2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC) 2020
DOI: 10.1109/prdc50213.2020.00015
|View full text |Cite
|
Sign up to set email alerts
|

A PSD-based fingerprinting approach to detect IoT device spoofing

Abstract: Spoofing attacks are generally difficult to detect and can have potentially harmful consequences on computer networks and applications. Wireless IoT networks, in the context of smart buildings or smart factories, are particularly vulnerable to these attacks. In this paper, we present a new physical device fingerprinting approach aiming at detecting spoofing attacks in wireless IoT environments. The proposed approach is based on the analysis of some properties of the physical signals emitted by connected device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Concerning PSD, in which we are interested in this work, to the best of our knowledge, Galtier et al presented in [ 16 ] the first works on the use of PSD in security with the fingerprinting approach. However, with the attacker model and deployment environment considered, the authors did not take into account the possibility that the communication devices had very similar characteristics, nor that the environment could change a lot.…”
Section: Related Workmentioning
confidence: 99%
“…Concerning PSD, in which we are interested in this work, to the best of our knowledge, Galtier et al presented in [ 16 ] the first works on the use of PSD in security with the fingerprinting approach. However, with the attacker model and deployment environment considered, the authors did not take into account the possibility that the communication devices had very similar characteristics, nor that the environment could change a lot.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the IDS proposed in [18] is able to identify deviations from legitimate behaviour by monitoring the radio activity of the wireless environment. F. Galtier et al also propose, in [13], an IDS able to fingerprint legitimate devices (based on physical characteristics of the radio signals) and to detect inappropriate fingerprints related to the attacker frames. Monitoring solutions designed to detect BLE spoofing attacks, such as [24] or [25], may also detect behavioural anomalies in the communication between the devices, for example variations in the timing between packet emissions or change of BLE profile, and hence detect the injection attempts.…”
Section: Counter-measuresmentioning
confidence: 99%