Abstract

With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent feature, which can hardly be imitated. In this paper, we propose a rogue device identification technique via RF fingerprinting using deep learning-based generative adversarial network (GAN). Being different from traditional classification problems in RF fingerprint identifications, this work focuses on unknown accessing device recognition without prior information. A differential constellation trace figure generation process is initially employed to transform RF fingerprint features from time-domain waveforms to two-dimensional figures. Then, by using GAN, which is a kind of unsupervised learning algorithm, we can discriminate rogue devices without any prior information. An experimental verification system is built with 54 ZigBee devices regarded as recognized devices and accessing devices. A universal software radio peripheral receiver is used to capture the signal and identify the accessing devices. Experimental results show that the proposed rogue device identification method can achieve 95% identification accuracy in a real environment.

Highlights

  • The internet of things (IoT) connects various independent devices into a network and provides a possibility to interact with different machines at any time and anywhere, which brings tremendous convenience to our lives

  • 1.2 Method used in our work In this paper, a differential constellation trace figure (DCTF)-based radio frequency (RF) fingerprint extraction method is employed for rogue device identification

  • Identification of rogue devices From the 54 devices used in the experiment, one of them is selected as a recognized device whose DCTFs are used to train the discriminator

Read more

Summary

Introduction

The internet of things (IoT) connects various independent devices into a network and provides a possibility to interact with different machines at any time and anywhere, which brings tremendous convenience to our lives. Identifying IoT accessing devices and preventing intrusion is an imperative issue currently facing IoT networks [1, 2]. Traditional wireless systems primarily rely on high-level-based authentication information in terminal devices such as service set identifiers (SSID) [3], universal subscriber identity module (USIM) [4], and internet protocol (IP) or message authentication code (MAC) addresses [5]. Some authentication information, such as SSID, MAC address, are not highly reliable since they can be forged. We can authenticate the identity of accessing devices via cryptography-based algorithms, such as

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call