Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning

被引:0
作者
Sagduyu, Yalin E. [1 ]
Erpek, Tugba [1 ]
机构
[1] Nexcepta, Gaithersburg, MD 20878 USA
关键词
LoRa; Multitasking; Internet of Things; Training; Perturbation methods; Kernel; Object recognition; Pattern classification; Wireless communication; Wireless sensor networks; Adversarial attacks; adversarial machine learning; deep learning (DL); defense; device identification; Internet of Things (IoT); LoRa wireless signal classification; rogue signal detection; FREQUENCY FINGERPRINT IDENTIFICATION;
D O I
10.1109/JIOT.2025.3547645
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
LoRa enables long-range, energy-efficient communication for Internet of Things (IoT) applications, making it an essential technology for low-power wide-area networks (LPWANs). However, its security remains a concern, particularly when reliable device identification and authentication are critical. This article addresses these challenges using deep learning (DL) techniques to perform two key tasks: 1) identifying LoRa devices and 2) distinguishing between legitimate signals and rogue signals [generated by kernel density estimation (KDE)]. By training deep neural networks (DNNs) on real LoRa signal data, the study examines the susceptibility of separate models for each task as well as a shared multitask model to untargeted and targeted adversarial attacks, generated with the fast gradient sign method (FGSM). To counter these attacks, a defense strategy using adversarial training is proposed to enhance model robustness. The results highlight vulnerabilities in LoRa security and emphasize the importance of fortifying IoT systems against such sophisticated threats.
引用
收藏
页码:20261 / 20271
页数:11
相关论文
共 39 条
[1]   Adversarial Machine Learning in Wireless Communications Using RF Data: A Review [J].
Adesina, Damilola ;
Hsieh, Chung-Chu ;
Sagduyu, Yalin E. ;
Qian, Lijun .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01) :77-100
[2]   A Comprehensive Survey on Deep Learning-Based LoRa Radio Frequency Fingerprinting Identification [J].
Ahmed, Aqeel ;
Quoitin, Bruno ;
Gros, Alexander ;
Moeyaert, Veronique .
SENSORS, 2024, 24 (13)
[3]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[4]   A Deep Learning Model for LoRa Signals Classification Using Cyclostationay Features [J].
Almohamad, Abdullateef ;
Hasna, Mazen ;
Althunibat, Saud ;
Tekbiyik, Kursat ;
Qaraqe, Khalid .
12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, :76-81
[5]  
Alshehri A, 2021, INTERNATIONAL CONFERENCE ON TRANSPORTATION AND DEVELOPMENT 2021: TRANSPORTATION OPERATIONS, TECHNOLOGIES, AND SAFETY, P251, DOI 10.1145/3466772.3467054
[6]  
Aras E, 2017, IEEE INT C CYBERNET, P361, DOI 10.1109/cybconf.2017.7985777
[7]  
Bor M., 2016, P 2016 INT C EMBEDDE, P361
[8]  
Cohen J, 2019, PR MACH LEARN RES, V97
[9]   Continual Deep Reinforcement Learning to Prevent Catastrophic Forgetting in Jamming Mitigation [J].
Davaslioglu, Kemal ;
Kompella, Sastry ;
Erpek, Tugba ;
Sagduyu, Yalin E. .
MILCOM 2024-2024 IEEE MILITARY COMMUNICATIONS CONFERENCE, MILCOM, 2024, :740-745
[10]  
Deep Architectures for Modulation Recognition, 2017, 2017 IEEE INT S DYNA