Continuous Authentication for the Internet of Things Using Channel State Information

被引:2
作者
Yu, Boyao [1 ,2 ]
Yang, Chao [1 ,2 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Sci & Technol Commun Networks Lab, Shijiazhuang, Hebei, Peoples R China
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
基金
国家重点研发计划;
关键词
continuous authentication; device-to-device authentication; device fingerprint; Channel State Information; Internet of Things; WIRELESS; SMART; PART; CITY;
D O I
10.1109/globecom38437.2019.9014276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the centralized Internet of Things (IoT) architecture there exists gateways, which gather sensed data from sensor nodes frequently. Due to numerous security threats and attacks in wireless sensor networks (WSNs), how to achieve device -to -device authentication is a fundamental security issue. In some IoT environments such as environmental monitoring systems, sensor nodes need to transmit sensed data to gateways periodically. Previous authentication schemes make sensor nodes and gateways authenticate each other frequently in the beginning of each transmission session and affect the real-time nature of sensed data. In this paper, we explore a lightweight device fingerprint extraction and verification algorithm using Channel State Information (CSI). We propose a CSI -based continuous authentication scheme for the Internet of Things. The proposed scheme can achieve continuous authentication for the target IoT device and finish each authentication process within 1.5 ms. Our experiments show that the proposed scheme can resist identity-based attacks and has better performance than existing continuous authentication schemes for the Internet of Things.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
Abomhara M., 2014, P IEEE INT C PRIV SE, P1, DOI [10.1109/PRISMS.2014.6970594, DOI 10.1109/PRISMS.2014.6970594]
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]  
Bamasag O. O., 2015, P WESS 15 WORKSH EMB, P1, DOI [10.1145/2818362.2818363, DOI 10.1145/2818362.2818363]
[4]  
Belissent Jennifer., 2010, GETTING CLEVER SMART
[5]   Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks [J].
Chen, Yingying ;
Yang, Jie ;
Trappe, Wade ;
Martin, Richard P. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2418-2434
[6]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)
[7]   Industrial Internet of Things monitoring solution for advanced predictive maintenance applications [J].
Civerchia, Federico ;
Bocchino, Stefano ;
Salvadori, Claudio ;
Rossi, Enrico ;
Maggiani, Luca ;
Petracca, Matteo .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 7 :4-12
[8]  
Cocchia A, 2014, PROGR IS, P13, DOI 10.1007/978-3-319-06160-3_2
[9]  
CORDEIRO A, 2017, SECURITY COMMUNICATI, V2017
[10]  
Ester M., 1996, P 2 INT C KNOWL DISC