Radio frequency fingerprinting identification for Zigbee via lightweight CNN

Abstract Zigbee is a popular communication protocol in the Internet of things (IoT) which shows great potential in smart home. However, the smart device has the risk of being hijacked by unauthorized users and may result in privacy disclosure. Traditional device identification is based on cryptography which is easy to be cracked. Recently, radio frequency fingerprinting identification (RFFID) is popular in device identification. Traditional RFFID’s power consumption and cost is unacceptable to Zigbee. In order to reduce the cost, more effective model can be used to reduce the number of neurons. This paper proposes a RFFID method based on lightweight convolution neural network (CNN) which can adopt low power consumption and cost. The simulation result shows that this method can identification Zigbee device, and the accuracy reached 100%. Also, the parameter has reduced to about 93%.

[1]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[2]  Saulius Japertas,et al.  Identification technology of mobile phone devices using RFF , 2014, 2014 11th International Conference on Wireless Information Networks and Systems (WINSYS).

[3]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[4]  Jie Yang,et al.  Data-Driven Deep Learning for Automatic Modulation Recognition in Cognitive Radios , 2019, IEEE Transactions on Vehicular Technology.

[5]  Xuelong Hu,et al.  The intelligent parking lot based on ZigBee technology and SVM , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[6]  Zheng Hu,et al.  Improving Convolutional Neural Network Using Pseudo Derivative ReLU , 2018, 2018 5th International Conference on Systems and Informatics (ICSAI).

[7]  Fumiyuki Adachi,et al.  Transfer Learning for Semi-Supervised Automatic Modulation Classification in ZF-MIMO Systems , 2020, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[8]  Guoru Ding,et al.  Dynamic Spectrum Interaction of UAV Flight Formation Communication With Priority: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Cognitive Communications and Networking.

[9]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[10]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[11]  Burak ÖzÇakmak,et al.  Neural and Quantum Cryptography in Big Data: A Review , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[12]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[13]  Jia Jia,et al.  A novel approach for impulsive noise mitigation in ZigBee communication system , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[14]  Guan Gui,et al.  Deep Cognitive Perspective: Resource Allocation for NOMA-Based Heterogeneous IoT With Imperfect SIC , 2019, IEEE Internet of Things Journal.

[15]  Marek R. Ogiela,et al.  Cognitive information systems in secure information management and personalized cryptography , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).

[16]  Boris Ginsburg,et al.  Quartznet: Deep Automatic Speech Recognition with 1D Time-Channel Separable Convolutions , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[18]  Zheng Dou,et al.  An Improved Neural Network Pruning Technology for Automatic Modulation Classification in Edge Devices , 2020, IEEE Transactions on Vehicular Technology.

[19]  Hong Wen,et al.  A RFF Access Authentication Technology Based on K-Nearest Neighbor Method , 2019, 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS).

[20]  Aydin Behnad,et al.  Relay authentication by exploiting I/Q imbalance in amplify-and-forward system , 2014, 2014 IEEE Global Communications Conference.

[21]  Bo Yuan,et al.  Efficient hardware architecture of softmax layer in deep neural network , 2016, 2016 29th IEEE International System-on-Chip Conference (SOCC).

[22]  Thomas Kunz,et al.  Wireless Fingerprints Inside a Wireless Sensor Network , 2015, ACM Trans. Sens. Networks.

[23]  Ho-Jin Choi,et al.  Controlled dropout: A different approach to using dropout on deep neural network , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).

[24]  Zetao Jiang,et al.  Single Image Super-Resolution: Depthwise Separable Convolution Super-Resolution Generative Adversarial Network , 2020 .

[25]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[26]  Keith E. Nolan,et al.  Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[27]  Emre Deniz,et al.  A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).

[28]  Michael A. Temple,et al.  Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting , 2015, IEEE Transactions on Reliability.

[29]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[30]  Suk-Ju Kang,et al.  Gradient Prior-Aided CNN Denoiser With Separable Convolution-Based Optimization of Feature Dimension , 2019, IEEE Transactions on Multimedia.

[31]  Fumiyuki Adachi,et al.  Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions , 2019, IEEE Wireless Communications.

[32]  Michael A. Temple,et al.  Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.

[33]  Yang Peng,et al.  UL-CSI Data Driven Deep Learning for Predicting DL-CSI in Cellular FDD Systems , 2019, IEEE Access.

[34]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.