2019
DOI: 10.1109/tcomm.2018.2878025
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems

Abstract: Secure signal authentication is arguably one of the most challenging problems in the Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to man-in-the-middle and data injection attacks. In this paper, a novel watermarking algorithm is proposed for dynamic authentication of IoT signals to detect cyber attacks. The proposed watermarking algorithm, based on a deep learning long shortterm memory (LSTM) structure, enables the IoT devices (IoTDs) to extract a set of stochasti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
79
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 140 publications
(79 citation statements)
references
References 42 publications
0
79
0
Order By: Relevance
“…However, this can be impractical since the IoT devices may not report their security status. Thus, the authors in [125] propose to use the DQL that enables the cloud to decide which IoT devices to authenticate with the incomplete information. Since IoT devices with more valuable data are likely to be attacked, the reward is defined as a function of data values of IoT devices.…”
Section: A Network Securitymentioning
confidence: 99%
“…However, this can be impractical since the IoT devices may not report their security status. Thus, the authors in [125] propose to use the DQL that enables the cloud to decide which IoT devices to authenticate with the incomplete information. Since IoT devices with more valuable data are likely to be attacked, the reward is defined as a function of data values of IoT devices.…”
Section: A Network Securitymentioning
confidence: 99%
“…Wireless security finds rich applications of deep learning. Deep learning was applied to authenticate signals [37], detect and classify jammers of different types [38], [39], [40], and control communications to mitigate jamming effects [41], [42], [47]. Using wireless sensors, deep learning was also used to infer private information in analogy to exploratory attacks [43].…”
Section: Related Workmentioning
confidence: 99%
“…In [18], machine learning was used to automatically identify the types of devices being connected to an IoT network and enable enforcement of rules for constraining the communications of vulnerable devices to minimize damage resulting from their compromise. In [19], deep learning was used to detect data injection and eavesdropping in IoT devices. In [20], machine learning was applied within an IoT gateway to detect anomalies in the data sent from the edge devices.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, there has been a surge of efforts to apply machine learning to wireless security, including spoofing attacks [12], jamming attacks on data transmission [13], [14], and other attacks that target spectrum sensing [15] and signal classification [16] tasks. In particular, IoT system security benefits from machine learning to identify devices [17], [18], authenticate signals [19], and detect anomalies [20]. With growing applications of machine learning, it is necessary to understand the underlying security threats that target machine learning itself.…”
Section: Introductionmentioning
confidence: 99%