Computationally-Efficient Secured IoT Networks: Devices Fingerprinting using Low Cost Machine Learning Techniques

Abdallah S. Abdallah, Flávio H. T. Vieira, K. Cardoso, Zheng Zeng, William Hemminger, Marcos F. B. de Abreu
{"title":"Computationally-Efficient Secured IoT Networks: Devices Fingerprinting using Low Cost Machine Learning Techniques","authors":"Abdallah S. Abdallah, Flávio H. T. Vieira, K. Cardoso, Zheng Zeng, William Hemminger, Marcos F. B. de Abreu","doi":"10.1109/ICECET55527.2022.9872952","DOIUrl":null,"url":null,"abstract":"The vulnerability of wireless devices to a well-known set of probable cyberattacks has made safeguarding the networks to which these devices connect a tremendous security issue, threatening the safety and security of thousands, if not millions, of private and public networks. Due to the rapid growth of embedded and wearable wireless devices on the market, wireless Internet of Things (IoT) devices are now one of the most vulnerable entry points because they don’t have advanced authentication procedures. This article provides a summary of our most recent findings in the development of a novel authentication and identification method for IoT ZigBee and Long Range (LoRa) devices based on the physical signals they emit. Our method relies on the extraction of a collection of unique features from the received modulated signal in order to construct a features vector for each device and then train a machine learning model using the acquired features. Following training, the trained model is evaluated by testing its ability to identify and recognize the authorized devices (i.e., those previously included in the training set) from the testing set, which contains an evenly distributed random mix of new and authorized devices. Our method employs differential constellation trace Figure (DCTF)-based features for the features vector and computationally-efficient machine learning methods, such as Quadratic Discriminant Analysis (QDA) and Gaussian Naive Bayes classifiers, which resulted in a recognition accuracy greater than 90 percent.","PeriodicalId":249012,"journal":{"name":"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)","volume":"3 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECET55527.2022.9872952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The vulnerability of wireless devices to a well-known set of probable cyberattacks has made safeguarding the networks to which these devices connect a tremendous security issue, threatening the safety and security of thousands, if not millions, of private and public networks. Due to the rapid growth of embedded and wearable wireless devices on the market, wireless Internet of Things (IoT) devices are now one of the most vulnerable entry points because they don’t have advanced authentication procedures. This article provides a summary of our most recent findings in the development of a novel authentication and identification method for IoT ZigBee and Long Range (LoRa) devices based on the physical signals they emit. Our method relies on the extraction of a collection of unique features from the received modulated signal in order to construct a features vector for each device and then train a machine learning model using the acquired features. Following training, the trained model is evaluated by testing its ability to identify and recognize the authorized devices (i.e., those previously included in the training set) from the testing set, which contains an evenly distributed random mix of new and authorized devices. Our method employs differential constellation trace Figure (DCTF)-based features for the features vector and computationally-efficient machine learning methods, such as Quadratic Discriminant Analysis (QDA) and Gaussian Naive Bayes classifiers, which resulted in a recognition accuracy greater than 90 percent.
计算高效的安全物联网网络:使用低成本机器学习技术的设备指纹识别
众所周知,无线设备容易受到一系列可能的网络攻击,这使得保护这些设备连接的网络成为一个巨大的安全问题,威胁到数千甚至数百万私人和公共网络的安全和保障。由于嵌入式和可穿戴无线设备在市场上的快速增长,无线物联网(IoT)设备现在是最脆弱的入口点之一,因为它们没有先进的认证程序。本文总结了我们在开发基于物联网ZigBee和远程(LoRa)设备发出的物理信号的新型身份验证和识别方法方面的最新发现。我们的方法依赖于从接收到的调制信号中提取一组独特的特征,以便为每个设备构建一个特征向量,然后使用获得的特征训练机器学习模型。在训练之后,通过测试其识别和识别测试集中的授权设备(即之前包含在训练集中的设备)的能力来评估训练模型,测试集中包含新设备和授权设备的均匀分布随机混合。我们的方法采用基于差分星座迹图(DCTF)的特征向量和计算效率高的机器学习方法,如二次判别分析(QDA)和高斯朴素贝叶斯分类器,导致识别准确率超过90%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信