An Ensemble Learning Method for Wireless Multimedia Device Identification

In the last decade, wireless multimedia device is widely used in many fields, which leads to efficiency improvement, reliability, security, and economic benefits in our daily life. However, with the rapid development of new technologies, the wireless multimedia data transmission security is confronted with a series of new threats and challenges. In physical layer, Radio Frequency Fingerprinting (RFF) is a unique characteristic of IoT devices themselves, which can difficultly be tampered. The wireless multimedia device identification via Radio Frequency Fingerprinting (RFF) extracted from radio signals is a physical-layer method for data transmission security. Just as people’s unique fingerprinting, different Internet of Things (IoT) devices exhibit different RFF which can be used for identification and authentication. In this paper, a wireless multimedia device identification system based on Ensemble Learning is proposed. The key technologies such as signal detection, RFF extraction, and classification model are discussed. According to the theoretical modeling and experiment validation, the reliability and the differentiability of the RFFs are evaluated and the classification results are shown under the real wireless multimedia device environments.

[1]  Kui Ren,et al.  Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.

[2]  Baldini Gianmarco,et al.  Identification of Wireless Devices From Their Physical Layer Radio-Frequency Fingerprints , 2017 .

[3]  Michael A. Temple,et al.  Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting , 2015, IEEE Transactions on Reliability.

[4]  Wei Liu,et al.  Tensor Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Tensors via Convex Optimization , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[5]  Phivos Mylonas,et al.  Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.

[6]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[7]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[8]  Kristine L. Bell,et al.  Bayesian Bounds for Parameter Estimation and Nonlinear Filtering/Tracking , 2007 .

[9]  Rafik Chaabouni Break WEP Faster with Statistical Analysis , 2013, IACR Cryptol. ePrint Arch..

[10]  Yuhui Zheng,et al.  Student’s t-Hidden Markov Model for Unsupervised Learning Using Localized Feature Selection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[12]  Jong Hyuk Park,et al.  An improved ant colony optimization-based approach with mobile sink for wireless sensor networks , 2017, The Journal of Supercomputing.

[13]  Scott Shenker,et al.  Overcoming the Internet impasse through virtualization , 2005, Computer.

[14]  Michael A. Jensen,et al.  Data-dependent transmitter fingerprints for radio authentication , 2014, 2014 IEEE Radio and Wireless Symposium (RWS).

[15]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[16]  Sai Ji,et al.  Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks , 2017, The Journal of Supercomputing.

[17]  Norsheila Fisal,et al.  Proposed transport protocol for reliable data transfer in wireless sensor network (WSN) , 2011, 2011 Fourth International Conference on Modeling, Simulation and Applied Optimization.

[18]  Trevor J. Bihl,et al.  Feature Selection for RF Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[20]  Michael A. Temple,et al.  Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features , 2017, IEEE Transactions on Information Forensics and Security.

[21]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[22]  Michael A. Temple,et al.  Gabor-based RF-DNA fingerprinting for classifying 802.16e WiMAX Mobile Subscribers , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[23]  Michael A. Temple,et al.  Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Can Emre Koksal,et al.  On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.

[25]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[26]  Richard Baraniuk,et al.  The Dual-tree Complex Wavelet Transform , 2007 .

[27]  Michael A. Temple,et al.  Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.

[28]  M.Kanchana,et al.  VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .

[29]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Wei Xi,et al.  GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags , 2016, IEEE/ACM Transactions on Networking.

[31]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[32]  Massimo Merro,et al.  A Semantic Analysis of Wireless Network Security Protocols , 2012, NASA Formal Methods.

[33]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[34]  Lu Gan,et al.  Radiometric Identification Based on Low-Rank Representation and Minimum Prediction Error Regularization , 2017, IEEE Communications Letters.

[35]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[36]  Feiping Nie,et al.  Robust Object Co-Segmentation Using Background Prior , 2018, IEEE Transactions on Image Processing.

[37]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[38]  Samir Avdakovic,et al.  Energy Distribution of EEG Signals: EEG Signal Wavelet-Neural Network Classifier , 2010, ArXiv.

[39]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[40]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[41]  Jianjun Lei,et al.  Adaptive Fractional-Pixel Motion Estimation Skipped Algorithm for Efficient HEVC Motion Estimation , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[42]  Michael A. Temple,et al.  Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.