Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling

Nowadays, more and more Internet-of-Things (IoT) smart products, interconnected through various wireless communication technologies (Wifi, Bluetooth, Zigbee, Z-wave, etc.) are integrated in daily life, especially in homes, factories, cities, etc. Such IoT technologies have become very attractive with a large variety of new services offered to improve the quality of life of the endusers or to create new economic markets.However, the security of such connected objects is a real concern due to weak or flawed security designs, configuration errors or imperfect maintenance. Moreover, the vulnerabilities discovered in IoT products are often difficult to eliminate because, most of the time, they cannot be patched easily. Therefore, protection mechanisms are needed to mitigate the potential risks induced by such objects in private and public connected areas.In this paper, we propose a novel approach to detect potential attacks in smart places (e.g. smart homes) by detecting deviations from legitimate communication behavior, in particular at the physical layer. The proposed solution is based on the profiling and monitoring of the Radio Signal Strenght Indication (RSSI) associated to the wireless transmissions of the connected objects. A machine learning neural network algorithm is used to characterize legitimate communications and to identify suspiscious scenarios. We show the feasibility of this approach and discuss some possible application cases.

[1]  Xiaochao Dang,et al.  An improved indoor localization based on RSSI and feedback correction of anchor node for WSN , 2016, 2016 International Conference on Computer, Information and Telecommunication Systems (CITS).

[2]  Adi Shamir,et al.  Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[3]  Nitesh Dhanjani Abusing the Internet of Things , 2015 .

[4]  Tobias Zillner,et al.  ZigBee Exploited The good , the bad and the ugly , 2015 .

[5]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[6]  Emanuele Goldoni,et al.  Experimental analysis of RSSI-based indoor localization with IEEE 802.15.4 , 2010, 2010 European Wireless Conference (EW).

[7]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[8]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[9]  Mike Ryan,et al.  Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.

[10]  Yunsick Sung Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators , 2016, Entropy.

[11]  Ronald S. Ross,et al.  Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems [including updates as of 3-21-2018] , 2018 .

[12]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[13]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.