Abstract

Data attacks from illegal access devices of the Internet of Things will cause serious interference and threats to the entire network. It is difficult to ensure the security of the communication system only by relying on traditional application layer password authentication methods. Therefore, it is of great significance to design an effective physical layer authentication system based on radio frequency fingerprints. Regarding the issue above, this paper proposes a novel physical layer authentication method for Internet of Things based on differential contour stellar. Through the test of identification and authentication of 20 WiFi network card devices from same manufacturer, same type and same batch, the recognition accuracy rate can reach 98.6% by the proposed method. The proposed method can improve the effect of radio frequency fingerprint identification from three aspects: i. The differential processing can effectively reduce the negative influence of phase rotation caused by carrier frequency offset and Doppler effects; ii. The color processing can effectively reduce the negative influence of random noise caused by channel noise; iii. It is suitable for processing large-scale networks and the massive data they bring.

Highlights

  • Information security is the key to building a reliable and robust Internet of Things (IoT)

  • The traditional authentication mechanism is implemented at the application layer, using cryptographic algorithms to generate numerical results that are difficult for third parties to counterfeit, but this mechanism has risks such as protocol security vulnerabilities and key leakage

  • Research on a low error rate, high efficiency, and low cost individual identification method for communication radiation sources is the key to ensuring the stable operation of the Internet of Things

Read more

Summary

Introduction

Information security is the key to building a reliable and robust Internet of Things (IoT). The traditional authentication mechanism is implemented at the application layer, using cryptographic algorithms to generate numerical results that are difficult for third parties to counterfeit, but this mechanism has risks such as protocol security vulnerabilities and key leakage. The terminal equipment of the perception layer of the Internet of Things has the characteristics of diversification, intelligence, complexity and a large number. The traditional authentication mechanism can guarantee information security to a certain extent, it is not suitable for processing large-scale networks and the massive data they bring, and it is difficult to meet the information security requirements of the Internet of Things. Research on a low error rate, high efficiency, and low cost individual identification method for communication radiation sources is the key to ensuring the stable operation of the Internet of Things

Methods
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.