Advanced Search
Turn off MathJax
Article Contents
CHEN Qiaoxin, XIAO Liang, WANG Pengcheng, LI Jieling, YAO Jinqing, XU Xiaoyu. Physical Layer Authentication for Large Language Models in Maritime Communications[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250804
Citation: CHEN Qiaoxin, XIAO Liang, WANG Pengcheng, LI Jieling, YAO Jinqing, XU Xiaoyu. Physical Layer Authentication for Large Language Models in Maritime Communications[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250804

Physical Layer Authentication for Large Language Models in Maritime Communications

doi: 10.11999/JEIT250804 cstr: 32379.14.JEIT250804
Funds:  National Natural Science Foundation of China (U21A20444), Fundamental Research Funds for the Central Universities (20720250036), National Key Research and Development Program of China (2023YFB3107603)
  • Received Date: 2025-08-27
  • Accepted Date: 2025-12-06
  • Rev Recd Date: 2025-12-06
  • Available Online: 2025-12-11
  •   Objective  Physical (PHY)-layer authentication exploits channel state information of radio transmitters to detect spoofing attacks, but the accuracy and speed have to be further improved for LLM based smart ocean applications, due to insufficient channel estimation and fast time-varying channels in short-packet communication with limited preamble length. In this paper, we propose an environment perception-aware PHY-layer authentication scheme for LLM edge inference in smart ocean application, which designs a hypothesis testing based multi-mode authentication to evaluate channel state information and packet arrival interval. The application type and the environmental indicators inferred by LLM are exploited in reinforcement learning to optimize the authentication mode and test threshold, enhancing authentication accuracy and speed.  Methods  The environment perception-aware PHY-layer authentication scheme is proposed for LLM edge inference in maritime wireless networks, which designs a hypothesis testing based multi-mode authentication to evaluate channel state information and packet arrival interval to detect spoofing. Reinforcement learning is utilized to jointly optimize authentication mode and test threshold based on application types and the environmental indicators inferred by the multimodal LLM fed both images and prompts, thus enhancing authentication accuracy. The multi-level policy risk function is formulated to quantify the potential of miss detection, reducing the exploration probability for unsafe policies. A Benna-Fusi synapse model based continual learning mechanism is proposed to obtain multi-scale optimization experiences across multiple maritime scenarios, such as deck and cabin, and replays in the same cases to enhance policy optimization speed.  Results and Discussions  Simulations are performed based on a legal device and a shipborne server using the maritime channel data collected in the Xiamen Pearl Harbor area against a spoofing attacker at 1.5 m/s that sends false data packets to the server with up to 100 mW. Simulation results show the performance gain over benchmarks, e.g., providing 82.3% lower false alarm rate and 84.2% lower miss detection rate compared with RLPA, due to the use of environmental indicator derived from LLM and the safe exploration mechanism to avoid choosing the risk authentication policy that leads to a decline in miss detection.  Conclusions  This paper proposes a PHY-layer authentication scheme for LLM-enabled intelligent maritime wireless networks to optimize both the authentication mode and test threshold against spoofing attacks. Based on the environmental indicator derived from LLM, the channel state information, and the packet arrival interval, the safe exploration mechanism in the policy distribution is used to improve authentication accuracy and efficiency. Simulation results show that our proposed scheme reduces 82.3% false alarm rate and 84.2% miss rate compared with the benchmark RLPA.
  • loading
  • [1]
    鲁信金, 施育鑫, 雷菁, 等. 无线通信物理层内生安全: 关键技术、优势与未来挑战[J]. 通信学报, 2024, 45(S1): 87–96. doi: 10.11959/j.issn.1000-436x.2024210.

    LU Xinjin, SHI Yuxin, LEI Jing, et al. Endogenous security in the physical layer of wireless communications: Key technologies, advantages and future challenges[J]. Journal on Communications, 2024, 45(S1): 87–96. doi: 10.11959/j.issn.1000-436x.2024210.
    [2]
    ZHANG Xinyuan, NIE Jiangtian, HUANG Yudong, et al. Beyond the cloud: Edge inference for generative large language models in wireless networks[J]. IEEE Transactions on Wireless Communications, 2025, 24(1): 643–658. doi: 10.1109/TWC.2024.3497923.
    [3]
    LU Xiaozhen, XIAO Liang, XU Tangwei, et al. Reinforcement learning based PHY authentication for VANETs[J]. IEEE Transactions on Vehicular Technology, 2020, 69(3): 3068–3079. doi: 10.1109/TVT.2020.2967026.
    [4]
    WANG Qi, PANG Zhibo, LIANG Wei, et al. Spatiotemporal gradient-based physical-layer authentication enhanced by CSI-to-image transformation for industrial mobile devices[J]. IEEE Transactions on Industrial Informatics, 2024, 20(3): 4236–4245. doi: 10.1109/TII.2023.3316178.
    [5]
    DURISI G, KOCH T, and POPOVSKI P. Toward massive, ultrareliable, and low-latency wireless communication with short packets[J]. Proceedings of the IEEE, 2016, 104(9): 1711–1726. doi: 10.1109/JPROC.2016.2537298.
    [6]
    LIN Jiaying, DIEKMANN P, FRAMING C E, et al. Maritime environment perception based on deep learning[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(9): 15487–15497. doi: 10.1109/TITS.2022.3140933.
    [7]
    ZHAO Changyuan, DU Hongyang, NIYATO D, et al. Generative AI for secure physical layer communications: A survey[J]. IEEE Transactions on Cognitive Communications and Networking, 2025, 11(1): 3–26. doi: 10.1109/TCCN.2024.3438379.
    [8]
    杨立君, 李明航, 陆海涛, 等. 基于信道指纹的毫米波MIMO系统身份欺骗攻击检测方案[J]. 电子与信息学报, 2023, 45(12): 4228–4234. doi: 10.11999/JEIT220934.

    YANG Lijun, LI Minghang, LU Haitao, et al. Spoofing attack detection scheme based on channel fingerprint for millimeter wave MIMO system[J]. Journal of Electronics & Information Technology, 2023, 45(12): 4228–4234. doi: 10.11999/JEIT220934.
    [9]
    NOSOUHI M R, SOOD K, GROBLER M, et al. Towards spoofing resistant next generation IoT networks[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1669–1683. doi: 10.1109/TIFS.2022.3170276.
    [10]
    WU Yuemei, WEI Dong, GUO Caili, et al. Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 2144–2159. doi: 10.1109/TIFS.2023.3263624.
    [11]
    MENG Rui, XU Xiaodong, WANG Bizhu, et al. Physical-layer authentication based on hierarchical variational autoencoder for Industrial Internet of Things[J]. IEEE Internet of Things Journal, 2023, 10(3): 2528–2544. doi: 10.1109/JIOT.2022.3213593.
    [12]
    HOANG T M, VAN CHIEN T, VAN LUONG T, et al. Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1010–1023. doi: 10.1109/TIFS.2022.3155970.
    [13]
    毛丹丹, 王宁, 甄姬娜, 等. 基于毫米波MIMO信道多维优势提取的密钥协商方法[J]. 通信学报, 2025, 46(1): 124–143. doi: 10.11959/j.issn.1000-436x.2025005.

    MAO Dandan, WANG Ning, ZHEN Ji’na, et al. Key agreement method based on multi-dimensional advantage distillation over mmWave MIMO channels[J]. Journal on Communications, 2025, 46(1): 124–143. doi: 10.11959/j.issn.1000-436x.2025005.
    [14]
    宋华伟, 金梁, 张胜军. 基于标签信号的物理层安全认证[J]. 电子与信息学报, 2018, 40(5): 1066–1071. doi: 10.11999/JEIT170672.

    SONG Huawei, JIN Liang, ZHANG Shengjun. Physical layer authentication based on tag signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066–1071. doi: 10.11999/JEIT170672.
    [15]
    FANG He, WANG Xianbin, and HANZO L. Learning-aided physical layer authentication as an intelligent process[J]. IEEE Transactions on Communications, 2019, 67(3): 2260–2273. doi: 10.1109/TCOMM.2018.2881117.
    [16]
    ABDRABOU M and GULLIVER T A. Adaptive physical layer authentication using machine learning with antenna diversity[J]. IEEE Transactions on Communications, 2022, 70(10): 6604–6614. doi: 10.1109/TCOMM.2022.3196648.
    [17]
    XIAO Liang, WAN Xiaoyue, and HAN Zhu. PHY-layer authentication with multiple landmarks with reduced overhead[J]. IEEE Transactions on Wireless Communications, 2018, 17(3): 1676–1687. doi: 10.1109/TWC.2017.2784431.
    [18]
    FANG He, XIAO Zhenlong, WANG Xianbin, et al. Collaborative authentication for 6G networks: An edge intelligence based autonomous approach[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 2091–2103. doi: 10.1109/TIFS.2023.3263636.
    [19]
    SCIANCALEPORE S, TEDESCHI P, AZIZ A, et al. Auth-AIS: Secure, flexible, and backward-compatible authentication of vessels AIS broadcasts[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(4): 2709–2726. doi: 10.1109/TDSC.2021.3069428.
    [20]
    ZHANG Peiying, WANG Yaqi, AUJLA G S, et al. A blockchain-based authentication scheme and secure architecture for IoT-enabled maritime transportation systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(2): 2322–2331. doi: 10.1109/TITS.2022.3159485.
    [21]
    VANGALA A, AGRAWAL S, DAS A K, et al. Big data-enabled authentication framework for offshore maritime communication using drones[J]. IEEE Transactions on Vehicular Technology, 2024, 73(7): 10196–10210. doi: 10.1109/TVT.2024.3367945.
    [22]
    BENNA M K and FUSI S. Computational principles of synaptic memory consolidation[J]. Nature Neuroscience, 2016, 19(12): 1697–1706. doi: 10.1038/nn.4401.
    [23]
    POPOVSKI P, STEFANOVIĆ Č, NIELSEN J J, et al. Wireless access in ultra-reliable low-latency communication (URLLC)[J]. IEEE Transactions on Communications, 2019, 67(8): 5783–5801. doi: 10.1109/TCOMM.2019.2914652.
    [24]
    XIAO Liang, LU Xiaozhen, XU Tangwei, et al. Reinforcement learning-based physical-layer authentication for controller area networks[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2535–2547. doi: 10.1109/TIFS.2021.3056206.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)  / Tables(1)

    Article Metrics

    Article views (17) PDF downloads(4) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return