2023
DOI: 10.1109/access.2023.3257266
|View full text |Cite
|
Sign up to set email alerts
|

Secure Industrial IoT Systems via RF Fingerprinting Under Impaired Channels With Interference and Noise

Abstract: Industrial IoT-enabled critical infrastructures are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio frequency (RF)-based security is considered an effective way for wirelessly monitored or actuated critical infrastructures. For this purpose, this paper presents a novel augmentation-driven deep learning approach to analyze unique transmitter fingerprints and determine the legitimacy of a user device or transmitter. An RF fingerprinting model is suscepti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 39 publications
0
1
0
Order By: Relevance
“…Many works are devoted to applying solutions to ensure cyber security by creating dedicated architectures of IoT systems and using deep learning techniques for detecting threats [267]. An example of notable solution use RF (radio-frequency) fingerprinting techniques to identify and legitimize devices on the network [268].…”
Section: Industrial Internet Of Thingsmentioning
confidence: 99%
“…Many works are devoted to applying solutions to ensure cyber security by creating dedicated architectures of IoT systems and using deep learning techniques for detecting threats [267]. An example of notable solution use RF (radio-frequency) fingerprinting techniques to identify and legitimize devices on the network [268].…”
Section: Industrial Internet Of Thingsmentioning
confidence: 99%
“…Because of thew less potent security protocols in the resource-constrained edge hardware [6], malicious attackers can invade edge nodes through these terminal devices. At the same time, due to the recent trend of edge intelligence [7][8][9], more and more computing and storage tasks are performed on edge nodes [10,11], so they are vulnerable to malicious network attacks, such as masquerade and spoofing attacks [12,13], data and model poisoning, and evasion attacks [6]. Data poisoning [14] is a typical attack against machine learning models.…”
Section: Introductionmentioning
confidence: 99%