+1)← Φ′ (sn, xn, sn+1) + 1. (21)

The occurrence count vector Φ consists of all the possiblerealizations of sn+1, i.e.,

Φ(sn, xn)←∑s′∈S

Φ′ (sn, xn, s′). (22)

The reward record R′ is based on the sum utility in (16), whichis given by

R′ (sn, xn,Φ(sn, xn))← Un. (23)

Thus the modeled reward function is the average over all theoccurrence realizations,

R (sn, xn)←1

Φ (sn, xn)

Φ(sn,xn)∑ψ=1

R′ (sn, xn, ψ). (24)

Page 6: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

6

Algorithm 2 Spoofing detection with Dyna-Q.

1: Initialize: ε, µ, δ, J , Q (s, x) = 0, V (s) = 0, Φ(s, x) = 0,Φ′ (s, x, s′) = 0,

2: R′ (s, x,Φ(s, x, s′)) = 0, R (s, x) = 0, Π(s, xj , s′) = 0,

∀x ∈ {l/K}0≤l≤K , s, s′ ∈ S

3: for n = 1, 2, 3, ... do4: Authenticate the received T packets as Step 3-18 in Algorithm

15: Update Φ′ (sn, xn, sn+1) via (21)6: Update Φ(sn, xn, ) via (22)7: Update the state transition probability function

Π(sn, xn, sn+1) via (25)8: Update the reward record R′ (sn, xn,Φ(sn, xn)) via (23)9: Update the reward function R (sn, xn) via (24)

10: for j = 1 to J do11: Randomly select a state-action pair (sj , xj)12: Select the next state sj+1 via Π(sj , xj , s)

13: Obtain the reward Uj = R (sj , xj)

14: Update Q (sj , xj) via (26)15: Update V (sj) via (27)16: end for17: end for

The state transition probability from the current state, sn, withaction xn to the next state, sn+1, maps the current state-action pair (sn, xn) to the distribution of the next state sn+1.More specifically, the probability for the system to reach thestate sn+1 from the state-action pair (sn, xn), denoted byΠ(sn, xn, sn+1) ∈ Π, is updated by

Π(sn, xn, sn+1)←Φ′ (sn, xn, sn+1)

Φ (sn, xn). (25)

Next, the receiver uses these real experience records(Φ,Φ′, R,R′,Π) to build the Dyna architecture to obtainthe hypothetical experience. In the Dyna architecture, thereceiver performs J additional Q-function updating processesin the modeled environment. In the j-th updating process, thereceiver first randomly and repeatedly chooses a state-actionpair (sj , xj) to try all the actions at all the states. The modeledsystem updates its state based on the state transition probabilityΠ in (25). Based on the reward function R in (24), the receiverupdates its modeled reward, Uj , in the state-action pair (sj ,xj). According to the next state and the modeled reward, thereceiver updates its Q-function by

Q(sj , xj)← (1− µ)Q(sj , xj) + µ (Uj + δV (sj+1)) (26)V (sj)← max

x∈{ lK }0≤l≤K

Q (sj , x) . (27)

By repeating the Q-function updating processes J times,Q(s, x) converges faster than that with Q-learning. The pa-rameter J weighs the real experiences. If J is so large that thereal experiences are negligible, the modeled Dyna architecturemay deviate from the real wireless system. On the other hand,the convergence speed of the detection is slow under a smallJ .

VII. PERFORMANCE EVALUATION

Simulations were performed to evaluate the NE strategy ofthe static spoofing detection game under various scenarios.Experiments over USRPs also have been performed to evaluatethe spoofing detections in dynamic spoofing detection games.

A. Numerical Results

The NE of the static spoofing detection game G wasevaluated via simulations with G1 = G0 = 6, C1 = 2,C0 = 4, σ = 1 and M = 10. As shown in Fig. 1(a), theoptimal test threshold increases with the channel time variationb to avoid rejecting legitimate packets, as the test statistic in(2) increases with it. As the test statistic in the presence ofspoofer increases with the channel time variation index b, aspoofer is more likely to fail under large channel variations.Thus the optimal attack probability y∗ decreases with b, asshown in Fig. 1(b). In Fig. 1(c), both the false alarm rate and

0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.21

2

3

4

5

6

7

8

Relative time variation power, b

Opt

imal

test

thre

shol

d, x

*

κ=-3 dB, ρ=10 dBκ=-3 dB, ρ=20 dBκ=0 dB, ρ=10 dB

(a) Optimal test threshold, x∗

0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.20.6

0.62

0.64

0.66

0.68

0.7

0.72

0.74

0.76

0.78

Relative time variation power, b

Opt

imal

atta

ck p

roba

bilit

y, y

*

κ=-3 dB, ρ=10 dBκ=-3 dB, ρ=20 dBκ=0 dB, ρ=10 dB

(b) Optimal attack probability, y∗

Page 7: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

7

0 0.002 0.004 0.006 0.008 0.01 0.01210

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

Miss detection rate

Fals

e al

arm

rat

e

κ=-3 dB, ρ=10 dBκ=-3 dB, ρ=20 dBκ=0 dB, ρ=10 dB

(c) Error rates in the detection

0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.25.88

5.9

5.92

5.94

5.96

5.98

6

6.02

Relative time variation power, b

Util

ity o

f th

e re

ceiv

er

κ=-3 dB, ρ=10 dBκ=-3 dB, ρ=20 dBκ=0 dB, ρ=10 dB

(d) Utility of the receiver

Fig. 1: Performance of the spoofing detection game at the NE withσ = 1 and M = 10.

miss detection rate of the spoofing detection at the NE increasewith the channel variation index b, because it is challengingto discriminate transmitters according to their channel statesunder significant radio environmental changes. If the ratio ofthe channel gains of the spoofer to the legitimate node ishigh, the spoofer and the legitimate transmitter have the quitedifferent power levels, which improves the detection accuracy.As the channel estimation error at the receiver decreases withSINR, both the false alarm rate and miss detection rate ofthe PHY-layer spoofing detection decrease with SINR. Evenif κ = −3 dB, b = 0.2, and ρ = 10 dB, the spoofingdetection still achieves good performance with Pf = 1.5% andPm = 1.19%. Fig. 1(d) shows that the utility of the receiverincreases with κ and ρ, as the detection accuracy increasescorrespondingly. For example, if b = 0.2 and ρ = 10 dB, the

#12(8, 3.3)

12 m

9.5

m

(0,0)

Receiver

(3.3, 4.3)

Transmitter

#2(1.3, 6.7)

#10(7.8, 7.3)

#4(1.3,3.9)

#5(1.3,3.4)

#1(1.3, 8.5)

#3(1.3, 5.4)

#6 (4, 8.6)

#8(4.2, 6.5)

#9(3.1, 5.7)

#7 (3.3, 7.3)

#11(7.2, 6.2)

Fig. 2: Network topology of the experiments in a 12 × 9.5 × 3 m3

office room, consisting of 12 transmitters and a receiver.

0 1 2 3 4 5 6

x 104

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

Time slot

Nor

mal

ized

Euc

lidea

n di

stan

ce

Min=0.0185

Max=0.1325

Legitimate packetsSpoofed packets

Fig. 3: Test statistic of the PHY-layer spoofing detection with W =

200 MHz and M = 5, in which the nodes located at #2, #7, #10 and#12 in the topology as shown in Fig. 2 send spoofing packets.

utility of the receiver for κ = 0 dB increases to 5.96 from5.88 for κ = −3 dB.

B. Experimental Results

The proposed spoofing detection schemes were implement-ed on USRPs and experiments were performed in an in-door environment. As benchmark, we considered the spoofingdetection with a fixed threshold. In the experiments, weconsidered 12 transmitters in a 12 × 9.5 × 3 m3 office roomas shown in Fig. 2, with G1 = C1 = 6, G0 = 9, C0 = 4,f0 = 2.4 GHz, M = 5, y = 0.25, µ = 0.8, δ = 0.7, ε = 0.1,X = 29 and J = 10. As shown in Fig. 3, the maximum

Page 8: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

8

0 500 1000 15000.01

0.02

0.03

0.04

0.05

0.06

0.07

0.08

0.09

Time slot

Tes

t thr

esho

ld

Q−Learning

(a) Threshold in the spoofing detection

0 500 1000 15005

5.5

6

6.5

7

7.5

8

8.5

Time slot

Util

ity o

f the

rec

eive

r

Q−LearningFixed

(b) Utility of the receiver

Fig. 4: Performance of the spoofing detection with W = 200 MHz,M = 5 and the legitimate node located at #10 and spoofers locatedat #2, #7 and #12 in the topology in Fig. 2.

test statistic of the legitimate packets in an experiment with6 transmitters is 0.1325, while the minimum test statistic ofspoofing packets is 0.0185. Thus, the action set of the receiverin the experiment was set between 0.01 and 0.14.

As shown in Fig. 4, the spoofing detection with Q-learningreaches a stable utility that is higher than the fixed thresholdsoon after the starting of the game. For instance, the utilityof the receiver with Q-learning is 14.7% higher than that withthe fixed test threshold after 1500 time slots with W = 200MHz and M = 5. Fig. 4(a) shows that the optimal thresholdachieved by the spoofing detection with Q-learning is about0.023.

As shown in Fig. 5(a), the spoofing detection with Dyna-Qhas lower error rates than that with Q-learning, and both have

50 100 150 2000

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

Bandwidth (MHz)

Ave

rage

err

or r

ates

P

f, Q

Pf, Fixed

Pf, Dyna−Q

Pm

, Q

Pm

, Fixed

Pm

, Dyna−Q

(a) Average error rates

50 100 150 2005

5.5

6

6.5

7

7.5

8

Bandwidth (MHz)

Ave

rage

util

ity

QFixedDyna−Q

(b) Average utility of the receiver

Fig. 5: Performance of the PHY-layer spoofing detector in the indoorenvironment with M = 5, the legitimate node located at #10 andspoofers located at #2, #7 and #12 in the topology as shown in Fig.2.

better detection accuracy than that with a fixed threshold. Forexample, the miss detection rate and the false alarm rate ofthe spoofing detection with Q-learning are reduced by 61.72%and 93.33% than the fixed threshold strategy with W = 200MHz and M = 5. As shown in Fig. 5(b), the detection withDyna-Q leads to the highest utility of the receiver and thatwith Q-learning also improves the utility compared with thebenchmark detector. For instance, the average utility of thereceiver with Q-learning increases by 22.44% from that ofthe fixed threshold, if W = 150 MHz and M = 5, which isfurther improved by 0.79% by Dyna-Q, as Dyna-Q increasesthe learning speed of the detector.

As shown in Fig. 6, the average error rates and utility of

Page 9: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

9

2 3 4 5 6 7 80

0.05

0.1

0.15

0.2

0.25

0.3

0.35

Number of nodes

Ave

rage

err

or r

ates

Pf, Q

Pf, Fixed

Pf, Dyna−Q

Pm

, Q

Pm

, Fixed

Pm

, Dyna−Q

(a) Average error rates

2 3 4 5 6 7 85.5

6

6.5

7

7.5

8

8.5

Number of nodes

Ave

rage

util

ity

QFixedDyna−Q

(b) Average utility of the receiver

Fig. 6: Performance of the PHY-layer spoofing detector in the indoorenvironment with W = 200 MHz, M = 5 and the legitimate nodelocated at #10 and spoofers located at #1-12 in the topology as shownin Fig. 2.

the spoofing detectors decrease graciously with the number ofnodes. For example, if W = 200 MHz, M = 5 and N = 8,the miss detection rate of the spoofing detector with Dyna-Q is 6.9%, while that with Q-learning is 7.9%, with the falsealarm rates being less than 5‰. The utility of the receiver withDyna-Q is 1.28% higher than that with Q-learning in this case.

VIII. CONCLUSION

In this paper, we have formulated the interactions betweena receiver and spoofers as a zero-sum spoofing detectiongame. We have derived the NE in the static spoofing de-tection game and discussed the uniqueness of the NE. ThePHY-authentication method based on Q-learning and Dyna-Q

was proposed for a dynamic radio environment. Simulationresults show that the spoofing detection is robust againstenvironmental changes. Experimental results over USRPs inan indoor environment demonstrate that the proposed spoofingdetection scheme with Q-learning can efficiently improve theauthentication performance. For example, the average errorrate of the proposed scheme is less than 5%, while that witha fixed threshold is more than 14%, when the bandwidth is200 MHz and the number of nodes is 4. As the spoofing de-tection scheme with Dyna-Q increases the learning speed overwith Q-learning, the authentication performance is efficientlyimproved. For example, when the bandwidth is 100 MHz andthe number of nodes is 4, the average utility of the receiverwith the threshold strategy based on Q-learning is improvedby 4.3% by the Dyna-Q based detector.

APPENDIX APROOF OF Lemma 1

According to (9) and (10), we have Pf (0) = 1, Pm(0) = 0,limx→∞

Pf (x) = 0, limx→∞

Pm(x) = 1 and

dPf (x)

dx= − xM−1e

− xσ2(2/ρ+b)

(σ2 (2/ρ+ b))M

Γ (M)(28)

dPm(x)

dx=

xM−1e− x

σ2(2/ρ+1+κ)

(σ2 (2/ρ+ 1 + κ))M

Γ (M), (29)

where Γ(τ) =∫∞0φτ−1e−φdφ.

By (7), we have

∂us(x, y)

∂y= G1 −G0 − Pf (x)(G1 + C1) + Pm(x)(G0 + C0),

(30)

indicating that us(x, y) is a linear function of y. By(30), we have ∂us(0, y)/∂y = −G0 − C1 < 0 andlimx→∞

∂us(x, y)/∂y = G1 + C0 > 0.By Eqs. (28), (29) and (30), we have

∂2us(x, y)

∂y∂x=xM−1e

−x

σ2( 2ρ+b)

σ2MΓ(M)

×

G1 + C1

( 2ρ + b)M+

(G0 + C0)e

(κ+1−b)x/σ2

( 2ρ+b)( 2

ρ+1+κ)

( 2ρ + 1 + κ)M

≥ 0, (31)

indicating that ∂us(x, y)/∂y increases with x. As∂us(0, y)/∂y < 0 and lim

x→∞∂us(x, y)/∂y > 0, the solution

of ∂us(x, y)/∂y = 0, denoted by x, is unique and positive. If0 ≤ x < x, we have ∂us(x, y)/∂y < 0. Otherwise, if x > x,we have ∂us(x, y)/∂y > 0.

Next, by Eqs. (7), (28) and (29), we have

∂ur(x, y)

∂x=xM−1e

−x/σ2

2ρ+b

σ2MΓ(M)

(ξ1 − ξ2e

(κ+1−b)x/σ2

( 2ρ+b)( 2

ρ+1+κ)

), (32)

where ξ1 = (G1+C1)(1−y)(2/ρ+b)M

and ξ2 = (G0+C0)y(2/ρ+1+κ)M

.

Page 10: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

10

1) If b < κ+ 1: As ∂us(x, y)/∂y = 0, us(x, y) is constantfor any y ∈ [0, 1], i.e., y∗ can be any value in [0, 1]. Let ybe the solution of ∂ur(x, y)/∂x = 0, which is given by (14)after simplification. If y = y, we have ξ1 > ξ2. By (32), wehave ∂ur(x, y)/∂x > 0 for 0 < x < x and ∂ur(x, y)/∂x < 0for x > x, indicating that x∗ = x, if y∗ = y. Thus, we have(x∗, y∗) = (x, y).

2) If b = κ+ 1: As ∂us(x, y)/∂y = 0, us(x, y) is constantwith y ∈ [0, 1]. It is clear by (14) that ∂ur(x, y)/∂x = 0,indicating that ur(x, y) is constant with x ≥ 0. Thus, we have(x∗, y∗) = (x, y).

The uniqueness of the NE for b ≤ κ + 1 is proved bycontradictions. Assume that there exists another NE (x1, y1) =(x∗, y∗). If x1 < x∗, we have ∂us(x1, y)/∂y < 0 and thusy1 = 0. By (32), we have ∂ur(x, 0)/∂x ≥ 0, i.e., ur(x, y1)increases with x. Thus ur(x1, y1) < ur(x

∗, y1), contradictingto the assumption that (x1, y1) is NE. If x1 > x∗, we have∂us(x1, y)/∂y > 0, yielding y1 = 1. By (32), we have∂ur(x, y1)/∂x ≤ 0, i.e., ur(x, y1) decreases with x. Thusur(x1, y1) < ur(x

∗, y1), contradicting to the assumption.Thus, (x∗, y∗) is the unique NE in this game.

3) If b > κ + 1: Similar to Case 2, if x∗ = x, no NEexists. Otherwise, if x∗ = x, we have ∂ur(x∗, y∗)/∂x = 0.In addition, ∂ur(x, y∗)/∂x > 0, ∀ 0 < x < x, and∂ur(x, y

∗)/∂x < 0, ∀ x > x. However, by (14), we have∂ur(x

∗, y∗)/∂x = 0. By (32), we have ∂ur(x, y∗)/∂x < 0for 0 < x < x, and ∂ur(x, y∗)/∂x > 0 for x > x, indicatingthat x∗ = x. Thus, no NE exists in this case.

In summary, we have Lemma 1.

REFERENCES

[1] L. Xiao, Y. Li, G. Liu, Q. Li, and W. Zhuang, “Spoofing detectionwith reinforcement learning in wireless networks,” in Proc. IEEE GlobalCommun. Conf. (GLOBECOM). San Diego, CA, 2015.

[2] K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authenti-cation and identification in wireless networks,” IEEE Wireless Commun.,vol. 17, no. 5, pp. 56–62, 2010.

[3] J. Yang, Y. Chen, W. Trappe, and J. Cheng, “Detection and localizationof multiple spoofing attackers in wireless networks,” IEEE Trans.Parallel and Distributed Syst., vol. 24, no. 1, pp. 44–58, 2013.

[4] A. Kalamandeen, A. Scannell, E. Lara, A. Sheth, and A. LaMarca,“Ensemble: Cooperative proximity-based authentication,” in Proc. Int’lConf. Mobile Syst., Applications and Services, 2010, pp. 331–344.

[5] F. Liu, X. Wang, and H. Tang, “Robust physical layer authenticationusing inherent properties of channel impulse response,” in Proc. MilitaryCommun. Conf. (MILCOM), 2011, pp. 538–542.

[6] F. Liu, X. Wang, and S. Primak, “A two dimensional quantizationalgorithm for CIR-based physical layer authentication,” in Proc. IEEEInt’l Conf. Commun. (ICC), 2013, pp. 4724–4728.

[7] H. Liu, Y. Wang, J. Liu, J. Yang, and Y. Chen, “Practical user authenti-cation leveraging channel state information (CSI),” in Proc. ACM Symp.Inform., Computer and Commun. Security, 2014, pp. 389–400.

[8] J. Tugnait, “Wireless user authentication via comparison of powerspectral densities,” IEEE J. Sel. Areas in Commun., vol. 31, no. 9, pp.1791–1802, 2013.

[9] Z. Jiang, J. Zhao, X. Li, J. Han, and W. Xi, “Rejecting the attack: Sourceauthentication for WiFi management frames using CSI information,”in Proc. IEEE Int’l Conf. Computer Commun. (INFOCOM), 2013, pp.2544–2552.

[10] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Fingerprints inthe ether: Using the physical layer for wireless authentication,” in Proc.IEEE Int’l Conf. Commun. (ICC), 2007, pp. 4646–4651.

[11] L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. Greenstein, andN. Mandayam, “PHY-authentication protocol for spoofing detection inwireless networks,” in Proc. IEEE Global Commun. Conf. (GLOBE-COM), 2010, pp. 1–6.

[12] W. Conley and A. Miller, “Cognitive jamming game for dynamicallycountering ad hoc cognitive radio networks,” in Proc. IEEE MilitaryCommun. Conf. (MILCOM), 2013, pp. 1176–1182.

[13] Y. Wu, B. Wang, K. Liu, and T. Clancy, “Anti-jamming games in multi-channel cognitive radio networks,” IEEE J. Sel. Areas in Commun.,vol. 30, no. 1, pp. 4–15, 2012.

[14] L. Xiao, Y. Chen, W. Lin, and K. Liu, “Indirect reciprocity securitygame for large-scale wireless networks,” IEEE Trans. Inform. Forensicsand Security, vol. 7, no. 4, pp. 1368–1380, 2012.

[15] Y. Gwon, S. Dastangoo, C. Fossa, and H. Kung, “Competing mobilenetwork game: Embracing anti-jamming and jamming strategies withreinforcement learning,” in Proc. IEEE Conf. Commun. and NetworkSecurity, 2013, pp. 28–36.

[16] R. Sutton and A. Barto, Reinforcement learning: An introduction. MITpress, 1998.

[17] A. Sage and J. Melsa, Estimation theory with applications to communi-cations and control. New York: McCraw-Hill, 1971.

[18] D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991.[19] W. Hou, X. Wang, J. Chouinard, and A. Refaey, “Physical layer

authentication for mobile systems with time-varying carrier frequencyoffsets,” IEEE Trans. Commun., vol. 62, no. 5, pp. 1658–1667, 2014.

[20] X. Wu and Z. Yang, “Physical-layer authentication for multi-carriertransmission,” IEEE Commun. Lett., vol. 19, no. 1, pp. 74–77, 2015.

[21] P. Hu, H. Li, H. Fu, D. Cansever, and P. Mohapatra, “Dynamic defensestrategy against advanced persistent threat with insiders,” in Proc. IEEEConf. Computer Commun. (INFOCOM), 2015, pp. 747–755.

[22] S. Bhunia, S. Sengupta, and F. Vazquez-Abad, “CR-honeynet: A learningand decoy based sustenance mechanism against jamming attack inCRN,” in Proc. IEEE Military Commun. Conf. (MILCOM), 2014, pp.1173–1180.

[23] K. Ota, M. Dong, Z. Cheng, J. Wang, X. Li, and X. Shen, “ORACLE:Mobility control in wireless sensor and actor networks,” ComputerCommunications, vol. 35, no. 9, pp. 1029–1037, 2012.

[24] M. Dong, K. Ota, H. Li, S. Du, H. Zhu, and S. Guo, “RENDEZVOUS:Towards fast event detecting in wireless sensor and actor networks,”Computing, vol. 96, no. 10, pp. 995–1010, 2014.

Liang Xiao (M’09-SM’13) received the B.S. degreein communication engineering from the Nanjing U-niversity of Posts and Telecommunications, Nanjing,China; the M.S. degree in electrical engineeringfrom Tsinghua University, Beijing, China; and thePh.D. degree in electrical engineering from RutgersUniversity, New Brunswick, NJ, USA, in 2000,2003, and 2009, respectively. She is currently aProfessor with the Department of Communication

Engineering, Xiamen University, Fujian, China. Her current research interestsinclude network security, and wireless communications.

Page 11: PHY-layer Spoofing Detection with Reinforcement Learning in ... · in wireless networks. The event detection algorithm proposed in [24] accelerates the event detection in wireless

11

Yan Li (S’15) received the B.S. degree in Electron-ic and Information engineering from HeilongjiangBayi Agricultural University, Daqing, China, in2013. She is currently pursuing the M.S. degree withthe Department of Communication Engineering, X-iamen University, Xiamen, China. Her research in-terests include network security and wireless com-munications.

Guoan Han (S’15) received the B.S. degree in com-munication engineering from Southwest JiaotongUniversity, Chengdu, China, in 2015. He is currentlypursuing the M.S. degree with the Department ofCommunication Engineering, Xiamen University, X-iamen, China. His research interests include networksecurity and wireless communications.

Guolong Liu (S’15) received the B.S. degree incommunication engineering from Hunan Institute ofScience and Technology, Yueyang, China, in 2013.He is currently pursuing the M.S. degree with theDepartment of Communication Engineering, Xia-men University, Xiamen, China. His research inter-ests include network security and wireless commu-nications.

Weihua Zhuang (M’93-SM’01-F’08) has been withthe Department of Electrical and Computer Engi-neering, University of Waterloo, Canada, since 1993,where she is a Professor and a Tier I Canada Re-search Chair in Wireless Communication Networks.Her current research focuses on resource allocationand QoS provisioning in wireless networks, and onsmart grid. She is a co-recipient of several best paperawards from IEEE conferences. Dr. Zhuang was the

Editor-in-Chief of IEEE Transactions on Vehicular Technology (2007-2013),and the Technical Program Co-Chair of the IEEE VTC Fall 2016. She is aFellow of the IEEE, a Fellow of the Canadian Academy of Engineering, aFellow of the Engineering Institute of Canada, and an elected member in theBoard of Governors and VP Publications of the IEEE Vehicular TechnologySociety.