DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that has physical access to a device can onboard it onto their network and, potentially, tamper it (e.g.,install malware on the device). To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (DLWIoT), featuring a robust and fully automated image watermarking scheme based on deep neural networks. DLWIoT embeds user credentials into carrier images (e.g., QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users. Our experimental results demonstrate the feasibility of DLWIoT, indicating that authorized users can onboard IoT devices with DLWIoT within 2.5-3sec.

[1]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[2]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[3]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[4]  Gorthi R. K. Sai Subrahmanyam,et al.  Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..

[5]  Sergey Ioffe,et al.  Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.

[6]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[7]  Boubakr Nour,et al.  Compute-Less Networking: Perspectives, Challenges, and Opportunities , 2020, IEEE Network.

[8]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[9]  Michael M. Stark QR Codes: The Technical Guide , 2021 .

[10]  P. Alam ‘G’ , 2021, Composites Engineering: An A–Z Guide.

[11]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[12]  P. Alam ‘S’ , 2021, Composites Engineering: An A–Z Guide.

[13]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[14]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[15]  Tuomas Aura,et al.  Evaluation of Out-of-Band Channels for IoT Security , 2020, SN Comput. Sci..

[16]  J. Isern,et al.  Technical Guide , 2020, Definitions.

[17]  Tapio Seppänen,et al.  CAMERA BASED WATERMARK EXTRACTION – PROBLEMS AND EXAMPLES , 2007 .

[18]  Alex Krizhevsky,et al.  Learning Multiple Layers of Features from Tiny Images , 2009 .

[19]  Klaus-Robert Müller,et al.  Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.

[20]  Jie Tang,et al.  Enabling Deep Learning on IoT Devices , 2017, Computer.

[21]  Walid Saad,et al.  Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things , 2017, 2018 IEEE International Conference on Communications (ICC).

[22]  Heung-Kyu Lee,et al.  Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.

[23]  Danna Zhou,et al.  d. , 1840, Microbial pathogenesis.

[24]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[25]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[26]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[27]  Frank Y. Shih,et al.  A Robust Image Watermarking System Based on Deep Neural Networks , 2019, ArXiv.

[28]  Teddy Furon,et al.  Are Deep Neural Networks good for blind image watermarking? , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[29]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[30]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.

[31]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[32]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[33]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[34]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[35]  Héctor M. Pérez Meana,et al.  A Robust Image Zero-watermarking using Convolutional Neural Networks , 2019, 2019 7th International Workshop on Biometrics and Forensics (IWBF).

[36]  Kim-Kwang Raymond Choo,et al.  Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond , 2018, IEEE Cloud Computing.