A Novel Framework for Open-Set Authentication of Internet of Things Using Limited Devices

被引:6
作者
Huang, Keju [1 ]
Yang, Junan [1 ]
Hu, Pengjiang [1 ]
Liu, Hui [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
关键词
Internet of Things; cybersecurity; physical layer identification; deep learning; open-set classification; EMITTER IDENTIFICATION;
D O I
10.3390/s22072662
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is promising to transform a wide range of fields. However, the open nature of IoT makes it exposed to cybersecurity threats, among which identity spoofing is a typical example. Physical layer authentication, which identifies IoT devices based on the physical layer characteristics of signals, serves as an effective way to counteract identity spoofing. In this paper, we propose a deep learning-based framework for the open-set authentication of IoT devices. Specifically, additive angular margin softmax (AAMSoftmax) was utilized to enhance the discriminability of learned features and a modified OpenMAX classifier was employed to adaptively identify authorized devices and distinguish unauthorized ones. The experimental results for both simulated data and real ADS-B (Automatic Dependent Surveillance-Broadcast) data indicate that our framework achieved superior performance compared to current approaches, especially when the number of devices used for training is limited.
引用
收藏
页数:17
相关论文
共 35 条
  • [1] Andrey G., 2019, P 2019 IEEE INT S DY, P1
  • [2] Speaker recognition based on deep learning: An overview
    Bai, Zhongxin
    Zhang, Xiao-Lei
    [J]. NEURAL NETWORKS, 2021, 140 : 65 - 99
  • [3] Towards Open Set Deep Networks
    Bendale, Abhijit
    Boult, Terrance E.
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 1563 - 1572
  • [4] Wireless Device Identification with Radiometric Signatures
    Brik, Vladimir
    Banerjee, Suman
    Gruteser, Marco
    Oh, Sangho
    [J]. MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, : 116 - +
  • [5] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [6] Debashri R., 2019, IEEE T COGN COMMUN, V6, P783
  • [7] ArcFace: Additive Angular Margin Loss for Deep Face Recognition
    Deng, Jiankang
    Guo, Jia
    Xue, Niannan
    Zafeiriou, Stefanos
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4685 - 4694
  • [8] Communication emitter individual identification via 3D-Hilbert energy spectrum-based multiscale segmentation features
    Han, Jie
    Zhang, Tao
    Qiu, Zhaoyang
    Zheng, Xiaoyu
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [9] Speaker Recognition by Machines and Humans
    Hansen, John H. L.
    Hasan, Taufiq
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (06) : 74 - 99
  • [10] Cooperative Specific Emitter Identification via Multiple Distorted Receivers
    He, Boxiang
    Wang, Fanggang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3791 - 3806