International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.11, No.4, Aug. 2021

CNN-based Security Authentication for Wireless Multimedia Devices

Full Text (PDF, 803KB), PP.1-10

Views:0   Downloads:0


Gautham SK, Anjan K Koundinya

Index Terms

Wireless Multimedia Networks, Security, Neural Networks, Gaussian Noise, Convolutional Layer.


Security is a major concern for wireless multimedia networks because of their role in providing various services. Traditional security techniques have inadequacies in identifying emerging security threats and also lacks in computing efficiency. Furthermore, conventional upper-layer authentication doesn’t provide any protection for physical layer, thus leading to leakage of privacy data. Keep these issues in mind, the paper has envisioned an artificial intelligence-based security authentication system that is lightweight, adaptive and doesn’t require any explicit programming. The neural network is built on convolutional filters which explore the data and learns the features or characteristic of the data. With this learned feature, the model will be able to recognize whether a wireless multimedia device present in a network is legitimate or not. Experimental analysis and validation have been performed on the trained model and ensure that the authentication of wireless multimedia devices can be achieved and also ensuring lightweight authentication system, which ensures less computation needs. The different neural model is also trained using gaussian noise of different standard deviation so that it can be used in a practical scenario like smart industry etc.   

Cite This Paper

Gautham SK, Anjan K Koundinya, " CNN-based Security Authentication for Wireless Multimedia Devices", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.11, No.4, pp. 1-10, 2021.DOI: 10.5815/ijwmt.2021.04.01


[1]D. Wu, Zhihao Zhang, Shaoen Wu, J. Yang, and Ruyang Wang. Biologically inspired resource allocation for network slices in 5g-enabled internet of things. IEEE Internet of Things Journal, 6:9266–9279, 2019. 

[2]Puning Zhang, Xuyuan Kang, Xuefang Li, Yuzhe Liu, Dapeng Wu, and Ruyan Wang. Overlapping community deep exploring-based relay selection method toward multi-hop d2d communication. IEEE Wireless Communications Letters, 8(5):1357– 1360, 2019. 

[3]Zufan Zhang, Chun Wang, Chenquan Gan, Shaohui Sun, and M. Wang. Automatic modulation classification using convolutional neural network with features fusion of spwvd and bjd. IEEE Transactions on Signal and Information Processing over Networks, 5:469–478, 2019.

[4]Zhidu Li, Hailiang Liu, and Ruyan Wang. Service benefit aware multi-task assignment strategy for mobile crowd sensing. Sensors, 19(21), 2019. 

[5]Zhidu Li, Yuming Jiang, Yuehong Gao, Lin Sang, and Dacheng Yang. On buffer constrained throughput of a wireless-powered communication system. IEEE Journal on Selected Areas in Communications, 37(2):283–297, 2019. 

[6]Dapeng Wu, Hang Shi, Honggang Wang, Ruyan Wang, and Hua Fang. A feature based learning system for internet of things applications. IEEE Internet of Things Journal, 6(2):1928–1937, 2019.

[7]Puning Zhang, Xuyuan Kang, Dapeng Wu, and Ruyan Wang. High-accuracy entity state prediction method based on deep belief network toward iot search. IEEE Wireless Communications Letters, 8(2):492–495, 2019. 

[8]Dapeng Wu, Shushan Si, Shaoen Wu, and Ruyan Wang. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet of Things Journal, 5(4):2958–2970, 2018. 

[9]Dapeng Wu, Lingli Deng, Honggang Wang, Keyu Liu, and Ruyan Wang. Similarity aware safety multimedia data transmission mechanism for internet of vehicles. Future Generation Computer Systems, 99:609–623, 2019. 

[10]He Fang, Angie Qi, and Xianbin Wang. Fast authentication and progressive authorization in large-scale iot: How to leverage AI for security enhancement? CoRR, abs/1907.12092, 2019. 

[11]Mian Ahmad Jan, Muhammad Usman, Xiangjian He, and Ateeq Ur Rehman. Sams: A seamless and authorized multimedia streaming framework for wmsn-based iomt. IEEE Internet of Things Journal, 6(2):1576–1583, 2019. 

[12]Xiaoying Qiu, Ting Jiang, Sheng Wu, and Monson Hayes. Physical layer authentication enhancement using a gaussian mixture model. IEEE Access, 6:53583–53592, 2018. 

[13]Ning Xie and Changsheng Chen. Slope authentication at the physical layer. IEEE Transactions on Information Forensics and Security, 13(6):1579–1594, 2018. 

[14]E. Jorswieck, S. Tomasin, and A. Sezgin. Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing. Proceedings of the IEEE, 103:1702–1724, 2015. 

[15]Ning Xie and Shengli Zhang. Blind authentication at the physical layer under time-varying fading channels. IEEE Journal on Selected Areas in Communications, 36(7):1465–1479, 2018.

[16]Ning Wang, Ting Jiang, Shichao Lv, and Liang Xiao. Physical-layer authentication based on extreme learning machine. IEEE Communications Letters, 21(7):1557– 1560, 2017. 

[17]Koundinya, A.K. and Gautham, S.K., 2021. Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation.

[18]Run-Fa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, Feiyi Xie, and Minggui Cao. Deep-learning-based physical layer authentication for industrial wireless sensor networks. Sensors, 19(11), 2019.

[19]Rick Fritschek, Rafael F. Schaefer, and Gerhard Wunder. Deep learning for the gaussian wiretap channel. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC), pages 1–6, 2019. 

[20]Haitao Gan, Zhenhua Li, Yingle Fan, and Zhizeng Luo. Dual learning-based safe semi-supervised learning. IEEE Access, 6:2615–2621, 2017. 

[21]Baibhab Chatterjee, Debayan Das, Shovan Maity, and Shreyas Sen. Rf-puf: Enhancing iot security through authentication of wireless nodes using in-situ machine learning. IEEE Internet of Things Journal, 6(1):388–398, 2019. 

[22]Chuanlong Yin, Yuefei Zhu, Jinlong Fei, and Xinzheng He. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5:21954–21961, 2017. 

[23]Chunxiao Jiang, Haijun Zhang, Yong Ren, Zhu Han, Kwang-Cheng Chen, and Lajos Hanzo. Machine learning paradigms for next-generation wireless networks. IEEE Wireless Communications, 24(2):98–105, 2017. 

[24]Aidin Ferdowsi and Walid Saad. Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Transactions on Communications, 67(2):1371–1387, 2019.

[25]Hao Ye, Geoffrey Ye Li, and Biing-Hwang Fred Juang. Power of deep learning for channel estimation and signal detection in ofdm systems. 2017. 

[26]Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, and Di Wu. Iot security techniques based on machine learning: How do iot devices use ai to enhance security? IEEE Signal Processing Magazine, 35(5):41–49, 2018. 

[27]Qian Mao, Fei Hu, and Qi Hao. Deep learning for intelligent wireless networks: A comprehensive survey. IEEE Communications Surveys Tutorials, 20(4):2595–2621, 2018. 

[28]Xiaoying Qiu, Ting Jiang, and Weixia Zou. Physical layer security in simultaneous wireless information and power transfer networks. In 2017 17th International Symposium on Communications and Information Technologies (ISCIT), pages 1–4, 2017. 

[29]Xiaoying Qiu and Ting Jiang. Safeguarding multiuser communication using full duplex jamming receivers. In 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pages 1–5, 2017. 

[30]Timothy O’Shea and Jakob Hoydis. An introduction to deep learning for the physical layer. IEEE Transactions on Cognitive Communications and Networking, 3(4):563– 575, 2017. 

[31]Olakunle Ibitoye, Omair Shafiq, and Ashraf Matrawy. Analyzing adversarial attacks against deep learning for intrusion detection in iot networks, 2019. 

[32]Xiaoying Qiu. IET Communications, 12:1805–1811(6), September 2018. 

[33]Xinlei Wang, Wei Cheng, Prasant Mohapatra, and Tarek Abdelzaher. Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Transactions on Mobile Computing, 13(12):2777–2790, 2014. 

[34]Sebastian Henningsen, Bj¨orn Scheuermann, and Stefan Dietzel. Challenges of misbehavior detection in industrial wireless networks. In Ad Hoc Networks, pages 37–46, 2018.

[35]He Fang, Xianbin Wang, and Lajos Hanzo. Learning-aided physical layer authentication as an intelligent process. IEEE Transactions on Communications, 67(3):2260– 2273, 2019.

[36]Koundinya, A.K. and Gautham, S.K., Machine Learning Based Security Authentication for Wireless Multimedia Network, Fifth International Conference on Information and Communication Technology for Competitive Strategies, 2020.