IoT Device Authentication Using Self-Organizing Feature Map Data Sets

被引:2
作者
Nair, Manish [1 ]
Dang, Shuping [1 ]
Beach, Mark. A. [1 ]
机构
[1] Univ Bristol, Commun Syst & Networks CSN Grp, Bristol BS8 1UB, England
基金
英国科研创新办公室; 英国工程与自然科学研究理事会;
关键词
Radio frequency; Internet of Things; Wireless communication; Authentication; Communication system security; Wireless fidelity; Cyberattack;
D O I
10.1109/MCOM.002.2200705
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sensors and actuators connected via the Internet of Things (loT) have now become embedded within our critical infrastructure offering improved observation and control as well as reduced costs. Given that software defined radios (SDRs) can be readily programmed to imitate loT devices, there is now a greater risk that assets can be spoofed or compromised. This necessitates an urgent need for loT device authentication, avoiding the need to upgrade the many thousands of individual devices. However, the lack of publicly available data sets severely hampers the development of effective authentication algorithms and mechanisms. In this regard, this article introduces a technique for facilitating loT device authentication when the radio frequency (RF) characteristics are highly correlated using self-organizing feature maps (SOFMs), thus aiming to promote state-of-the-art research in this field. The associated techniques demonstrated in this article exploit a novel data set of RF fingerprints and are, in particular, suitable for low-cost and long-range wireless application scenarios of the loT, for example, LoRa. Here, a well trained convolutional neural network (CNN) based on the SOFM data set can rapidly profile apparently correlated RF fingerprint patterns and thereby ascertain the nature of a specific device (friend or foe). In this way, a reliable and efficient loT device authentication strategy for LoRa devices can be established. The experimental results presented in this article substantiate the effectiveness and efficiency of the SOFM based approach, and the data sets are introduced in detail and shared with the research community.
引用
收藏
页码:162 / 168
页数:7
相关论文
共 50 条
  • [41] Cyber Forensic Investigation in IoT Using Deep Learning Based Feature Fusion in Big Data
    Thapaliya, Suman
    Sharma, Pawan Kumar
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2023, 30 (01) : 16 - 29
  • [42] Cyber Forensic Investigation in IoT Using Deep Learning Based Feature Fusion in Big Data
    Suman Thapaliya
    Pawan Kumar Sharma
    International Journal of Wireless Information Networks, 2023, 30 : 16 - 29
  • [43] IoT-Based Bacillus Number Prediction in Smart Turmeric Farms Using Small Data Sets
    Lin, Jiun-Yi
    Lin, Yi-Bing
    Chen, Wen-Liang
    Ng, Fung-Ling
    Yeh, Jih-Hsiang
    Lin, Yun-Wei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 5146 - 5157
  • [44] An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    Barnawi, Ahmed
    Al-Barakati, Abdullah
    Shon, Taeshik
    ELECTRONICS, 2020, 9 (03)
  • [45] BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 403 - 419
  • [46] Self Configurable Air Pollution Monitoring System Using IoT and Data Mining Techniques
    Binsy, M. S.
    Sampath, Nalini
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 786 - 798
  • [47] BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    Peer-to-Peer Networking and Applications, 2021, 14 : 403 - 419
  • [48] Continuous glucose monitoring using machine learning models and IoT device data: A meta-analysis
    Kapoor, Yagyesh
    Hasija, Yasha
    TECHNOLOGY AND HEALTH CARE, 2025, 33 (01) : 577 - 591
  • [49] IoT-Based Patient Health Data Using Improved Context-Aware Data Fusion and Enhanced Recursive Feature Elimination Model
    Saranya, S. S.
    Fatima, N. Sabiyath
    IEEE ACCESS, 2022, 10 : 128318 - 128335
  • [50] APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization
    Palekar, Supriya
    Radhika, Y.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 823 - 847