8 research outputs found

    Spoofing Attack Detection in the Physical Layer with Commutative Neural Networks

    Full text link
    In a spoofing attack, an attacker impersonates a legitimate user to access or tamper with data intended for or produced by the legitimate user. In wireless communication systems, these attacks may be detected by relying on features of the channel and transmitter radios. In this context, a popular approach is to exploit the dependence of the received signal strength (RSS) at multiple receivers or access points with respect to the spatial location of the transmitter. Existing schemes rely on long-term estimates, which makes it difficult to distinguish spoofing from movement of a legitimate user. This limitation is here addressed by means of a deep neural network that implicitly learns the distribution of pairs of short-term RSS vector estimates. The adopted network architecture imposes the invariance to permutations of the input (commutativity) that the decision problem exhibits. The merits of the proposed algorithm are corroborated on a data set that we collected

    Sequential Transient Detection for RF Fingerprinting

    Get PDF
    In this paper, a sequential transient detection method for radio frequency (RF) fingerprinting used in the identification of wireless devices is proposed. To the best knowledge of the authors, sequential detection of transient signals for RF fingerprinting has not been considered in the literature. The proposed method is based on an approximate implementation of the generalized likelihood ratio algorithm. The method can be implemented online in a recursive manner with low computational and memory requirements. The transients of wireless transmitters are detected by using the likelihood ratio of the observations without the requirement of any a priori knowledge about the transmitted signals. The performance of the method was evaluated using experimental data collected from 16 Wi-Fi transmitters and compared to those of two existing methods. The experimental test results showed that the proposed method can be used to detect the transient signals with a low detection delay. Our proposed method estimates transient starting points 20-times faster compared to an existing robust method, as well as providing a classification performance of a mean accuracy close to 95%

    LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review

    Get PDF
    As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions

    Radio frequency fingerprint identification for Internet of Things: A survey

    Get PDF
    Radio frequency fingerprint (RFF) identification is a promising technique for identifying Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF identification, which covers various aspects ranging from related definitions to details of each stage in the identification process, namely signal preprocessing, RFF feature extraction, further processing, and RFF identification. Specifically, three main steps of preprocessing are summarized, including carrier frequency offset estimation, noise elimination, and channel cancellation. Besides, three kinds of RFFs are categorized, comprising I/Q signal-based, parameter-based, and transformation-based features. Meanwhile, feature fusion and feature dimension reduction are elaborated as two main further processing methods. Furthermore, a novel framework is established from the perspective of closed set and open set problems, and the related state-of-the-art methodologies are investigated, including approaches based on traditional machine learning, deep learning, and generative models. Additionally, we highlight the challenges faced by RFF identification and point out future research trends in this field
    corecore