Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA
Fingerprints and SVM
- URL: http://arxiv.org/abs/2005.09503v1
- Date: Tue, 19 May 2020 15:02:20 GMT
- Title: Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA
Fingerprints and SVM
- Authors: Donald Reising, Joseph Cancelleri, T. Daniel Loveless, Farah Kandah,
and Anthony Skjellum
- Abstract summary: It is estimated that the number of IoT devices will reach 75 billion in the next five years.
Most of those currently, and to be deployed, lack sufficient security to protect themselves and their networks from attack by malicious IoT devices.
This work presents a PHY layer IoT authentication approach capable of addressing this critical security need through the use of feature reduced Radio Frequency-Distinct Native Attributes (RF-DNA) fingerprints and Support Vector Machines (SVM)
- Score: 1.293050392312921
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: It is estimated that the number of IoT devices will reach 75 billion in the
next five years. Most of those currently, and to be deployed, lack sufficient
security to protect themselves and their networks from attack by malicious IoT
devices that masquerade as authorized devices to circumvent digital
authentication approaches. This work presents a PHY layer IoT authentication
approach capable of addressing this critical security need through the use of
feature reduced Radio Frequency-Distinct Native Attributes (RF-DNA)
fingerprints and Support Vector Machines (SVM). This work successfully
demonstrates 100%: (i) authorized ID verification across three trials of six
randomly chosen radios at signal-to-noise ratios greater than or equal to 6 dB,
and (ii) rejection of all rogue radio ID spoofing attacks at signal-to-noise
ratios greater than or equal to 3 dB using RF-DNA fingerprints whose features
are selected using the Relief-F algorithm.
Related papers
- Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security [7.8344795632171325]
Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly.
To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality.
This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework.
arXiv Detail & Related papers (2024-02-08T00:23:42Z) - IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways [45.44831696628473]
This paper presents IoTScent, an open-source forensic tool that enables IoT gateways and Home Automation platforms to perform IoT traffic capture and analysis.
IoTScent is specifically designed to operate over IEEE5.4-based traffic, which is the basis for many IoT-specific protocols such as Zigbee, 6LoWPAN and Thread.
This work provides a comprehensive description of the IoTScent tool, including a practical use case that demonstrates the use of the tool to perform device identification from Zigbee traffic.
arXiv Detail & Related papers (2023-10-05T09:10:05Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - Internet of Things: Digital Footprints Carry A Device Identity [0.0]
Device fingerprinting (DFP) model is able to distinguish between Internet of Things (IoT) and non-IoT devices.
Four statistical features have been extracted from the consecutive five device-originated packets, to generate individual device fingerprints.
arXiv Detail & Related papers (2023-01-01T02:18:02Z) - Device identification using optimized digital footprints [0.0]
A device fingerprinting (DFP) method has been proposed for device identification, based on digital footprints, which devices use for communication over a network.
A subset of nine features have been selected from the network and transport layers of a single transmission control protocol/internet protocol packet to generate device-specific signatures.
Results have shown that the method is able to distinguish device type with up to 100% precision using the random forest (RF) classifier, and classify individual devices with up to 95.7% precision.
arXiv Detail & Related papers (2022-12-04T14:21:29Z) - AFR-Net: Attention-Driven Fingerprint Recognition Network [47.87570819350573]
We improve initial studies on the use of vision transformers (ViT) for biometric recognition, including fingerprint recognition.
We propose a realignment strategy using local embeddings extracted from intermediate feature maps within the networks to refine the global embeddings in low certainty situations.
This strategy can be applied as a wrapper to any existing deep learning network (including attention-based, CNN-based, or both) to boost its performance.
arXiv Detail & Related papers (2022-11-25T05:10:39Z) - Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G
and Beyond [46.34482158291128]
A deep neural network (DNN) can predict the beam that is best slanted to each UE by using the received signal strengths ( RSSs) from a subset of possible narrow beams.
We present an adversarial attack by generating perturbations to manipulate the over-the-air captured RSSs as the input to the DNN.
This attack reduces the IA performance significantly and fools the DNN into choosing the beams with small RSSs compared to jamming attacks with Gaussian or uniform noise.
arXiv Detail & Related papers (2021-03-25T17:25:21Z) - Preprint: Using RF-DNA Fingerprints To Classify OFDM Transmitters Under
Rayleigh Fading Conditions [1.6058099298620423]
The Internet of Things (IoT) will consist of approximately fifty billion devices by the year 2020.
It has been estimated that almost 70% of IoT devices use no form of encryption.
Previous research has suggested the use of Specific Emitter Identification (SEI) as a means of augmenting bit-level security mechanism such as encryption.
arXiv Detail & Related papers (2020-05-06T13:53:25Z) - Device Authentication Codes based on RF Fingerprinting using Deep
Learning [2.980018103007841]
Device Authentication Code (DAC) is a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures.
We show that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest.
arXiv Detail & Related papers (2020-04-19T01:50:29Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.