DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding
- URL: http://arxiv.org/abs/2010.10334v1
- Date: Sun, 18 Oct 2020 03:47:36 GMT
- Title: DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding
- Authors: Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani
- Abstract summary: We present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (DLWIoT)
DLWIoT features a robust and fully automated image watermarking scheme based on deep neural networks.
Our experimental results demonstrate the feasibility of DLWIoT, indicating that authorized users can onboard IoT devices with DLWIoT within 2.5-3sec.
- Score: 8.430502131775722
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The onboarding of IoT devices by authorized users constitutes both a
challenge and a necessity in a world, where the number of IoT devices and the
tampering attacks against them continuously increase. Commonly used onboarding
techniques today include the use of QR codes, pin codes, or serial numbers.
These techniques typically do not protect against unauthorized device access-a
QR code is physically printed on the device, while a pin code may be included
in the device packaging. As a result, any entity that has physical access to a
device can onboard it onto their network and, potentially, tamper it
(e.g.,install malware on the device). To address this problem, in this paper,
we present a framework, called Deep Learning-based Watermarking for authorized
IoT onboarding (DLWIoT), featuring a robust and fully automated image
watermarking scheme based on deep neural networks. DLWIoT embeds user
credentials into carrier images (e.g., QR codes printed on IoT devices), thus
enables IoT onboarding only by authorized users. Our experimental results
demonstrate the feasibility of DLWIoT, indicating that authorized users can
onboard IoT devices with DLWIoT within 2.5-3sec.
Related papers
- From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices [33.25850729215212]
We present MCU-Token, a secure hardware fingerprinting framework for MCU-based IoT devices.
MCU-Token can achieve high accuracy (over 97%) with a low overhead across various IoT devices and application scenarios.
arXiv Detail & Related papers (2024-03-22T15:15:28Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways [45.44831696628473]
This paper presents IoTScent, an open-source forensic tool that enables IoT gateways and Home Automation platforms to perform IoT traffic capture and analysis.
IoTScent is specifically designed to operate over IEEE5.4-based traffic, which is the basis for many IoT-specific protocols such as Zigbee, 6LoWPAN and Thread.
This work provides a comprehensive description of the IoTScent tool, including a practical use case that demonstrates the use of the tool to perform device identification from Zigbee traffic.
arXiv Detail & Related papers (2023-10-05T09:10:05Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - Don't Forget to Sign the Gradients! [60.98885980669777]
GradSigns is a novel watermarking framework for deep neural networks (DNNs)
We present GradSigns, a novel watermarking framework for deep neural networks (DNNs)
arXiv Detail & Related papers (2021-03-05T14:24:32Z) - Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement
Learning [73.85267769520715]
Internet of Things (IoT) with its growing number of deployed devices and applications raises significant challenges for network maintenance procedures.
We formulate a problem of autonomous maintenance in IoT networks as a Partially Observable Markov Decision Process.
We utilize Deep Reinforcement Learning algorithms (DRL) to train agents that decide if a maintenance procedure is in order or not and, in the former case, the proper type of maintenance needed.
arXiv Detail & Related papers (2020-12-31T11:19:51Z) - Lightweight IoT Malware Detection Solution Using CNN Classification [2.288885651912488]
The security aspect of IoT devices is an infant field, which is why it is our focus in this paper.
We developed a system that can recognize malicious behavior of a specific IoT node on the network.
Through convolutional neural network and monitoring, we were able to provide malware detection for IoT using a central node that can be installed within the network.
arXiv Detail & Related papers (2020-10-13T10:56:33Z) - Zero-Bias Deep Learning for Accurate Identification of Internet of
Things (IoT) Devices [20.449229983283736]
We propose an enhanced deep learning framework for IoT device identification using physical layer signals.
We have evaluated the effectiveness of the proposed framework using real data from ADS-B (Automatic Dependent Surveillance-Broadcast), an application of IoT in aviation.
arXiv Detail & Related papers (2020-08-27T20:50:48Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.