Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Publications

Non-cryptographic identification

Articles 1 - 2 of 2

Full-Text Articles in Systems and Communications

Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song May 2021

Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song

Publications

Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not …


Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming Aug 2020

Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming

Publications

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …