Authentication of Internet Devices of Things Based on the Characteristics of the Electromagnetic Signal
Abstract
Accessing unauthorized devices on a network is an security issue on Internet of Things. The unique identifiers of the devices used to authenticate them can be easily cloned, thus requiring another form of authentication. By monitoring the electromagnetic spectrum by means of a software defined radio it is possible to capture data transmitted by various wireless communication devices. These data allow us to extract unique characteristics of a device, since an electric circuit that generates the electromagnetic signal does not behave perfectly like another. These characteristics can then be used to create a unique signature, thus enabling device differentiation. There are several IoT technologies on the market and it is expected that the implementation of an authentication technique will be technology independent. For the validation of the technique are collected signals of nRF24L01+ technology devices, extracting characteristics of the magnitude of the signal. These characteristics are used in a classifier, which gives an accuracy of 94.7% in device differentiation.
References
Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., and Ray, I. (2018). IoTSense: Behavioral Fingerprinting of IoT Devices. arXiv preprint arXiv:1804.03852.
Bihl, T. J., Bauer, K. W., and Temple, M. A. (2016). Feature Selection for RF Fingerprin-ting With Multiple Discriminant Analysis and Using ZigBee Device Emissions. IEEE Transactions on Information Forensics and Security, 11(8):1862–1874.
Blossom, E. (2004). Gnu radio: tools for exploring the radio frequency spectrum. Linux journal, 2004(122):4.
BNDES (2017). Produto 8: Relatorio´ do plano de ação. Technical report, Banco Nacional do Desenvolvimento Social (BNDES).
Brik, V., Banerjee, S., Gruteser, M., and Oh, S. (2008). Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 116–127. ACM.
Choe, H. C., Poole, C. E., Andrea, M. Y., and Szu, H. H. (1995). Novel identification of intercepted signals from unknown radio transmitters. In Wavelet Applications II, volume 2491, pages 504–518. International Society for Optics and Photonics.
Danev, B. and Capkun, S. (2009). Transient-based identification of wireless sensor nodes. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, pages 25–36. IEEE Computer Society.
Danev, B., Zanetti, D., and Capkun, S. (2012). On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6.
Gomez, C. and Paradells, J. (2010). Wireless home automation networks: A survey of architectures and technologies. volume 48, pages 92–101. IEEE.
Hall, J., Barbeau, M., and Kranakis, E. (2005). Radio frequency fingerprinting for in-trusion detection in wireless networks. IEEE Transactions on Defendable and Secure Computing, 12:1–35.
J. Gubbi, R. Buyya, S. M. M. P. (2013). Internet of things (iot): A vision, architectural elements, and future directions in future generation computer systems. volume 29, pages 1645–1660.
Jolliffe, I. (2011). Principal component analysis. In International encyclopedia of statis-tical science, pages 1094–1096. Springer.
LABORA, T. (2017). SOFTware-defined gateWAY and fog computing for IoT.
Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., and Elovici, Y. (2017). Profiliot: a machine learning approach for iot device identifi-cation based on network traffic analysis. In Proceedings of the Symposium on Applied Computing, pages 506–509. ACM.
Nawir, M., Amir, A., Yaakob, N., and Lynn, O. B. (2016). Internet of things (iot): Taxo-nomy of security attacks. In 2016 3rd International Conference on Electronic Design (ICED), pages 321–326.
of Homeland Security, U. D. (2016). Strategic principles for securing the internet of things (iot). pages 1–17.
Toonstra, J. and Kinsner, W. (1995). Transient analysis and genetic algorithms for clas-sification. In WESCANEX 95. Communications, Power, and Computing. Conference Proceedings., IEEE, volume 2, pages 432–437. IEEE.
Verma, G., Yu, P., and Sadler, B. M. (2015). Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access, 3:81–88.
Xu, T., Wendt, J. B., and Potkonjak, M. (2014). Security of iot systems: Design challenges and opportunities.
Zhao, K. and Ge, L. (2013). A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013 9th International Conference on, pages 663–667. IEEE.
Zhu, Q., Wang, R., Chen, Q., Liu, Y., and Qin, W. (2010). Iot gateway: Bridgingwire-less sensor networks into internet of things. In Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, pages 347–352. Ieee.
