4.1 Article

IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning

期刊

FUTURE INTERNET
卷 14, 期 2, 页码 -

出版社

MDPI
DOI: 10.3390/fi14020061

关键词

physical layer security; wireless fingerprinting; machine learning; intrusion detection

资金

  1. European Telecommunication Standard Institute (ETSI) technical committee (TC) on Smart Body Area Network (SmartBAN)
  2. European Union's Horizon 2020 Research and Innovation Program [872752]

向作者/读者索取更多资源

This paper discusses the use of physical layer security in future wireless systems as a means of communication security, with a focus on node authentication and spoofing detection in wireless sensor networks. Through machine learning and wireless fingerprinting, nodes can be effectively classified and verified for identity, improving the security performance of the system.
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigms, such as the Internet of Things, traditional methods of security may be difficult to implement due to the radical change of requirements and constraints. In such contexts, physical layer security is a promising additional means to realize communication security with low complexity. In particular, this paper focuses on node authentication and spoofing detection in an actual wireless sensor network (WSN), where multiple nodes communicate with a sink node. Nodes are in fixed positions, but the communication channels varies due to the scatterers' movement. In the proposed security framework, the sink node is able to perform a continuous authentication of nodes during communication based on wireless fingerprinting. In particular, a machine learning approach is used for authorized nodes classification by means of the identification of specific attributes of their wireless channel. Then classification results are compared with the node ID in order to detect if the message has been generated by a node other than its claimed source. Finally, in order to increase the spoofing detection performance in small networks, the use of low-complexity sentinel nodes is proposed here. Results show the good performance of the proposed method that is suitable for actual implementation in a WSN.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.1
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据