Smart City Gnosys

Smart city article details

Title Sram And Generative Network-Based Physical Fingerprinting For Trust Management In The Internet Of Things
ID_Doc 52813
Authors Kohli V.; Aman M.N.; Sikdar B.
Year 2023
Published Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023
DOI http://dx.doi.org/10.1109/DSC61021.2023.10354210
Abstract Recent advances in the Internet of Things (IoT), machine learning, and edge computing have led to the development of paradigms such as smart cities, smart grids, smart healthcare, and intelligent transportation systems as efficient and cost-effective solutions. Subsequently, there has also been an increase in the number of connected devices, ranging from high-power computers to low-power microcontrollers and sensors. The multi-layered and complex structure of the IoT creates a vast surface of vulnerabilities. Cyber threats such as proxy attacks are prevalent in ubiquitous resource-constrained IoT devices giving rise to the need for practical device fingerprinting algorithms. Existing works are based on network activity deep learning-based classification methods. However, attackers can mimic network activity, and classification models must be retrained on the data of new anomalies. This paper solves these issues by proposing a lightweight, and intelligent physical fingerprinting algorithm and the corresponding mutual authentication protocol using initial power-up Static Random Access Memory (SRAM) states and generative networks. A generative network is trained to reconstruct SRAM fingerprints of an authorized device during the registration phase and an anomaly threshold is selected. The proposed technique reliably fingerprints registered devices, and can detect proxy devices of identical architectures from the same and different manufacturers with high accuracy. Since the algorithm does not require attacker data during the training phase, it is a self-sufficient and low-cost solution. The method has a latency of 2.114 seconds per device and security analysis of the proposed protocol proves its security against proxy and de-synchronization attacks. © 2023 IEEE.
Author Keywords Anomaly Detection; Deep Learning; Fingerprinting; Internet of Things; Trust Management


Similar Articles


Id Similarity Authors Title Published
5249 View0.88Chowdhury R.R.; Abas P.E.A Survey On Device Fingerprinting Approach For Resource-Constraint Iot Devices: Comparative Study And Research ChallengesInternet of Things (Netherlands), 20 (2022)
5248 View0.866Sanchez P.M.S.; Valero J.M.J.; Celdran A.H.; Bovet G.; Perez M.G.; Perez G.M.A Survey On Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, And DatasetsIEEE Communications Surveys and Tutorials, 23, 2 (2021)
33773 View0.863Iqbal A.; Aman M.N.; Sikdar B.Iot Device Authentication Via Ram Trace Analysis: A Representation Learning FrameworkProceedings - IEEE Global Communications Conference, GLOBECOM (2024)
44072 View0.854Abbas S.; Abu Talib M.; Nasir Q.; Idhis S.; Alaboudi M.; Mohamed A.Radio Frequency Fingerprinting Techniques For Device Identification: A SurveyInternational Journal of Information Security, 23, 2 (2024)
44110 View0.853Iqbal A.; Zia U.; Aman M.N.; Sikdar B.Ram-Based Firmware Attestation For Iot Security: A Representation Learning FrameworkIEEE Internet of Things Journal, 11, 21 (2024)
18363 View0.85Awan M.A.; Dalveren Y.; Catak F.O.; Kara A.Deployment And Implementation Aspects Of Radio Frequency Fingerprinting In Cybersecurity Of Smart GridsElectronics (Switzerland), 12, 24 (2023)
5489 View0.85Sarker K.U.A Systematic Review On Lightweight Security Algorithms For A Sustainable Iot InfrastructureDiscover Internet of Things, 5, 1 (2025)