Attacker Identification In LoRaWAN Through Physical Channel Fingerprinting

被引:0
|
作者
Alfayoumi, Sobhi [1 ]
Vilajosana, Xavier [2 ]
机构
[1] Univ Oberta Catalunya, IT Multimedia & Telecommun Dept, Barcelona, Spain
[2] Univ Oberta Catalunya, Barcelona, Spain
基金
欧盟地平线“2020”;
关键词
Anomaly detection; Binary classification; LoRaWAN; IoT security; Man in the Middle;
D O I
10.1109/VTC2022-Spring54318.2022.9860674
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's environment, wireless networks and IoT technologies have been integrated into a variety of applications. One of the most essential IoT technologies is the Long-Range Wide Area Network (LoRaWAN) because of its capacity to combine long-range communication with energy-efficiency. Assuring network traffic safety and security is a critical issue in a wide range of today's industries, and security is a critical feature now that the digitization is accelerating. The "Man in the Middle" attack is one of the most dangerous and difficult to identify threats to wireless networks, and may become a critical threat for digitized assets and industrial processes. In this study, we look at an alternative approach to resolving this issue in order to assure the security of wireless networks. The technique is based on the "Behavioural Security Method," in which we employed a Feed-forward neural network model to build a binary classifier that can discriminate and recognize the original desired data while detecting the attacker's data. As a result, we discovered that as long as the attacker and the targeted node are not colocated, the model can discriminate between data coming from the source and data coming from the attacker with 99.6 percent accuracy. If, on the other hand, they are co-located, the model will fail to identify the source of data and the model's accuracy will drop to roughly 50%.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63
  • [42] Understanding Influences of Driving Fatigue on Driver Fingerprinting Identification Through Deep Learning
    Sun, Yifan
    Wu, Chaozhong
    Zhang, Hui
    Ferreira, Sara
    Tavares, Jose Pedro
    Ding, Naikan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (02) : 1829 - 1844
  • [43] Network operator identification through RF fingerprinting of base stations<bold> </bold>
    Lavoie, Philippe
    Naboulsi, Diala
    Gagnon, Francois
    2024 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CCECE 2024, 2024, : 182 - 183
  • [44] Q-ID: Lightweight Quantum Network Server Identification Through Fingerprinting
    Wu, Jindi
    Hu, Tianjie
    Li, Qun
    IEEE NETWORK, 2024, 38 (05): : 146 - 152
  • [45] Remote physical device fingerprinting
    Kohno, T
    Broido, A
    Claffy, KC
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) : 93 - 108
  • [46] Worldwide Connectivity for the Internet of Things Through LoRaWAN
    Vangelista, Lorenzo
    Centenaro, Marco
    FUTURE INTERNET, 2019, 11 (03):
  • [47] Remote physical device fingerprinting
    Kohno, T
    Broido, A
    Claffy, KC
    2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 211 - 225
  • [48] Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN
    Xu, Weitao
    Jha, Sanjay
    Hu, Wen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 231 - 236
  • [49] Monitoring for Analytes through LoRa and LoRaWAN Technology
    Niles, Kendall
    Ray, Jason
    Niles, Kenneth
    Maxwell, Andrew
    Netchaev, Anton
    BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 152 - 159
  • [50] Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network
    Avatefipour, Omid
    Hafeez, Azeem
    Tayyab, Muhammad
    Malik, Hafiz
    2017 IEEE WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2017,