Attacker Identification In LoRaWAN Through Physical Channel Fingerprinting

被引:0
|
作者
Alfayoumi, Sobhi [1 ]
Vilajosana, Xavier [2 ]
机构
[1] Univ Oberta Catalunya, IT Multimedia & Telecommun Dept, Barcelona, Spain
[2] Univ Oberta Catalunya, Barcelona, Spain
基金
欧盟地平线“2020”;
关键词
Anomaly detection; Binary classification; LoRaWAN; IoT security; Man in the Middle;
D O I
10.1109/VTC2022-Spring54318.2022.9860674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's environment, wireless networks and IoT technologies have been integrated into a variety of applications. One of the most essential IoT technologies is the Long-Range Wide Area Network (LoRaWAN) because of its capacity to combine long-range communication with energy-efficiency. Assuring network traffic safety and security is a critical issue in a wide range of today's industries, and security is a critical feature now that the digitization is accelerating. The "Man in the Middle" attack is one of the most dangerous and difficult to identify threats to wireless networks, and may become a critical threat for digitized assets and industrial processes. In this study, we look at an alternative approach to resolving this issue in order to assure the security of wireless networks. The technique is based on the "Behavioural Security Method," in which we employed a Feed-forward neural network model to build a binary classifier that can discriminate and recognize the original desired data while detecting the attacker's data. As a result, we discovered that as long as the attacker and the targeted node are not colocated, the model can discriminate between data coming from the source and data coming from the attacker with 99.6 percent accuracy. If, on the other hand, they are co-located, the model will fail to identify the source of data and the model's accuracy will drop to roughly 50%.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Modeling attacker behavior in Cyber-Physical-Systems
    Betancourt, Juan
    Pardo Gonzalez, German
    Rodriguez Gonzalez, Samuel
    Cuellar, Daniel
    Gomez, Camilo
    Mariotti, Franceso
    Montecchi, Leonardo
    Lollini, Paolo
    PROCEEDINGS OF 2022 11TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, LADC 2022, 2022, : 117 - 124
  • [32] FINGERPRINTING: A MANUAL OF IDENTIFICATION
    Cummins, Harold
    JOURNAL OF CRIMINAL LAW & CRIMINOLOGY, 1941, 31 (06): : 772 - 773
  • [33] Bacterial identification and fingerprinting
    Kashi, Y
    FUTURE TECHNOLOGIES FOR FOOD PRODUCTION AND FUTURE FOOD SCIENTISTS, PROCEEDINGS, 2003, (162): : 47 - 49
  • [34] Audio fingerprinting scheme by temporal filtering for audio identification immune to channel-distortion
    Park, M
    Kim, HR
    Shin, DH
    Yang, SH
    INFORMATION RETRIEVAL TECHNOLOGY, PROCEEDINGS, 2005, 3689 : 528 - 533
  • [35] Attacker Identification and Intrusion Detection for In-Vehicle Networks
    Ning, Jing
    Wang, Jiadai
    Liu, Jiajia
    Kato, Nei
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1927 - 1930
  • [36] ANN-based LoRaWAN Channel Propagation Model
    Habaebi M.H.
    Rofi A.S.M.
    Islam M.R.
    Basahel A.
    International Journal of Interactive Mobile Technologies, 2022, 16 (11) : 91 - 106
  • [37] Tiny Machine Learning for Efficient Channel Selection in LoRaWAN
    Ali Lodhi, Muhammad
    Obaidat, Mohammad S.
    Wang, Lei
    Mahmood, Khalid
    Ibrahim Qureshi, Khalid
    Chen, Jenhui
    Hsiao, Kuei-Fang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (19): : 30714 - 30724
  • [38] Mathematical Model of LoRaWAN Channel Access with Capture Effect
    Bankov, Dmitry
    Khorov, Evgeny
    Lyakhov, Andrey
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [39] An Experimental Study Towards Attacker Identification in Automotive Networks
    Ning, Jing
    Liu, Jiajia
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [40] Identification and Detecting of Attacker in a Purchase Portal using Honeywords
    Brindtha, J.
    Hithaeishini, K. R.
    Komala, R.
    Abirami, G.
    Arul, U.
    2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 389 - 393