Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Towards Adaptive RF Fingerprint-based Authentication of IIoT devices (2311.15888v1)

Published 27 Nov 2023 in cs.CR and cs.AI

Abstract: As IoT technologies mature, they are increasingly finding their way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are of great importance. While the number of deployed IoT devices continues to increase exponentially, they still present severe cyber-security vulnerabilities. Effective authentication is paramount to support trustworthy IIoT communications, however, current solutions focus on upper-layer identity verification or key-based cryptography which are often inadequate to the heterogeneous IIoT environment. In this work, we present a first step towards achieving powerful and flexible IIoT device authentication, by leveraging AI adaptive Radio Frequency Fingerprinting technique selection and tuning, at the PHY layer for highly accurate device authentication over challenging RF environments.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (8)
  1. Statista. “Number of IoT Devices 2015-2025.” Statista. Accessed February 15, 2022. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide
  2. Rawlinson, Kristi. “HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack.” Accessed February 18, 2022. https://www.hp.com/us-en/hp-news/press-release.html?id=1744676.
  3. Simon, S., “’Internet Of Things’ Hacking Attack Led To Widespread Outage Of Popular Websites,” Oct 2016. [Online].
  4. Stanislav, Mark, and Tod Beardsley. “HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities,” n.d., 17.
  5. Simon, Scott. “‘Internet Of Things’ Hacking Attack Led To Widespread Outage Of Popular Websites.” NPR, October 22, 2016, sec. National. https://www.npr.org/2016/10/22/498954197/internet-outage-update-internet-of-things-hacking-attack-led-to-outage-of-popula.
  6. Krebs, Brian. “Mirai IoT Botnet Co-Authors Plead Guilty, Krebs on Security.” February 18, 2022. https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/.
  7. Donald Reising, Joseph Cancelleri, T. Daniel Loveless, Farah Kandah, Anthony Skjellum, “Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM”, IEEE Internet of Things Journal 2021
  8. Merchant, K., S. Revay, G. Stantchev, and B. Nousain, “Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks,” IEEE J. of Selected Topics in Signal Processing, vol. 12, no. 1, Feb 2018.

Summary

We haven't generated a summary for this paper yet.