Towards Spoofing Resistant Next Generation IoT Networks

Publisher:
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Publication Type:
Journal Article
Citation:
IEEE Transactions on Information Forensics and Security, 2022, 17, pp. 1669-1683
Issue Date:
2022-01-01
Filename Description Size
Towards_Spoofing_Resistant_Next_Generation_IoT_Networks.pdfPublished version2.87 MB
Adobe PDF
Full metadata record
The potential vulnerability to wireless spoofing attacks is still a critical concern for Next Generation Internet of Things (NGIoT) networks which may result in catastrophic consequences in mission-critical applications. Conventional solutions may impose additional signal processing, protocol, and latency overheads which are inappropriate for NGIoT networks designed to provide high-speed and low-latency connections for a large number of resource-constrained IoT devices. In this paper, we utilize the uniqueness of beam pattern features in mmWave-enabled devices and propose a scalable security mechanism for the detection of wireless spoofing attacks in NGIoT networks. This uniqueness is proven to exist due to the non-ideal manufacturing of antenna arrays used in mmWave-enabled devices. In our approach, when legitimate mmWave-enabled IoT devices enrol into the network, their unique beam features are learned by a learning model developed at the network server. Then, during data transmission, network base stations (gNBs)/Access Points (APs) measure the beam features from the received RF signals and send them to the network server for the detection of anomalies. We develop our learning model based on Deep Autoencoders (DAEs) that are an effective tool for anomaly detection. Fortunately, the beam feature extraction can be performed using the beam searching mechanism that is already provided in mmWave standards (5G-NR and IEEE 802.11ad). Thus, feature extraction does not introduce any signal processing overheads to the system. Moreover, the proposed mechanism imposes zero computation/communication overhead to the resource - constrained IoT nodes. In our experiments, we reached 98.6% accuracy in the detection of illegitimate devices which confirms the effectiveness of the proposed approach.
Please use this identifier to cite or link to this item: