Zero-Bias Deep Learning for Accurate Identification of Internet-of-Things (IoT) Devices

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT make it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Non-cryptographic device verification is needed to ensure trustworthy IoT. In this paper, we propose an enhanced deep learning framework for IoT device identification using physical layer signals. Specifically, we enable our framework to report unseen IoT devices and introduce the zero-bias layer to deep neural networks to increase robustness and interpretability. We have evaluated the effectiveness of the proposed framework using real data from ADS-B (Automatic Dependent Surveillance-Broadcast), an application of IoT in aviation. The proposed framework has the potential to be applied to accurate identification of IoT devices in a variety of IoT applications and services. Codes and data are available in IEEE Dataport.

[1]  Jean-Marie Gorce,et al.  Transmitter Classification With Supervised Deep Learning , 2019, CrownCom.

[2]  Ziya Telatar,et al.  RF Fingerprinting of IoT Devices Based on Transient Energy Spectrum , 2019, IEEE Access.

[3]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[4]  Rashid Rashidzadeh,et al.  Wireless device identification using oscillator control voltage as RF fingerprint , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[5]  Stratis Ioannidis,et al.  DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms , 2019, MobiHoc.

[6]  Shilian Zheng,et al.  Deep Learning for Large-Scale Real-World ACARS and ADS-B Radio Signal Classification , 2019, IEEE Access.

[7]  Nikos Komodakis,et al.  Dynamic Few-Shot Visual Learning Without Forgetting , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[8]  Jianhang Huang,et al.  Communication transmitter individual feature extraction method based on stacked denoising autoencoders under small sample prerequisite , 2017, 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC).

[9]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[10]  Houbing Song,et al.  Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement , 2018, 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC).

[11]  Jian Wang,et al.  Software Defined Radio and Wireless Acoustic Networking for Amateur Drone Surveillance , 2018, IEEE Communications Magazine.

[12]  Yuxi Wang,et al.  TagFree: Passive object differentiation via physical layer radiometric signatures , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[13]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[14]  Yi Yu,et al.  Radio Frequency Fingerprint Identification Based on Denoising Autoencoders , 2019, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[15]  Jian Wang,et al.  Domain-specific data mining for residents' transit pattern retrieval from incomplete information , 2019, J. Netw. Comput. Appl..

[16]  Stratis Ioannidis,et al.  Deep Learning Convolutional Neural Networks for Radio Identification , 2018, IEEE Communications Magazine.

[17]  Antonio F. Gómez-Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, WF-IoT.

[18]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[19]  Houbing Song,et al.  Integration of SDR and UAS for Malicious Wi-Fi Hotspots Detection , 2019, 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS).

[20]  Wenyuan Xu,et al.  FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting , 2018, AsiaCCS.

[21]  Sabina Jeschke,et al.  Industrial Internet of Things: Cybermanufacturing Systems , 2016 .

[22]  Dennis Goeckel,et al.  Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion , 2015, IEEE Transactions on Wireless Communications.

[23]  Jianfeng Zhan,et al.  Cosine Normalization: Using Cosine Similarity Instead of Dot Product in Neural Networks , 2017, ICANN.

[24]  Houbing Song,et al.  Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.

[25]  Ming Liu,et al.  Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure , 2020, IEEE Transactions on Vehicular Technology.