Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security

Abdurrahman Elmaghbub,Bechir Hamdaoui
2024-02-08
Abstract:Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly. This interconnectivity raises concerns about privacy and security, given the potential network-wide impact of a single compromise. To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality. This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework designed to serve as the device authentication layer within the ZT architecture, with a focus on resource-constrained IoT devices. At the core of EPS-CNN, a Convolutional Neural Network (CNN) is utilized to generate the device identity from a unique RF signal representation, known as the Double-Sided Envelope Power Spectrum (EPS), which effectively captures the device-specific hardware characteristics while ignoring device-unrelated information. Experimental evaluations show that the proposed framework achieves over 99%, 93%, and 95% testing accuracy when tested in same-domain (day, location, and channel), cross-day, and cross-location scenarios, respectively. Our findings demonstrate the superiority of the proposed framework in enhancing the accuracy, robustness, and adaptability of deep learning-based methods, thus offering a pioneering solution for enabling ZT IoT device identification.
Cryptography and Security,Networking and Internet Architecture,Signal Processing
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: in the context of the increasing number of Internet of Things (IoT) devices and the increasingly complex network environment, how to ensure the security and reliability of identity authentication of each device in the network. Specifically, the paper aims to address the following challenges: 1. **Device identity authentication under the Zero Trust (ZT) architecture**: - Traditional network security models rely on the security assumptions of physical boundaries, which are no longer applicable in the current complex and changeable network environment. - The zero - trust model emphasizes "never trust, always verify" and requires continuous identity verification for each device and user, regardless of their network location. 2. **Identity authentication of resource - constrained IoT devices**: - Many IoT devices are difficult to integrate components such as complex encryption engines, security processors, and secure storage due to limitations in size, power consumption, or cost. - Therefore, a lightweight and efficient solution is required to provide a reliable identity authentication mechanism for these devices. 3. **Cross - domain robustness**: - Existing Deep Learning (DL) methods perform poorly when tested between different domains (such as time, channel conditions, location, etc.). - This is because the original IQ data representation contains a large amount of device - independent information, resulting in difficult feature extraction. To address these problems, the paper proposes the EPS - CNN framework, which uses the Double - Sided Envelope Power Spectrum (EPS) as a new representation method for RF signals and combines the Convolutional Neural Network (CNN) for device identity authentication. Specifically: - **EPS representation**: By extracting the envelope of the IQ signal and generating the EPS representation, it effectively captures the device - specific hardware characteristics while suppressing device - independent information. - **EPS - CNN framework**: Based on the EPS representation, the CNN is used to generate a unique device identity from the RF signal, thereby improving the accuracy and robustness of device identification. The experimental results show that the test accuracies of the EPS - CNN framework in the same - domain, cross - day, and cross - location scenarios are over 99%, 93%, and 95% respectively, demonstrating its superior performance in practical applications.