CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

01/14/2022
by   Alberto Huertas Celdrán, et al.
0

Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent literature suggests using behavioral fingerprinting and Machine/Deep Learning (ML/DL) for improving similar cybersecurity issues. Nevertheless, the applicability of these techniques in resource-constrained devices, the impact of attacks affecting spectrum data integrity, and the performance and scalability of models suitable for heterogeneous sensors types are still open challenges. To improve limitations, this work presents seven SSDF attacks affecting spectrum sensors and introduces CyberSpec, an ML/DL-oriented framework using device behavioral fingerprinting to detect anomalies produced by SSDF attacks affecting resource-constrained spectrum sensors. CyberSpec has been implemented and validated in ElectroSense, a real crowdsensing RF monitoring platform where several configurations of the proposed SSDF attacks have been executed in different sensors. A pool of experiments with different unsupervised ML/DL-based models has demonstrated the suitability of CyberSpec detecting the previous attacks within an acceptable timeframe.

READ FULL TEXT

page 1

page 13

research
01/31/2022

Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

Device fingerprinting combined with Machine and Deep Learning (ML/DL) re...
research
06/15/2021

Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology

The connectivity and resource-constrained nature of IoT, and in particul...
research
01/12/2022

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges

The exponential growth of internet connected systems has generated numer...
research
09/14/2022

Improving Accuracy and Explainability of Online Handwriting Recognition

Handwriting recognition technology allows recognizing a written text fro...
research
12/30/2022

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

Cybercriminals are moving towards zero-day attacks affecting resource-co...
research
10/07/2022

Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: A Review

Bark beetle outbreaks can result in a devastating impact on forest ecosy...
research
04/13/2018

Automatic Detection and Query of Wireless Spectrum Events from Streaming Data

Several alternatives for more efficient spectrum management have been pr...

Please sign up or login with your details

Forgot password? Click here to reset