Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM

نویسندگان

چکیده

It is estimated that the number of Internet-of-Things (IoT) devices will reach 75 billion in next five years. Most those currently and soon-to-be deployed lack sufficient security to protect themselves their networks from attacks by malicious IoT masquerading as authorized order circumvent digital authentication approaches. This work presents a physical (PHY) layer approach capable addressing this critical need through use feature-reduced, radio frequency-distinct native attributes (RF-DNA) fingerprints support vector machines (SVM). successfully demonstrates: 1) identity (ID) verification across three trials six randomly chosen radios at signal-to-noise ratios greater than or equal 6 dB 2) rejection all rogue ID spoofing 3 using RF-DNA whose features are selected Relief-F algorithm.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Authentication Using Fingerprints

We describe the design and implementation of an automatic identity authentication system which uses fingerprint to establish the identity of an individual. An improved minutia extraction algorithm that is much faster and more accurate than our earlier algorithm [12] has been implemented. An alignment-based elastic matching algorithm has been developed. This algorithm is capable of finding the c...

متن کامل

Iris Based Identity Verification Robust to Sample Presentation Security Attacks

Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach us...

متن کامل

Augmenting Security for Identity-based Batch Verification Scheme using TDMA based MAC Protocol in VANET

Vehicular Ad hoc Networks (VANETs) have been developed as a stage to maneuver down perceptive between vehicle correspondences and to enhance visitor's wellbeing and fulfillment. Despite the fact that VANETs have picked up the consideration of today's examination endeavors, yet the present answers for a complete secure VANET and to shield the system from enemy and assaults are still insufficient...

متن کامل

An Identity-Authentication System Using Fingerprints

Fingerprint verification is an important biometric technique for personal identification. In this paper, we describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm [58]...

متن کامل

Managing Verification Activities Using SVM

SVM (System Verification Manager) manages the application of verification methods for model-based development of embedded systems by providing integrated representations of requirements, system architecture, models and verification methods. Developed in Java within MATLABr, SVM supports all types of tools for modelling and verification through an extensible framework of data and coding structur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2021

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2020.3045305