Attacker Identification In LoRaWAN Through Physical Channel Fingerprinting

被引:0
|
作者
Alfayoumi, Sobhi [1 ]
Vilajosana, Xavier [2 ]
机构
[1] Univ Oberta Catalunya, IT Multimedia & Telecommun Dept, Barcelona, Spain
[2] Univ Oberta Catalunya, Barcelona, Spain
基金
欧盟地平线“2020”;
关键词
Anomaly detection; Binary classification; LoRaWAN; IoT security; Man in the Middle;
D O I
10.1109/VTC2022-Spring54318.2022.9860674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's environment, wireless networks and IoT technologies have been integrated into a variety of applications. One of the most essential IoT technologies is the Long-Range Wide Area Network (LoRaWAN) because of its capacity to combine long-range communication with energy-efficiency. Assuring network traffic safety and security is a critical issue in a wide range of today's industries, and security is a critical feature now that the digitization is accelerating. The "Man in the Middle" attack is one of the most dangerous and difficult to identify threats to wireless networks, and may become a critical threat for digitized assets and industrial processes. In this study, we look at an alternative approach to resolving this issue in order to assure the security of wireless networks. The technique is based on the "Behavioural Security Method," in which we employed a Feed-forward neural network model to build a binary classifier that can discriminate and recognize the original desired data while detecting the attacker's data. As a result, we discovered that as long as the attacker and the targeted node are not colocated, the model can discriminate between data coming from the source and data coming from the attacker with 99.6 percent accuracy. If, on the other hand, they are co-located, the model will fail to identify the source of data and the model's accuracy will drop to roughly 50%.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach
    Hoang Duy Trinh
    Gambin, Angel Fernandez
    Giupponi, Lorenza
    Rossi, Michele
    Dini, Paolo
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1946 - 1961
  • [2] Polysaccharide identification through oligosaccharide fingerprinting
    Nandita, Eshani
    Bacalzo, Nikita P., Jr.
    Ranque, Christopher L.
    Amicucci, Matthew J.
    Galermo, Ace
    Lebrilla, Carlito B.
    CARBOHYDRATE POLYMERS, 2021, 257
  • [3] Impersonator identification through dynamic fingerprinting
    Steel, Chad M. S.
    Lu, Chang-Tien
    DIGITAL INVESTIGATION, 2008, 5 (1-2) : 60 - 70
  • [4] Authenticated Side Channel via Physical Layer Fingerprinting
    Yu, Paul L.
    Perazzone, Jake B.
    Sadler, Brian M.
    Blum, Rick S.
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 631 - 635
  • [5] Device Re-identification in LoRaWAN through Messages Linkage
    Pelissier, Samuel
    Cunche, Mathieu
    Roca, Vincent
    Donsez, Didier
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 98 - 103
  • [6] RATTLE: Train Identification through Audio Fingerprinting
    Ciabattini, Leonardo
    Sciullo, Luca
    Esposito, Alfonso
    Zyrianoff, Ivan
    Di Felice, Marco
    2024 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING, SMARTCOMP 2024, 2024, : 47 - 54
  • [7] Robust Website Fingerprinting Through the Cache Occupancy Channel
    Shusterman, Anatoly
    Kang, Lachlan
    Haskal, Yarden
    Meltser, Yosef
    Mittal, Prateek
    Oren, Yossi
    Yarom, Yuval
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 639 - 656
  • [8] On the Limits of LoRaWAN Channel Access
    Bankov, Dmitry
    Khorov, Evgeny
    Lyakhov, Andrey
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING AND TELECOMMUNICATION (ENT 2016), 2016, : 10 - 14
  • [9] Detecting Mobile Traffic Anomalies Through Physical Control Channel Fingerprinting: A Deep Semi-Supervised Approach
    Hoang Duy Trinh
    Zeydan, Engin
    Giupponi, Lorenza
    Dini, Paolo
    IEEE ACCESS, 2019, 7 : 152187 - 152201
  • [10] Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment
    Dadras, Soodeh
    Dadras, Sara
    Winstead, Chris
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 5560 - 5567