Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting

作者: Christopher M. Rondeau , J. Addison Betances , Michael A. Temple

DOI: 10.1155/2018/1489347

关键词:

摘要: This work provides development of Constellation Based DNA (CB-DNA) Fingerprinting for use in systems employing quadrature modulations and includes network protection demonstrations ZigBee offset phase shift keying modulation. Results are based on 120 unique networks comprised seven authorized RZSUBSTICK devices, with three additional like-model devices serving as unauthorized rogue devices. Authorized device fingerprints used to train a Multiple Discriminant Analysis (MDA) classifier Rogue Rejection Rate (RRR) estimated 2520 attacks involving presenting themselves With MDA training thresholds set achieve True Verification (TVR) TVR = 95% the collective detection results SNR ≥ 12 dB include average burst-by-burst RRR ≈ 94% across all attack scenarios individual performance spanning 83.32% < 99.81%.

参考文章(11)
Clay Dubendorfer, Benjamin Ramsey, Michael Temple, ZigBee Device Verification for Securing Industrial Control and Building Automation Systems international conference on critical infrastructure protection. pp. 47- 62 ,(2013) , 10.1007/978-3-642-45330-4_4
Saeed Ur Rehman, Colin Coghill, Kevin W. Sowerby, Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios Iet Communications. ,vol. 8, pp. 1274- 1284 ,(2014) , 10.1049/IET-COM.2013.0568
Donald R. Reising, Michael A. Temple, Julie A. Jackson, Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 1180- 1192 ,(2015) , 10.1109/TIFS.2015.2400426
Donald R. Reising, Michael A. Temple, Michael J. Mendenhall, Improved wireless security for GMSK-based devices using RF fingerprinting International Journal of Electronic Security and Digital Forensics. ,vol. 3, pp. 41- 59 ,(2010) , 10.1504/IJESDF.2010.032330
Niv Goldenberg, Avishai Wool, Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems International Journal of Critical Infrastructure Protection. ,vol. 6, pp. 63- 75 ,(2013) , 10.1016/J.IJCIP.2013.05.001
N.S. Alagha, Cramer-Rao bounds of SNR estimates for BPSK and QPSK modulated signals IEEE Communications Letters. ,vol. 5, pp. 10- 12 ,(2001) , 10.1109/4234.901810
Kyriakos Stefanidis, Artemios G. Voyiatzis, An HMM-Based Anomaly Detection Approach for SCADA Systems Information Security Theory and Practice. pp. 85- 99 ,(2016) , 10.1007/978-3-319-45931-8_6
Gaotao Shi, Keqiu Li, Fundamentals of ZigBee and WiFi Springer, Cham. pp. 9- 27 ,(2017) , 10.1007/978-3-319-47806-7_2
Fei zhuo, Yuanling Huang, Jian chen, Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance Procedia Computer Science. ,vol. 107, pp. 472- 477 ,(2017) , 10.1016/J.PROCS.2017.03.092
Christopher M. Talbot, Michael A. Temple, Timothy J. Carbino, J. Addison Betances, Detecting rogue attacks on commercial wireless Insteon home automation systems Computers & Security. ,vol. 74, pp. 296- 307 ,(2018) , 10.1016/J.COSE.2017.10.001