Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security (2402.05332v1)

Published 8 Feb 2024 in cs.CR, cs.NI, and eess.SP

Abstract: Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly. This interconnectivity raises concerns about privacy and security, given the potential network-wide impact of a single compromise. To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality. This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework designed to serve as the device authentication layer within the ZT architecture, with a focus on resource-constrained IoT devices. At the core of EPS-CNN, a Convolutional Neural Network (CNN) is utilized to generate the device identity from a unique RF signal representation, known as the Double-Sided Envelope Power Spectrum (EPS), which effectively captures the device-specific hardware characteristics while ignoring device-unrelated information. Experimental evaluations show that the proposed framework achieves over 99%, 93%, and 95% testing accuracy when tested in same-domain (day, location, and channel), cross-day, and cross-location scenarios, respectively. Our findings demonstrate the superiority of the proposed framework in enhancing the accuracy, robustness, and adaptability of deep learning-based methods, thus offering a pioneering solution for enabling ZT IoT device identification.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. R. Ward and B. Beyer, “Beyondcorp: A new approach to enterprise security,” 2014.
  2. V. Stafford, “Zero trust architecture,” NIST special publication, vol. 800, p. 207, 2020.
  3. G. Hunt, G. Letey, and E. Nightingale, “The seven properties of highly secure devices,” tech. report MSR-TR-2017-16, 2017.
  4. K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, “Oracle: Optimized radio classification through convolutional neural networks,” in IEEE INFOCOM 2019-IEEE Conference on Computer Communications.   IEEE, 2019, pp. 370–378.
  5. A. Jagannath, J. Jagannath, and P. S. P. V. Kumar, “A comprehensive survey on radio frequency (rf) fingerprinting: Traditional approaches, deep learning, and open challenges,” Computer Networks, vol. 219, p. 109455, 2022.
  6. A. Elmaghbub and B. Hamdaoui, “LoRa device fingerprinting in the wild: Disclosing RF data-driven fingerprint sensitivity to deployment variability,” IEEE Access, 2021.
  7. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine learning in iot security: Current solutions and future challenges,” IEEE Comm. Surveys & Tutorials, vol. 22, no. 3, pp. 1686–1721, 2020.
  8. B. Hamdaoui and A. Elmaghbub, “Deep-learning-based device fingerprinting for increased LoRa-IoT security: Sensitivity to network deployment changes,” IEEE Network, vol. 36, no. 3, pp. 204–210, 2022.
  9. A. Al-Shawabka, F. Restuccia, S. D’Oro, T. Jian, B. C. Rendon, N. Soltani, J. Dy, S. Ioannidis, K. Chowdhury, and T. Melodia, “Exposing the fingerprint: Dissecting the impact of the wireless channel on radio fingerprinting,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications.   IEEE, 2020, pp. 646–655.
  10. S. Hanna, S. Karunaratne, and D. Cabric, “Wisig: A large-scale wifi signal dataset for receiver and channel agnostic rf fingerprinting,” IEEE Access, vol. 10, p. 22808–22818, 2022.
  11. A. Elmaghbub and B. Hamdaoui, “A needle in a haystack: Distinguishable deep neural network features for domain-agnostic device fingerprinting,” in 2023 IEEE Conference on Communications and Network Security (CNS), 2023, pp. 1–9.
  12. H. Zhou, C. Nicholls, T. Kunz, and H. Schwartz, “Frequency accuracy & stability dependencies of crystal oscillators,” Carleton University, Systems and Computer Engineering, Technical Report SCE-08-12, 2008.
  13. T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting wi-fi devices using software defined radios,” in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 3–14.
  14. A. Elmaghbub and B. Hamdaoui, “EPS: distinguishable IQ data representation for domain-adaptation learning of device fingerprints,” arXiv preprint arXiv:2308.04467, 2023.
  15. T. Parks and J. McClellan, “Chebyshev approximation for nonrecursive digital filters with linear phase,” IEEE Transactions on Circuit Theory, vol. 19, no. 2, pp. 189–194, 1972.
Citations (1)

Summary

We haven't generated a summary for this paper yet.