Authentication of Everything in the Internet of Things: Learning and Environmental Effects

Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security solutions. Conventional security and authentication solutions often fail to meet IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an IoT objects authentication framework is proposed. The framework uses device-specific information, called fingerprints, along with a transfer learning tool to authenticate objects in the IoT. The framework tracks the effect of changes in the physical environment on fingerprints and uses unique IoT environmental effects features to detect both cyber and cyber-physical emulation attacks. The proposed environmental effects estimation framework is proven to improve the detection rate of attackers without increasing the false positives rate. The proposed framework is also shown to be able to detect cyber-physical attackers that are capable of replicating the fingerprints of target objects which conventional methods are unable to detect. A transfer learning approach is proposed to allow the use of objects with different types and features in the environmental effects estimation process to enhance the performance of the framework while capturing practical IoT deployments with diverse object types. Simulation results using real IoT device data show that the proposed approach can yield a 40% improvement in cyber emulation attacks detection and is able to detect cyber-physical emulation attacks that conventional methods cannot detect. The results also show that the proposed framework improves the authentication accuracy while the transfer learning approach yields up to 70% additional performance gains.

[1]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[2]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[3]  Walid Saad,et al.  Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things , 2017, 2018 IEEE International Conference on Communications (ICC).

[4]  Felix C. Freiling,et al.  Fingerprinting Mobile Devices Using Personalized Configurations , 2016, Proc. Priv. Enhancing Technol..

[5]  Bryan Nousain,et al.  Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags , 2012, IEEE Transactions on Industrial Electronics.

[6]  Hiren Patel,et al.  Non-parametric feature generation for RF-fingerprinting on ZigBee devices , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

[7]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[8]  Kim-Kwang Raymond Choo,et al.  Towards Lightweight Anonymous Entity Authentication for IoT Applications , 2016, ACISP.

[9]  At f Evren,et al.  On Some Properties of Goodness of Fit Measures Based on Statistical Entropy , 2012 .

[10]  B. Yener,et al.  Active Attacks Against Modulation-based Radiometric Identification , 2009 .

[11]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[12]  Jian Shen,et al.  An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..

[13]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[14]  Raheem A. Beyah,et al.  A passive technique for fingerprinting wireless devices with Wired-side Observations , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[15]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[16]  Walid Saad,et al.  Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity , 2016, IEEE Access.

[17]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[18]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[19]  Walid Saad,et al.  Toward Massive Machine Type Cellular Communications , 2017, IEEE Wireless Communications.

[20]  T. Kailath The Divergence and Bhattacharyya Distance Measures in Signal Selection , 1967 .

[21]  Panagiotis Papadimitratos,et al.  SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things , 2017, Future Gener. Comput. Syst..

[22]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .