Radio frequency fingerprinting identification for Zigbee via lightweight CNN

被引:27
|
作者
Qing, Guangwei [1 ]
Wang, Huifang [1 ]
Zhang, Tingping [2 ]
机构
[1] Nanjing Special Equipment Safety Supervis Inspect, Nanjing 210066, Peoples R China
[2] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
关键词
Radio frequency fingerprinting; Zigbee; Convolution neural network (CNN); Lightweight CNN; WIRELESS;
D O I
10.1016/j.phycom.2020.101250
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Zigbee is a popular communication protocol in the Internet of things (IoT) which shows great potential in smart home. However, the smart device has the risk of being hijacked by unauthorized users and may result in privacy disclosure. Traditional device identification is based on cryptography which is easy to be cracked. Recently, radio frequency fingerprinting identification (RFFID) is popular in device identification. Traditional RFFID's power consumption and cost is unacceptable to Zigbee. In order to reduce the cost, more effective model can be used to reduce the number of neurons. This paper proposes a RFFID method based on lightweight convolution neural network (CNN) which can adopt low power consumption and cost. The simulation result shows that this method can identification Zigbee device, and the accuracy reached 100%. Also, the parameter has reduced to about 93%. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:8
相关论文
共 50 条
  • [11] Radio Frequency Transmitter Identification Based on Fingerprinting and Convolutional Neural Network
    Cheng, Qi
    Li, Jie
    Gao, Xiaoli
    Fan, Huaqi
    Jiang, Ting
    2022 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2022), 2022, : 195 - 199
  • [12] FBSIeuth: Fake Base Station Forensics via Radio Frequency Fingerprinting
    Zhuang, Zhou
    Ji, Xiaoyu
    Zhang, Taimin
    Zhang, Juchuan
    Xu, Wenyuan
    Li, Zhenhua
    Liu, Yunhao
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 261 - 272
  • [13] Lightweight one-time password authentication scheme based on radio-frequency fingerprinting
    Chen, Yi
    Wen, Hong
    Song, Huanhuan
    Chen, Songlin
    Xie, Feiyi
    Yang, Qing
    Hu, Lin
    IET COMMUNICATIONS, 2018, 12 (12) : 1477 - 1484
  • [14] Identification of Legacy Radios in a Cognitive Radio Network Using a Radio Frequency Fingerprinting Based Method
    Hu, Nansai
    Yao, Yu-Dong
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [15] Reconstructing a lightweight security protocol in the radio-frequency identification systems
    Khorasgani, Alireza Abdellahi
    Sajadieh, Mahdi
    Yazdani, Mohammad Rouhollah
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2023, 17 (3-4): : 209 - 223
  • [16] A Secure Lightweight Mutually Authenticated Radio Frequency Identification (RFID) Protocol
    Kumar, Varinder
    Mohanty, Sujata
    2018 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2018, : 914 - 918
  • [17] A Secure Protocol for Ultra lightweight Radio Frequency Identification (RFID) Tags
    Eghdamian, Aras
    Samsudin, Azman
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 200 - 213
  • [18] Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation
    Chen, Zhiwei
    Pang, Zhibo
    Hou, Wenjing
    Wen, Hong
    Wen, Mi
    Zhao, Runhui
    Tang, Tao
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2391 - 2400
  • [19] Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration
    Xie, Feiyi
    Wen, Hong
    Wu, Jinsong
    Hou, Wenjing
    Song, Huanhuan
    Zhang, Tengyue
    Liao, Runfa
    Jiang, Yixin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (03): : 276 - 286
  • [20] Radio Frequency Fingerprinting and its Challenges
    Rehman, Saeed Ur
    Sowerby, Kevin W.
    Alam, Shafiq
    Ardekani, Iman
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 496 - 497