低功耗嵌入式物联网设备的智能指纹识别技术

Varun Kohli;Muhammad Naveed Aman;Biplab Sikdar
{"title":"低功耗嵌入式物联网设备的智能指纹识别技术","authors":"Varun Kohli;Muhammad Naveed Aman;Biplab Sikdar","doi":"10.1109/TAI.2024.3386498","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) has been a popular topic for research and development in the past decade. The resource-constrained and wireless nature of IoT devices presents a large surface of vulnerabilities, and traditional network security methods involving complex cryptography are not feasible. Studies show that Denial of Service (DoS), physical intrusion, spoofing, and node forgery are prevalent threats in the IoT, and there is a need for robust, lightweight device fingerprinting schemes. We identify eight criteria of effective fingerprinting methods for resource-constrained IoT devices and propose an intelligent, lightweight, whitelist-based fingerprinting method that satisfies these properties. The proposed method uses the power-up Static Random Access Memory (SRAM) stack as fingerprint features and autoencoder networks (AEN) for fingerprint registration and verification. We also present a threat mitigation framework based on network isolation levels to handle potential and identified threats. Experiments are conducted with a heterogeneous pool of 10 advanced virtual reduced instruction set computer (AVR) Harvard architecture prover devices from different vendors, and Dell Latitude and Dell XPS 13 laptops are used as verifier testbeds. The proposed method has a 99.9% accuracy, 100% precision, and 99.6% recall on known and unknown heterogeneous devices, which is an improvement over several past works. The independence of fingerprints stored in the AENs enables easy distribution and update, and the observed evaluation latency (\n<inline-formula><tex-math>$\\sim$</tex-math></inline-formula>\n \n<inline-formula><tex-math>$10^{-4}$</tex-math></inline-formula>\n s) and data collection latency (\n<inline-formula><tex-math>$\\sim$</tex-math></inline-formula>\n \n<inline-formula><tex-math>$1$</tex-math></inline-formula>\n s) make our method practical for real-world scenarios. Lastly, we analyze the proposed method with regard to the eight criteria and highlight its limitations for future improvement.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4519-4534"},"PeriodicalIF":0.0000,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices\",\"authors\":\"Varun Kohli;Muhammad Naveed Aman;Biplab Sikdar\",\"doi\":\"10.1109/TAI.2024.3386498\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) has been a popular topic for research and development in the past decade. The resource-constrained and wireless nature of IoT devices presents a large surface of vulnerabilities, and traditional network security methods involving complex cryptography are not feasible. Studies show that Denial of Service (DoS), physical intrusion, spoofing, and node forgery are prevalent threats in the IoT, and there is a need for robust, lightweight device fingerprinting schemes. We identify eight criteria of effective fingerprinting methods for resource-constrained IoT devices and propose an intelligent, lightweight, whitelist-based fingerprinting method that satisfies these properties. The proposed method uses the power-up Static Random Access Memory (SRAM) stack as fingerprint features and autoencoder networks (AEN) for fingerprint registration and verification. We also present a threat mitigation framework based on network isolation levels to handle potential and identified threats. Experiments are conducted with a heterogeneous pool of 10 advanced virtual reduced instruction set computer (AVR) Harvard architecture prover devices from different vendors, and Dell Latitude and Dell XPS 13 laptops are used as verifier testbeds. The proposed method has a 99.9% accuracy, 100% precision, and 99.6% recall on known and unknown heterogeneous devices, which is an improvement over several past works. The independence of fingerprints stored in the AENs enables easy distribution and update, and the observed evaluation latency (\\n<inline-formula><tex-math>$\\\\sim$</tex-math></inline-formula>\\n \\n<inline-formula><tex-math>$10^{-4}$</tex-math></inline-formula>\\n s) and data collection latency (\\n<inline-formula><tex-math>$\\\\sim$</tex-math></inline-formula>\\n \\n<inline-formula><tex-math>$1$</tex-math></inline-formula>\\n s) make our method practical for real-world scenarios. Lastly, we analyze the proposed method with regard to the eight criteria and highlight its limitations for future improvement.\",\"PeriodicalId\":73305,\"journal\":{\"name\":\"IEEE transactions on artificial intelligence\",\"volume\":\"5 9\",\"pages\":\"4519-4534\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE transactions on artificial intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10495123/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE transactions on artificial intelligence","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10495123/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)是近十年来研究和开发的热门话题。物联网设备的资源受限和无线特性带来了巨大的漏洞,而涉及复杂密码学的传统网络安全方法并不可行。研究表明,拒绝服务(DoS)、物理入侵、欺骗和节点伪造是物联网中普遍存在的威胁,因此需要稳健、轻量级的设备指纹方案。我们为资源受限的物联网设备确定了有效指纹识别方法的八项标准,并提出了一种智能、轻量级、基于白名单的指纹识别方法,它能满足这些特性。所提出的方法使用开机静态随机存取存储器(SRAM)堆栈作为指纹特征,并使用自动编码器网络(AEN)进行指纹注册和验证。我们还提出了一个基于网络隔离级别的威胁缓解框架,以处理潜在的和已识别的威胁。实验使用了由不同供应商提供的 10 台高级虚拟精简指令集计算机(AVR)哈佛架构验证器设备组成的异构池,并使用戴尔 Latitude 和戴尔 XPS 13 笔记本电脑作为验证器测试平台。所提出的方法在已知和未知异构设备上的准确率为 99.9%,精确率为 100%,召回率为 99.6%,比过去的几项工作有所提高。存储在AEN中的指纹的独立性使其易于分发和更新,观察到的评估延迟($\sim$ $10^{-4}$ s)和数据收集延迟($\sim$ $1$ s)使我们的方法在现实世界的应用场景中非常实用。最后,我们根据八项标准对所提出的方法进行了分析,并强调了该方法的局限性,以供今后改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices
The Internet of Things (IoT) has been a popular topic for research and development in the past decade. The resource-constrained and wireless nature of IoT devices presents a large surface of vulnerabilities, and traditional network security methods involving complex cryptography are not feasible. Studies show that Denial of Service (DoS), physical intrusion, spoofing, and node forgery are prevalent threats in the IoT, and there is a need for robust, lightweight device fingerprinting schemes. We identify eight criteria of effective fingerprinting methods for resource-constrained IoT devices and propose an intelligent, lightweight, whitelist-based fingerprinting method that satisfies these properties. The proposed method uses the power-up Static Random Access Memory (SRAM) stack as fingerprint features and autoencoder networks (AEN) for fingerprint registration and verification. We also present a threat mitigation framework based on network isolation levels to handle potential and identified threats. Experiments are conducted with a heterogeneous pool of 10 advanced virtual reduced instruction set computer (AVR) Harvard architecture prover devices from different vendors, and Dell Latitude and Dell XPS 13 laptops are used as verifier testbeds. The proposed method has a 99.9% accuracy, 100% precision, and 99.6% recall on known and unknown heterogeneous devices, which is an improvement over several past works. The independence of fingerprints stored in the AENs enables easy distribution and update, and the observed evaluation latency ( $\sim$ $10^{-4}$ s) and data collection latency ( $\sim$ $1$ s) make our method practical for real-world scenarios. Lastly, we analyze the proposed method with regard to the eight criteria and highlight its limitations for future improvement.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信