Toward IoT Node Authentication Mechanism in Next Generation Networks

被引:12
作者
Nguyen, Dinh Duc Nha [1 ]
Sood, Keshav [1 ]
Xiang, Yong [2 ]
Gao, Longxiang [3 ,4 ]
Chi, Lianhua [5 ]
Yu, Shui [6 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat, Sch IT, Geelong, Vic 3220, Australia
[2] Deakin Univ, Sch IT, Deakin Blockchain Innovat Lab, Geelong, Vic 3220, Australia
[3] Qilu Univ Technol, Shandong Acad Sci, Fac Comp Sci & Technol, Jinan 250316, Peoples R China
[4] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Jinan 250101, Peoples R China
[5] La Trobe Univ, Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[6] Univ Technol Sydney, Dept Sch Software, Sydney, NSW 2007, Australia
关键词
5G security; authentication; Internet of Things (IoT); next generation networks; radio frequency (RF) fingerprinting; PHYSICAL-LAYER AUTHENTICATION; RF-DNA; SECURITY; INTERNET;
D O I
10.1109/JIOT.2023.3262822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the next generation networks (5G-NGNs) provide a flexible infrastructure to support latency-sensitive and bandwidth-hungry mission-critical Internet of Things (IoT) applications, however, the 5G-IoT integration in NGNs has increased the threat surface. Unfortunately, IoT devices are resource constrained, and the traditional intrusion detection systems (IDS) approaches based on cryptography are not effective on 5G-IoT ecosystems. In this article, we propose an effective 5G-IoT node authentication approach that leverages unique radio frequency (RF) fingerprinting data to train the Deep learning model to detect legitimate and nonlegitimate IoT nodes. Our approach is based on Mahalanobis Distance theory and Chi-square distribution theories. The proposed approach achieves a higher detection accuracy (99.35%) as well as lower training time compared to other existing approaches which is a key benefit of our approach in NGNs. The experiments are conducted using ETSI-open source NFV management and orchestration (OSM-MANO) platform on Amazon Web Services (AWSs) cloud platform to verify how the proposed approach would fit in real-life scenarios. The method can be used as a standalone security system or as a part of multifactor authentication.
引用
收藏
页码:13333 / 13341
页数:9
相关论文
共 39 条
[1]   Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices [J].
Aghnaiya, Alghannai ;
Ali, Aysha M. ;
Kara, Ali .
IEEE ACCESS, 2019, 7 :144054-144058
[2]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[3]   Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks [J].
Alladi, Tejasvi ;
Venkatesh, Vishnu ;
Chamola, Vinay ;
Chaturvedi, Nitin .
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
[4]   Evolution of Internet of Things From Blockchain to IOTA: A Survey [J].
Alshaikhli, Mays ;
Elfouly, Tarek ;
Elharrouss, Omar ;
Mohamed, Amr ;
Ottakath, Najmath .
IEEE ACCESS, 2022, 10 :844-866
[5]   Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment [J].
Bera, Basudeb ;
Das, Ashok Kumar ;
Garg, Sahil ;
Piran, Md Jalil ;
Hossain, M. Shamim .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2708-2721
[6]   A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios [J].
Bovenzi, Giampaolo ;
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Persico, Valerio ;
Pescape, Antonio .
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
[7]   RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning [J].
Chatterjee, Baibhab ;
Das, Debayan ;
Maity, Shovan ;
Sen, Shreyas .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :388-398
[8]   On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure [J].
Das, Ashok Kumar ;
Bera, Basudeb ;
Wazid, Mohammad ;
Jamal, Sajjad Shaukat ;
Park, Youngho .
IEEE ACCESS, 2021, 9 :71856-71867
[9]   A Two-Stage Approach to Few-Shot Learning for Image Recognition [J].
Das, Debasmit ;
Lee, C. S. George .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 29 :3336-3350
[10]   Detection and Classification of UAVs Using RF Fingerprints in the Presence of Wi-Fi and Bluetooth Interference [J].
Ezuma, Martins ;
Erden, Fatih ;
Anjinappa, Chethan Kumar ;
Ozdemir, Ozgur ;
Guvenc, Ismail .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 :60-76