IoT Device Authentication Using Self-Organizing Feature Map Data Sets

被引:2
作者
Nair, Manish [1 ]
Dang, Shuping [1 ]
Beach, Mark. A. [1 ]
机构
[1] Univ Bristol, Commun Syst & Networks CSN Grp, Bristol BS8 1UB, England
基金
英国科研创新办公室; 英国工程与自然科学研究理事会;
关键词
Radio frequency; Internet of Things; Wireless communication; Authentication; Communication system security; Wireless fidelity; Cyberattack;
D O I
10.1109/MCOM.002.2200705
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sensors and actuators connected via the Internet of Things (loT) have now become embedded within our critical infrastructure offering improved observation and control as well as reduced costs. Given that software defined radios (SDRs) can be readily programmed to imitate loT devices, there is now a greater risk that assets can be spoofed or compromised. This necessitates an urgent need for loT device authentication, avoiding the need to upgrade the many thousands of individual devices. However, the lack of publicly available data sets severely hampers the development of effective authentication algorithms and mechanisms. In this regard, this article introduces a technique for facilitating loT device authentication when the radio frequency (RF) characteristics are highly correlated using self-organizing feature maps (SOFMs), thus aiming to promote state-of-the-art research in this field. The associated techniques demonstrated in this article exploit a novel data set of RF fingerprints and are, in particular, suitable for low-cost and long-range wireless application scenarios of the loT, for example, LoRa. Here, a well trained convolutional neural network (CNN) based on the SOFM data set can rapidly profile apparently correlated RF fingerprint patterns and thereby ascertain the nature of a specific device (friend or foe). In this way, a reliable and efficient loT device authentication strategy for LoRa devices can be established. The experimental results presented in this article substantiate the effectiveness and efficiency of the SOFM based approach, and the data sets are introduced in detail and shared with the research community.
引用
收藏
页码:162 / 168
页数:7
相关论文
共 50 条
  • [31] Data Privacy Based on IoT Device Behavior Control Using Blockchain
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha-Nabila
    Benkhelifa, Elhadj
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)
  • [32] Cooperative Computation Offloading in FiWi Enhanced 4G HetNets Using Self-Organizing MEC
    Ebrahimzadeh, Amin
    Maier, Martin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) : 4480 - 4493
  • [33] Self Organizing Feature Map-Integrated Knowledge-Based Deep Network Against Fake Crowdsensing Tasks
    Simsek, Murat
    Kantarci, Burak
    Boukerche, Azzedine
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [34] Discrimination of Thai melon seeds using near-infrared spectroscopy and adaptive self-organizing maps
    Makmuang, Sureerat
    Vilaivan, Tirayut
    Maher, Simon
    Ekgasit, Sanong
    Wongravee, Kanet
    CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS, 2024, 245
  • [35] An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography
    Ali, Salman
    Anwer, Faisal
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,
  • [36] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    B. Prasanalakshmi
    K. Murugan
    Karthik Srinivasan
    S. Shridevi
    Shermin Shamsudheen
    Yu-Chen Hu
    The Journal of Supercomputing, 2022, 78 : 361 - 378
  • [37] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    Prasanalakshmi, B.
    Murugan, K.
    Srinivasan, Karthik
    Shridevi, S.
    Shamsudheen, Shermin
    Hu, Yu-Chen
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) : 361 - 378
  • [38] Utility-Aware Legitimacy Detection of Mobile Crowdsensing Tasks via Knowledge-Based Self Organizing Feature Map
    Simsek, Murat
    Kantarci, Burak
    Boukerche, Azzedine
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (06) : 3706 - 3723
  • [39] Bootstrapping IoT authentication using aggregated local knowledge and novel self-contained triangulation methodologies
    Autry, C. P.
    Roscoe, A. W.
    Magal, Mykhailo
    2022 IEEE 29TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC 2022), 2022, : 106 - 115
  • [40] A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
    Khan, Mohammad Ayoub
    Quasim, Mohammad Tabrez
    Alghamdi, Norah Saleh
    Khan, Mohammad Yahiya
    IEEE ACCESS, 2020, 8 : 52018 - 52027