A Deep Learning Based Device Authentication Scheme Using Channel State Information

被引:0
作者
Zaman, Saklain [1 ]
Chakraborty, Chinmoy [1 ]
Mehajabin, Nusrat [1 ]
Mamun-Or-Rashid, Md. [1 ]
Razzaque, Md. Abdur [1 ]
机构
[1] Univ Dhaka, Dept Comp Sci & Engn, Green Networking Res Grp, Dhaka 1000, Bangladesh
来源
2018 INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND TECHNOLOGY (ICIET) | 2018年
关键词
CSI; LSTM; Authentication; Security; WIRELESS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wide range implementations of Wi-Fi infrastructure in indoor environment facilitate the deployment of an autonomous device authentication system viable in field of network security, intruder detection etc. Existing device authentication systems standing in the literature suffer either from complicated key management or structural dependency. In this paper, we exploit a deep learning approach, namely Long Short Term Memory (LSTM) to authenticate devices more accurately utilizing Channel State Information (CSI) from received wireless signals. The proposed model doesn't require all CSI values to be stored and it increases the authentication accuracy significantly compared to the state-of-the-art works, as depicted in testbed implementation results.
引用
收藏
页数:5
相关论文
共 21 条
  • [1] POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
    Adamsky, Florian
    Retunskaia, Tatiana
    Schiffner, Stefan
    Kobel, Christian
    Engel, Thomas
    [J]. WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 277 - 278
  • [2] [Anonymous], 2011, P 9 INT C MOB SYST A
  • [3] [Anonymous], 1997, Neural Computation
  • [4] Robust Key Generation from Signal Envelopes in Wireless Networks
    Azimi-Sadjadi, Babak
    Kiayias, Aggelos
    Mercado, Alejandra
    Yener, Bulent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 401 - +
  • [5] Bing Wu, 2005, PAR DISTR PROC S 200
  • [6] Wireless Device Identification with Radiometric Signatures
    Brik, Vladimir
    Banerjee, Suman
    Gruteser, Marco
    Oh, Sangho
    [J]. MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, : 116 - +
  • [7] Cheikhrouhou O., 2010, P ACS IEEE INT C COM, P1, DOI DOI 10.1109/AICCSA.2010.5586995
  • [8] Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
    Chen, Yingying
    Yang, Jie
    Trappe, Wade
    Martin, Richard P.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) : 2418 - 2434
  • [9] A light-weight authentication scheme for wireless sensor networks
    Delgado-Mohatar, Oscar
    Fuster-Sabater, Amparo
    Sierra, Jose M.
    [J]. AD HOC NETWORKS, 2011, 9 (05) : 727 - 735
  • [10] Tool Release: Gathering 802.11n Traces with Channel State Information
    Halperin, Daniel
    Hu, Wenjun
    Sheth, Anmol
    Wetherall, David
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (01) : 53 - 53