Impersonation Attack Detection in IoT Networks

The deployment of Internet of Things (IoT) networks is growing at an extraordinary speed from last decade and has expanded the interconnection of billions of nodes, providing a range of flexible communication and computing services, etc. We note that this significant expansion of the IoT surface has expanded the attack surfaces and is a danger to companies of every size from security aspects. The IoT devices are easy to compromise and therefore the attacker can easily act as an impersonator to impersonate other legitimate IoT nodes. This is known as impersonation attacks or spoofing attacks in wireless IoT networks. In this paper, we propose a new methodology to detect an impersonation attack in IoT networks. We use Mahalanobis Distance correlation theory based two-stage attack detection model to resist IoT node spoofing. The approach is evaluated on cloud platforms and is compared with the recent state-of-the-art literature. The proposal is deployed as a pluggable module in cloud networks. The key metrics of our evaluation and comparisons are accuracy with respect to the varying size of the IoT network, classification metrics, attack detection time, and CPU utilization.

[1]  Mohammad Reza Nosouhi,et al.  Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios , 2023, IEEE Transactions on Dependable and Secure Computing.

[2]  Mohammad Reza Nosouhi,et al.  RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory , 2022, IEEE Networking Letters.

[3]  F. Kraemer,et al.  Value of Information in Wireless Sensor Network Applications and the IoT: A Review , 2022, IEEE Sensors Journal.

[4]  Keshav Sood,et al.  A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication , 2021, IEEE Internet of Things Magazine.

[5]  Jiawei Yuan,et al.  Machine-Learning PUF-based Detection of RF Anomalies in a Cluttered RF Environment , 2021, 2021 IEEE International Symposium on Technologies for Homeland Security (HST).

[6]  Woongsup Lee,et al.  Deep-Learning-Aided RF Fingerprinting for NFC Security , 2021, IEEE Communications Magazine.

[7]  Shuping Sun Segmentation-Based Adaptive Feature Extraction Combined With Mahalanobis Distance Classification Criterion for Heart Sound Diagnostic System , 2021, IEEE Sensors Journal.

[8]  Ihsan Ali,et al.  Data Collection in Studies on Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Sensor Cloud (SC): Similarities and Differences , 2021, IEEE Access.

[9]  Martins Ezuma,et al.  Detection and Classification of UAVs Using RF Fingerprints in the Presence of Wi-Fi and Bluetooth Interference , 2020, IEEE Open Journal of the Communications Society.

[10]  Linghe Kong,et al.  SLoRa: towards secure LoRa communications with fine-grained physical layer features , 2020, SenSys.

[11]  Vijay Varadharajan,et al.  Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security , 2020, IEEE Internet of Things Journal.

[12]  Paul D. Yoo,et al.  IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction , 2020, IEEE Access.

[13]  Lijun Qian,et al.  Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).

[14]  Lee Friedman,et al.  Assessment of the Effectiveness of Seven Biometric Feature Normalization Techniques , 2019, IEEE Transactions on Information Forensics and Security.

[15]  Raúl Mohedano,et al.  On the Mahalanobis Distance Classification Criterion for Multidimensional Normal Distributions , 2013, IEEE Transactions on Signal Processing.

[16]  Taekyoung Kwon,et al.  Impersonation attacks on software-only two-factor authentication schemes , 2002, IEEE Commun. Lett..

[17]  Mohammad Reza Nosouhi,et al.  Towards Spoofing Resistant Next Generation IoT Networks , 2022, IEEE Transactions on Information Forensics and Security.

[18]  Zhi Sun,et al.  RF Impairment Model-Based IoT Physical-Layer Identification for Enhanced Domain Generalization , 2022, IEEE Transactions on Information Forensics and Security.

[19]  Craig Iaboni,et al.  Internet-of-Things Curriculum, Pedagogy, and Assessment for STEM Education: A Review of Literature , 2022, IEEE Access.

[20]  Anastasios N. Bikos,et al.  Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges and Solutions , 2022, IEEE Access.

[21]  Hongsong Zhu,et al.  Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods , 2021, IEEE Access.

[22]  Yunhong Zhu,et al.  Micrometeoroid and Orbital Debris Impact Detection and Location Based on FBG Sensor Network Using Combined Artificial Neural Network and Mahalanobis Distance Method , 2021, IEEE Transactions on Instrumentation and Measurement.

[23]  Na Su,et al.  Incremental Attribute Reduction Method Based on Chi-Square Statistics and Information Entropy , 2020, IEEE Access.

[24]  Ling Zhou,et al.  A Novel Approach for Fault Detection in Integrated Navigation Systems , 2020, IEEE Access.