Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 Feb 20;23(4):2353.
doi: 10.3390/s23042353.

Intrusion Detection System for IoT: Analysis of PSD Robustness

Affiliations

Intrusion Detection System for IoT: Analysis of PSD Robustness

Lamoussa Sanogo et al. Sensors (Basel). .

Abstract

The security of internet of things (IoT) devices remains a major concern. These devices are very vulnerable because of some of their particularities (limited in both their memory and computing power, and available energy) that make it impossible to implement traditional security mechanisms. Consequently, researchers are looking for new security mechanisms adapted to these devices and the networks of which they are part. One of the most promising new approaches is fingerprinting, which aims to identify a given device by associating it with a unique signature built from its unique intrinsic characteristics, i.e., inherent imperfections, introduced by the manufacturing processes of its hardware. However, according to state-of-the-art studies, the main challenge that fingerprinting faces is the nonrelevance of the fingerprinting features extracted from hardware imperfections. Since these hardware imperfections can reflect on the RF signal for a wireless communicating device, in this study, we aim to investigate whether or not the power spectral density (PSD) of a device's RF signal could be a relevant feature for its fingerprinting, knowing that a relevant fingerprinting feature should remain stable regardless of the environmental conditions, over time and under influence of any other parameters. Through experiments, we were able to identify limits and possibilities of power spectral density (PSD) as a fingerprinting feature.

Keywords: device fingerprinting; device identification; internet of things (IoT); power spectral density (PSD); relevant fingerprinting feature.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Comparison of different PSDs before and after the normalization. Parameter d is frequency-dependent and is given by d=PSD1*fPSD2*f, where * denotes the normalized amplitude. In this figure, d is shown at f=2.4255 GHz as an example.
Figure 2
Figure 2
The BLE devices used in our experiments. These devices were designed in the context of the same project; they are different versions of the same product whose hardware and software architectures have evolved over time. Thus, v1 (the board at the left end) refers to the first ever version; v2 (the two boards in the middle) and v3 (the two boards at the right end) refer to the second and third versions, respectively.
Figure 3
Figure 3
Experimental setup in the anechoic chamber. The BLE device emits the signal at 2 m from the RSA306B. The latter is equipped with a BLE antenna and driven by the Tektronix SignalVu-PC software. This way, we can capture the BLE signal in real time and record it as IQ samples on the PC in order to be used later in the script for estimating the power spectral density using Welch’s average periodogram method.
Figure 4
Figure 4
Experiment schematic.
Figure 5
Figure 5
Profile of the power consumption of the BLE device during advertising, i.e., the broadcast of the advertising packet on each of the three primary advertising channels, one after another. Each peak corresponds to the advertising on a channel.
Figure 6
Figure 6
Twenty PSDs of a same BLE device in a static experimental setting. The region between the red lines is the band B where the PSDs are compared; we chose B = 2 MHz, which is the channel bandwidth of the BLE. So, we ignored the background noise to have a more relevant analysis.
Figure 7
Figure 7
(a) PSDs of anechoic chamber experiment (b) PSDs of open-space experiment.
Figure 8
Figure 8
PSDs of the same BLE device but measured with two different identifiers.
Figure 9
Figure 9
(a) PSDs of four different BLE devices using the same identifier (the one of dev48) and, thus, always transmitting exactly the same data. Graph (a) plots are an overlapping of graph (b) four groups of plots.
Figure 10
Figure 10
PSDs of dev48 (green plots) and devCA (brown plots) devices using the same identifier (the one of dev48) and, thus, always transmitting exactly the same data.

References

    1. Kolias C., Kambourakis G., Stavrou A., Voas J. DDoS in the IoT: Mirai and Other Botnets. Computer. 2017;50:80–84. doi: 10.1109/MC.2017.201. - DOI
    1. Abbas S.G., Hashmat F., Shah G.A. A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application; Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Guangzhou, China. 29 December 2020–1 January 2021; pp. 1820–1825. - DOI
    1. Khanam S., Ahmedy I.B., Idris M.Y.I., Jaward M.H., Bin Md Sabri A.Q. A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things. IEEE Access. 2020;8:219709–219743. doi: 10.1109/ACCESS.2020.3037359. - DOI
    1. Liang X., Kim Y. A Survey on Security Attacks and Solutions in the IoT Network; Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC); Virtual. 27 January 2021–30 January 2021; pp. 0853–0859. - DOI
    1. Mann P., Tyagi N., Gautam S., Rana A. Classification of Various Types of Attacks in IoT Environment; Proceedings of the 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN); Bhimtal, India. 25–26 September 2020; pp. 346–350. - DOI

LinkOut - more resources