Research Article
Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm
Input: | The channel information of legal transmitter or illgal transmitter: | Process: | 1:Bob calculates the value of data set and from Alice and simulated Eve: | | | 2:The data set are preprocessed by Bob: | 3:The data set are divided into two parts, and the one is training data set and the other is testing data set: | 4:Use training data set to get the weak classifier: | 5:Use the Adaboost algorithm to generate a strong classifer: | 6:The testing data set is used to verify whether the claasifier can achieve the target detection rate, otherwise it will return to | the first step: | 7:The final classifier is the authenticaton decision model, which can judge whether the new packets are legitimate or illegal: | End |
|