A Deep Learning Approach To Iot Authentication

2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)(2018)

引用 90|浏览50
暂无评分
摘要
At its peak, the Internet-of-Things will largely be composed of low-power devices with wireless radios attached. Yet, secure authentication of these devices amidst adversaries with much higher power and computational capability remains a challenge, even for advanced cryptographic and wireless security protocols. For instance, a high-power software radio could simply replay chunks of signals from a low-power device to emulate it.This paper presents a deep-learning based classifier that learns hardware imperfections of low-power radios that are challenging to emulate, even for high-power adversaries. We build an LSTM framework, specifically sensitive to signal imperfections that persist over long durations. Experimental results from a testbed of 30 low-power nodes demonstrates high resilience to advanced software radio adversaries.
更多
查看译文
关键词
wireless security protocols,high-power software radio,low-power device,deep-learning classifier,low-power radios,power adversaries,low-power nodes,advanced software radio adversaries,deep learning approach,IoT authentication,Internet-of-Things,wireless radios,secure authentication,advanced cryptographic security protocols,hardware imperfections,high-power adversaries,LSTM framework
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要