About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 21(29): e5

Research Article

Device Authentication Codes based on RF Fingerprinting using Deep Learning

Download1696 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.30-11-2021.172305,
        author={Joshua Bassey and Xiangfang Li and Lijun Qian},
        title={Device Authentication Codes based on RF Fingerprinting using Deep Learning},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={8},
        number={29},
        publisher={EAI},
        journal_a={SESA},
        year={2021},
        month={11},
        keywords={RF fingerprinting, Device Authentication, Deep Learning, Internet of Things, autoencoder, Kolmogorov-Smirnov (K-S) test},
        doi={10.4108/eai.30-11-2021.172305}
    }
    
  • Joshua Bassey
    Xiangfang Li
    Lijun Qian
    Year: 2021
    Device Authentication Codes based on RF Fingerprinting using Deep Learning
    SESA
    EAI
    DOI: 10.4108/eai.30-11-2021.172305
Joshua Bassey1,*, Xiangfang Li1, Lijun Qian1
  • 1: Center of Excellence in Research and Education for Big Military Data Intelligence (CREDIT), Department of Electrical and Computer Engineering, Prairie View A&M University, Texas A&M University System, Prairie View, TX 77446, USA
*Contact email: joshuababbs1@gmail.com

Abstract

In this paper, we propose Device Authentication Code (DAC), a novel method for authenticating IoT devices with wireless interface, by exploiting their radio frequency (RF) signatures. The proposed DAC is based on RF fingerprinting, an information-theoretic method, feature learning, and the discriminatory power of deep learning. Specifically, an autoencoder is used to automatically extract features from the RF traces and the reconstruction error is used as the DAC, and this DAC is unique to each individual device. Then Kolmogorov-Smirnov (K-S) test is used to match the distribution of the reconstruction error generated by the receiver and the DAC in the received message, and the result will determine whether the device of interest is an intruder. We validate this concept on two experimentally collected RF traces from six ZigBee devices and five universal software defined radio peripheral devices, respectively. The traces span a range of Signal-to-Noise Ratio by varying locations, mobility of the devices, channel interference, and noise to ensure robustness of the model. Experimental results demonstrate that DAC is able to prevent device impersonation by extracting salient features that are unique to each wireless device of interest and can be used to identify radio frequency devices. Furthermore, the proposed method does not need the RF traces of the intruder during model training to be able to identify devices not seen during training, which makes it practical.

Keywords
RF fingerprinting, Device Authentication, Deep Learning, Internet of Things, autoencoder, Kolmogorov-Smirnov (K-S) test
Received
2021-10-06
Accepted
2021-11-22
Published
2021-11-30
Publisher
EAI
http://dx.doi.org/10.4108/eai.30-11-2021.172305

Copyright © 2021 Joshua Bassey et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL