Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning

J. Bassey, D. Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker
{"title":"Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning","authors":"J. Bassey, D. Adesina, Xiangfang Li, Lijun Qian, Alexander J. Aved, Timothy S. Kroecker","doi":"10.1109/FMEC.2019.8795319","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) and 4G/5G wireless networks have added huge number of devices and new services, where commercial-of-the-shelf (COTS) IoT devices have been deployed extensively. To ensure secure operations of these systems with wireless transmission capabilities, Radio Frequency (RF) surveillance is important to monitor their activities in RF spectrum and detect unauthorized IoT devices. Specifically, in order to prevent an adversary from impersonating legitimate users using identical devices from the same manufacturer, unique “signatures” must be obtained for every individual device in order to uniquely identify each device. In this study, a novel intrusion detection method is proposed to detect unauthorized IoT devices using deep learning. The proposed method is based on RF fingerprinting since physical layer based features are device specific and more difficult to impersonate. RF traces are collected from six “identical” ZigBee devices via a USRP based test bed. The traces span a range of Signal-to-Noise Ratio, to ensure robustness of the model. A convolutional neural network is used to extract features from the RF traces, and dimension reduction and de-correlation are performed on the extracted features. The reduced features are then clustered to identify IoT devices. We show that the proposed method is able to identify devices that are not observed during training. The results not only highlight the benefit of deep learning based feature extraction, but also show promising prospects for being able to distinguish new devices (classes) that are not observed during training.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC.2019.8795319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

Abstract

Internet of Things (IoT) and 4G/5G wireless networks have added huge number of devices and new services, where commercial-of-the-shelf (COTS) IoT devices have been deployed extensively. To ensure secure operations of these systems with wireless transmission capabilities, Radio Frequency (RF) surveillance is important to monitor their activities in RF spectrum and detect unauthorized IoT devices. Specifically, in order to prevent an adversary from impersonating legitimate users using identical devices from the same manufacturer, unique “signatures” must be obtained for every individual device in order to uniquely identify each device. In this study, a novel intrusion detection method is proposed to detect unauthorized IoT devices using deep learning. The proposed method is based on RF fingerprinting since physical layer based features are device specific and more difficult to impersonate. RF traces are collected from six “identical” ZigBee devices via a USRP based test bed. The traces span a range of Signal-to-Noise Ratio, to ensure robustness of the model. A convolutional neural network is used to extract features from the RF traces, and dimension reduction and de-correlation are performed on the extracted features. The reduced features are then clustered to identify IoT devices. We show that the proposed method is able to identify devices that are not observed during training. The results not only highlight the benefit of deep learning based feature extraction, but also show promising prospects for being able to distinguish new devices (classes) that are not observed during training.
基于深度学习射频指纹的物联网设备入侵检测
物联网(IoT)和4G/5G无线网络增加了大量设备和新服务,商用货架(COTS)物联网设备已被广泛部署。为了确保这些具有无线传输能力的系统的安全运行,射频(RF)监控对于监控其在RF频谱中的活动并检测未经授权的物联网设备非常重要。具体来说,为了防止攻击者使用来自同一制造商的相同设备冒充合法用户,必须为每个单独的设备获得唯一的“签名”,以便唯一地标识每个设备。在本研究中,提出了一种新的入侵检测方法,利用深度学习检测未经授权的物联网设备。所提出的方法是基于射频指纹,因为基于物理层的特征是特定于设备的,更难以模拟。射频走线通过基于USRP的测试平台从六个“相同”的ZigBee设备收集。迹线跨越一定范围的信噪比,以确保模型的鲁棒性。利用卷积神经网络从射频迹中提取特征,并对提取的特征进行降维和去相关处理。然后将减少的特征聚类以识别物联网设备。我们表明,所提出的方法能够识别训练期间未观察到的设备。结果不仅突出了基于深度学习的特征提取的好处,而且显示了能够区分在训练期间未观察到的新设备(类)的良好前景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信