{"title":"关于物联网设备的认证","authors":"Yaman Sharaf-Dabbagh, W. Saad","doi":"10.1109/WoWMoM.2016.7523532","DOIUrl":null,"url":null,"abstract":"Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security and privacy solutions. Conventional security solutions fail to meet the IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an object authentication framework is proposed to exploit device-specific information, called fingerprints, to authenticate objects in the IoT. The proposed framework is shown to effectively track the effects of physical environment on objects' fingerprints via a transfer learning tool to differentiate between security attacks and normal change in fingerprints. Simulation results show that the proposed framework improves the authentication accuracy.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"63","resultStr":"{\"title\":\"On the authentication of devices in the Internet of things\",\"authors\":\"Yaman Sharaf-Dabbagh, W. Saad\",\"doi\":\"10.1109/WoWMoM.2016.7523532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security and privacy solutions. Conventional security solutions fail to meet the IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an object authentication framework is proposed to exploit device-specific information, called fingerprints, to authenticate objects in the IoT. The proposed framework is shown to effectively track the effects of physical environment on objects' fingerprints via a transfer learning tool to differentiate between security attacks and normal change in fingerprints. Simulation results show that the proposed framework improves the authentication accuracy.\",\"PeriodicalId\":187747,\"journal\":{\"name\":\"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"63\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WoWMoM.2016.7523532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WoWMoM.2016.7523532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the authentication of devices in the Internet of things
Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security and privacy solutions. Conventional security solutions fail to meet the IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an object authentication framework is proposed to exploit device-specific information, called fingerprints, to authenticate objects in the IoT. The proposed framework is shown to effectively track the effects of physical environment on objects' fingerprints via a transfer learning tool to differentiate between security attacks and normal change in fingerprints. Simulation results show that the proposed framework improves the authentication accuracy.