• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Waqas, Muhammad (Waqas, Muhammad.) | Bano, Shehr (Bano, Shehr.) | Hassan, Fatima (Hassan, Fatima.) | Tu, Shanshan (Tu, Shanshan.) | Abbas, Ghulam (Abbas, Ghulam.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.)

Indexed by:

EI Scopus SCIE

Abstract:

Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect cyber-attacks. Still, the cyber-physical systems (CPS) have relatively large computational requirements and require more communication resources, thus making it impossible to achieve a low latency target. These methods perform well but only in stationary scenarios. We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios. The features are fed to ensemble learning algorithms, such as AdaBoost, LogitBoost and Gentle Boost, to classify data. The authentication of the received signal is considered a binary classification problem. The transmitted data is labeled as legitimate information, and spoofing data is illegitimate information. Therefore, this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks. It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile. The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time. © 2022 Tech Science Press. All rights reserved.

Keyword:

Embedded systems Cyber Physical System Denial-of-service attack Network layers Metadata Network security Adaptive boosting Classification (of information) Authentication Cybersecurity Learning systems Machine learning

Author Community:

  • [ 1 ] [Waqas, Muhammad]Engineering Research Center of Intelligent Perception and Autonomous Control, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Waqas, Muhammad]School of Engineering, Edith Cowan University, Joondalup, Perth; WA; 6027, Australia
  • [ 3 ] [Bano, Shehr]Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan
  • [ 4 ] [Hassan, Fatima]Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan
  • [ 5 ] [Tu, Shanshan]Engineering Research Center of Intelligent Perception and Autonomous Control, Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Abbas, Ghulam]Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan
  • [ 7 ] [Abbas, Ziaul Haq]Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Computers, Materials and Continua

ISSN: 1546-2218

Year: 2022

Issue: 3

Volume: 73

Page: 4489-4499

3 . 1

JCR@2022

3 . 1 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:46

JCR Journal Grade:3

CAS Journal Grade:4

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 7

Affiliated Colleges:

Online/Total:540/10555147
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.