RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment

The expansion of the Internet-of-Things (IoT) market is visible in homes, factories, public places, and smart cities. While the massive deployment of connected devices offers opportunities to improve quality of life and to develop new services, the impact of such devices on the security of the users in a context where the level of malicious threat continues to increase is a major concern. One of the challenges is the heterogeneity and constant evolution of wireless technologies and protocols used. To overcome this problem, we propose RIDS, a Radio Intrusion Detection System that is based on the monitoring and profiling of radio communications at the physical layer level using autoencoder neural networks. RIDS is independent of the wireless protocols and modulation technologies used. Besides, it is designed to provide a threefold diagnosis of the detected anomalies: temporal (start and end date of the detected anomaly), frequential (main frequency of the anomaly), and spatial (location of the origin of the anomaly). To demonstrate the relevance and the efficiency of our approach, we collected a large dataset of radio-communications recorded with three different probes deployed in an experimental room. Multiple real-world attacks involving a wide variety of communication technologies are also injected to assess the detection and diagnosis efficiency. The results demonstrate the efficiency of RIDS in detecting and diagnosing anomalies that occurred in the 400–500 Mhz and 800–900 Mhz frequency bands. It is noteworthy that compromised devices and attacks using these communication bands are generally not easily covered by traditional solutions.

[1]  Christopher W. Badenhop,et al.  The Z-Wave routing protocol and its security implications , 2017, Comput. Secur..

[2]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[3]  Allen Kent,et al.  Machine literature searching X. Machine language; factors underlying its design and development , 1955 .

[4]  Yann Bachy,et al.  Smart-TV security: risk analysis and experiments on Smart-TV communication channels , 2018, Journal of Computer Virology and Hacking Techniques.

[5]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[6]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[7]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[8]  Nils Ole Tippenhauer,et al.  IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.

[9]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[10]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[11]  Sofie Pollin,et al.  SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features , 2018, 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[12]  Moustafa Youssef,et al.  CoSDEO 2016 Keynote: A decade later — Challenges: Device-free passive localization for wireless environments , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[13]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[14]  Vincent Nicomette,et al.  RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[15]  Henri Nurminen,et al.  A Survey on Wireless Transmitter Localization Using Signal Strength Measurements , 2017, Wirel. Commun. Mob. Comput..

[16]  Timothy J. O'Shea,et al.  Recurrent Neural Radio Anomaly Detection , 2016, ArXiv.

[17]  Yuval Elovici,et al.  Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.

[18]  Yi Tay,et al.  Deep Learning based Recommender System: A Survey and New Perspectives , 2018 .

[19]  Ron J. Weiss,et al.  Unsupervised Speech Representation Learning Using WaveNet Autoencoders , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[20]  Takehisa Yairi,et al.  Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.

[21]  Aaron Schulman,et al.  SweepSense: Sensing 5 GHz in 5 Milliseconds with Low-cost Radios , 2019, NSDI.

[22]  F. Golatowski,et al.  Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[23]  Wali Khan Mashwani,et al.  A survey on intrusion detection and prevention in wireless ad-hoc networks , 2020, J. Syst. Archit..

[24]  Dawn Song,et al.  Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.

[25]  Yunsick Sung Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators , 2016, Entropy.

[26]  Luca Benini,et al.  Anomaly Detection using Autoencoders in High Performance Computing Systems , 2018, DDC@AI*IA.

[27]  Chao Li,et al.  Anomaly detection of spectrum in wireless communication via deep auto-encoders , 2017, The Journal of Supercomputing.

[28]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[29]  Adi Shamir,et al.  Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[30]  Jeffrey M. Voas,et al.  Learning Internet-of-Things Security "Hands-On" , 2016, IEEE Security & Privacy.

[31]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.