2022
DOI: 10.1109/mnet.001.2100553
|View full text |Cite
|
Sign up to set email alerts
|

Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes

Abstract: Deep-learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in the network operating environment still poses a major limitation. This paper presents an experimental framework tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…The paper in [37] aims to tackle the sensitivity of LoRaenabled device fingerprinting to various network and RF propagation effects, through an experimental framework. Firstly, it describes RF datasets collected via LoRa-enabled wireless device testbed.…”
Section: Related Workmentioning
confidence: 99%
“…The paper in [37] aims to tackle the sensitivity of LoRaenabled device fingerprinting to various network and RF propagation effects, through an experimental framework. Firstly, it describes RF datasets collected via LoRa-enabled wireless device testbed.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, any considerable change in the training settings yields a different domain. In [5], [6], we conducted an experimental study on LoRa devices, which disclosed the sensitivity of DL-RFFP to domain changes. In that work, the models (i) fail to maintain their high accuracy when channel conditions change and (ii) completely lose their classification ability when the protocol configuration or receiver changes.…”
Section: Introductionmentioning
confidence: 99%
“…It has been, recently, utilized for device discovery, vulnerability analysis, anomaly detection, and trust-based policy recommendations [7]. Although DL-based hardware device fingerprinting methods have demonstrated promising results in terms of device identification accuracy, several studies (e.g., [6], [8], [9], [10]) have revealed that many of these methods do not perform well when the testing data is collected under a domain that is different from that used during training. Here, the term domain refers to the network setting/environment (e.g., channel condition, device location, etc.)…”
Section: Introductionmentioning
confidence: 99%