DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding.

Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani
{"title":"DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding.","authors":"Spyridon Mastorakis,&nbsp;Xin Zhong,&nbsp;Pei-Chi Huang,&nbsp;Reza Tourani","doi":"10.1109/ccnc49032.2021.9369515","DOIUrl":null,"url":null,"abstract":"<p><p>The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that has physical access to a device can onboard it onto their network and, potentially, tamper it (<i>e.g.</i>, install malware on the device). To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (<i>DLWIoT</i>), featuring a robust and fully automated image watermarking scheme based on deep neural networks. <i>DLWIoT</i> embeds user credentials into carrier images (<i>e.g.</i>, QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users. Our experimental results demonstrate the feasibility of <i>DLWIoT</i>, indicating that authorized users can onboard IoT devices with <i>DLWIoT</i> within 2.5-3sec.</p>","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"2021 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ccnc49032.2021.9369515","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ccnc49032.2021.9369515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2021/3/11 0:00:00","PubModel":"Epub","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that has physical access to a device can onboard it onto their network and, potentially, tamper it (e.g., install malware on the device). To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (DLWIoT), featuring a robust and fully automated image watermarking scheme based on deep neural networks. DLWIoT embeds user credentials into carrier images (e.g., QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users. Our experimental results demonstrate the feasibility of DLWIoT, indicating that authorized users can onboard IoT devices with DLWIoT within 2.5-3sec.

DLWIoT:基于深度学习的授权物联网入职水印。
在一个物联网设备数量和针对它们的篡改攻击不断增加的世界里,授权用户登录物联网设备既是一项挑战,也是一种必要。目前常用的入职技术包括QR码、pin码或序列号。这些技术通常不能防止未经授权的设备访问——QR码是物理打印在设备上的,而pin码可能包含在设备包装中。因此,任何对设备有物理访问权限的实体都可以将其装载到他们的网络中,并可能对其进行篡改(例如,在设备上安装恶意软件)。为了解决这个问题,在本文中,我们提出了一个框架,称为基于深度学习的授权物联网入职水印(DLWIoT),具有基于深度神经网络的鲁棒和全自动图像水印方案。DLWIoT将用户凭证嵌入到载体图像中(例如,打印在物联网设备上的QR码),从而仅允许授权用户登录物联网。我们的实验结果证明了DLWIoT的可行性,授权用户可以在2.5-3秒内将DLWIoT接入物联网设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信