Research Article

Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm

Algorithm 1

Physical authentication.
Input:
The channel information of legal transmitter or illgal transmitter:
Process:
1:Bob calculates the value of data set and from Alice and simulated Eve:
2:The data set are preprocessed by Bob:
3:The data set are divided into two parts, and the one is training data set and the other is testing data set:
4:Use training data set to get the weak classifier:
5:Use the Adaboost algorithm to generate a strong classifer:
6:The testing data set is used to verify whether the claasifier can achieve the target detection rate, otherwise it will return to
the first step:
7:The final classifier is the authenticaton decision model, which can judge whether the new packets are legitimate or illegal:
End