Physical layer identification of LoRa devices using constellation trace figure

LoRa wireless technology is a revolutionary wireless network access technology with a wide application prospect. An identification method for Lora devices based on physical layer fingerprinting is proposed to provide identities for authentication. Contrary to previous works, a differential constellation trace figure is established from the radio frequency (RF) fingerprinting features of LoRa devices, which transforms the feature matching to the image recognition. A classification method based on Euclidean distance of clustering center of LoRa signal is performed to analyze the differential constellation trace figure. The experimental results show that six LoRa transmission modules can be recognized accurately, and even in a low signal-to-noise ratio (SNR) environment, the different LoRa devices can still be distinguished and identified effectively.

[1]  Changting Shi A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security , 2018 .

[2]  Wanchun Dou,et al.  Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting , 2018, IEEE Access.

[3]  Xuyun Zhang,et al.  An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment , 2018, Sensors.

[4]  Xuyun Zhang,et al.  Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation , 2018, IEEE Access.

[5]  Thomas H. Clausen,et al.  A Study of LoRa: Long Range & Low Power Networks for the Internet of Things , 2016, Sensors.

[6]  Tien Dang Vo-Huu,et al.  Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.

[7]  Nuno Pereira,et al.  Formal security analysis of LoRaWAN , 2019, Comput. Networks.

[8]  Danny Hughes,et al.  Exploring the Security Vulnerabilities of LoRa , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).

[9]  Jidong Wang,et al.  An Enhanced Key Management Scheme for LoRaWAN , 2018, Cryptogr..

[10]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[11]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[12]  Xuyun Zhang,et al.  A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..

[13]  Tao Huang,et al.  An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks , 2019, J. Netw. Comput. Appl..

[14]  Utz Roedig,et al.  LoRa for the Internet of Things , 2016, EWSN.

[15]  Wei Li,et al.  A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things , 2019 .

[16]  M. Mahato,et al.  Internet of Things (IoT): Research, Architectures and Applications , 2018 .

[17]  Petar Solic,et al.  LoRaWAN — A low power WAN protocol for Internet of Things: A review and opportunities , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).

[18]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[19]  Yan Yan,et al.  A differential constellation trace figure based device identification method for ZigBee nodes , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[20]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[21]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[22]  Flauzac Olivier,et al.  New Security Architecture for IoT Network , 2015, ANT/SEIT.

[23]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[24]  Seung-Hoon Hwang,et al.  A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.

[25]  Qiang He,et al.  Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..

[26]  Xuyun Zhang,et al.  A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.

[27]  J. Tait,et al.  Challenges and opportunities. , 1996, Journal of psychiatric and mental health nursing.

[28]  Xuyun Zhang,et al.  An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[29]  Lukas Simon Laufenberg Impersonating LoRaWAN gateways using Semtech Packet Forwarder , 2019, ArXiv.

[30]  Wim Lamotte,et al.  Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning , 2017, WISEC.

[31]  Duo Liu,et al.  A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT , 2019, Computers, Materials & Continua.

[32]  Haipeng Li,et al.  Routing Protocol in VANETs Equipped with Directional Antennas: Topology-Based Neighbor Discovery and Routing Analysis , 2018, Wirel. Commun. Mob. Comput..

[33]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[34]  Qiang He,et al.  An IoT-Oriented data placement method with privacy preservation in cloud environment , 2018, J. Netw. Comput. Appl..

[35]  Jinjun Chen,et al.  A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..

[36]  Lianyong Qi,et al.  Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[37]  Antonio F. Gómez-Skarmeta,et al.  Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach , 2018, Sensors.

[38]  Marek Neruda,et al.  The issue of LPWAN technology coexistence in IoT environment , 2016, 2016 17th International Conference on Mechatronics - Mechatronika (ME).

[39]  Stefano Tomasin,et al.  Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).