Attacker Identification In LoRaWAN Through Physical Channel Fingerprinting

被引:0
|
作者
Alfayoumi, Sobhi [1 ]
Vilajosana, Xavier [2 ]
机构
[1] Univ Oberta Catalunya, IT Multimedia & Telecommun Dept, Barcelona, Spain
[2] Univ Oberta Catalunya, Barcelona, Spain
来源
2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING) | 2022年
基金
欧盟地平线“2020”;
关键词
Anomaly detection; Binary classification; LoRaWAN; IoT security; Man in the Middle;
D O I
10.1109/VTC2022-Spring54318.2022.9860674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's environment, wireless networks and IoT technologies have been integrated into a variety of applications. One of the most essential IoT technologies is the Long-Range Wide Area Network (LoRaWAN) because of its capacity to combine long-range communication with energy-efficiency. Assuring network traffic safety and security is a critical issue in a wide range of today's industries, and security is a critical feature now that the digitization is accelerating. The "Man in the Middle" attack is one of the most dangerous and difficult to identify threats to wireless networks, and may become a critical threat for digitized assets and industrial processes. In this study, we look at an alternative approach to resolving this issue in order to assure the security of wireless networks. The technique is based on the "Behavioural Security Method," in which we employed a Feed-forward neural network model to build a binary classifier that can discriminate and recognize the original desired data while detecting the attacker's data. As a result, we discovered that as long as the attacker and the targeted node are not colocated, the model can discriminate between data coming from the source and data coming from the attacker with 99.6 percent accuracy. If, on the other hand, they are co-located, the model will fail to identify the source of data and the model's accuracy will drop to roughly 50%.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Attacker Detection Game in Wireless Networks with Channel Uncertainty
    Wang, Wenjing
    Chatterjee, Mainak
    Kwiat, Kevin
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [22] Improving Channel Utilization of LoRaWAN by using Novel Channel Access Mechanism
    Ahsan, Shahzeb
    Hassan, Syed Ali
    Adeel, Ahsan
    Qureshi, Hassaan Khaliq
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1656 - 1661
  • [23] Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting
    Zhang, Guozhu
    Xia, Luning
    Jia, Shijie
    Ji, Yafei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 284 - 299
  • [24] Physical Layer Identification of Embedded Devices Using RF-DNA Fingerprinting
    Cobb, William E.
    Garcia, Eric W.
    Temple, Michael A.
    Baldwin, Rusty O.
    Kim, Yong C.
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 2168 - 2173
  • [25] Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
    Shusterman, Anatoly
    Avraham, Zohar
    Croitoru, Eliezer
    Haskal, Yarden
    Kang, Lachlan
    Levi, Dvir
    Meltser, Yosef
    Mittal, Prateek
    Oren, Yossi
    Yarom, Yuval
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2042 - 2060
  • [26] Generalized attacker and attack models for Cyber Physical Systems
    Adepu, Sridhar
    Mathur, Aditya
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 283 - 292
  • [27] Encouraging Attacker Retreat through Defender Cooperation
    Fuch, Zachariah E.
    Khargonekar, Pramod P.
    2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 235 - 242
  • [28] Attacker Traceability on Ethereum through Graph Analysis
    Zhu, Hang
    Niu, Weina
    Liao, Xuhan
    Zhang, Xiaosong
    Wang, Xiaofen
    Li, Beibei
    He, Zheyuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Constraining Attacker Capabilities Through Actuator Saturation
    Kafash, Sahand Hadizadeh
    Giraldo, Jairo
    Murguia, Carlos
    Cardenas, Alvaro A.
    Ruths, Justin
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 986 - 991
  • [30] On Attacker Models and Profiles for Cyber-Physical Systems
    Rocchetto, Marco
    Tippenhauer, Nils Ole
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 427 - 449