RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach †
<p>RSSI values of an IoT device deployed in a residential property with routine movements of occupants in a 24 h period.</p> "> Figure 2
<p>Overview of the threat model: the goal of the receiving node is to use historical (clean) RSSI values from the legitimate sender to learn a robust profile to use in future against identity attacks; while the goal of the adversary is to get past the established profile by taking over <span class="html-italic">s</span> identity.</p> "> Figure 3
<p>Anatomy of the LSTM autoencoder.</p> "> Figure 4
<p>Starting at midnight, the Z-scores of reconstructed RSSI values corresponding to the transmitting node <span class="html-italic">s</span> using the two trained models (for day and night) are tracked. At about dawn, when occupants started to wake up and move about, the error rate of the night model significantly increases while the day model’s error rate drops significantly.</p> "> Figure 5
<p>The legitimate transmitter is situated in the first floor family room while the legitimate receiver is situated in the second floor’s bedroom separated by interior walls and an interior floor. The 5 occupants in the property are considered to be the influencing moving objects.</p> "> Figure 6
<p>The legitimate transmitter is situated outdoors on the lawn transmitting temperature readings and the receiver is situated in the bedroom of the second floor separated by exterior building walls. The pedestrians and motor vehicles in the nearby residential area as well as the 5 occupants in the property are considered to be the influencing moving objects.</p> "> Figure 7
<p>Digi XBee 3 Series programmable module implementing IEEE 802.15.4. in a weatherproof secure enclosure protecting the devices from the elements when deployed.</p> "> Figure 8
<p><span class="html-italic">s</span>’ RSSI stream received by <span class="html-italic">r</span> during <span class="html-italic">s</span>’ deployment outside of the property.</p> "> Figure 9
<p><span class="html-italic">s</span>’ RSSI stream as received by <span class="html-italic">r</span> during <span class="html-italic">s</span>’ deployment inside of the property.</p> "> Figure 10
<p>(<b>a</b>) Case where the adversary starts transmitting right after the legitimate node terminated its transmission; (<b>b</b>) The adversary gains access to the channel while the legitimate node has not finished transmitting all of its frames.</p> "> Figure 11
<p>Comparison of ‘Normal Classification’ of our novel detection method with two other [<a href="#B13-jcp-01-00023" class="html-bibr">13</a>,<a href="#B23-jcp-01-00023" class="html-bibr">23</a>] state-of-the-art approaches proposed in the literature.</p> "> Figure 12
<p>Comparison of ‘Spoofed Classification’ of our novel detection method with two other [<a href="#B13-jcp-01-00023" class="html-bibr">13</a>,<a href="#B23-jcp-01-00023" class="html-bibr">23</a>] state-of-the-art approaches proposed in the literature.</p> "> Figure 13
<p>Tracking reconstruction error of two trained models during an entire day. The crossover point between the two reconstruction error lines (orange and blue) coincide with increase in volatility of RSSI stream (the red line)—a clear indicator to be used to switch between trained models.</p> ">
Abstract
:1. Introduction
2. Related Works
3. Threat Model and Assumptions
- The adversary is situated at a location from which it can observe/receive signals transmitted by all legitimate senders (when sending data frames) and receivers (when sending acknowledgment frames back) in the given network.
- The adversary is aware of the transmission power setting () of the legitimate sender(s), which is not a substantial assumption as system information about most IoT/WSN devices is publicly accessible on the Internet.
- The adversary has no prior knowledge of the actual physical/geographic locations of other (legitimate) nodes in the network.
- Network participants, including the adversary, are equipped with regular/common omnidirectional antennas, and are not capable of detecting the positional angle of the transmitting nodes. However, the adversary can move about in order to triangulate other nodes’ locations based on the strength of the signal received from those nodes [10].
- The adversary itself is an active node capable of adjusting its transmission power.
- The adversary is also capable of altering (i.e., spoofing) its MAC address value—i.e., it can generate data frames that carry MAC addresses of other legitimate nodes from this particular network.
4. Detection Approach: Deep Authentication
4.1. LSTM Autoencoder Anomaly Detector
4.2. Multiclassifer and Model Switching
5. Experiments and Results
5.1. Environment Setup
5.2. Note on Special Spoofed Traffic Mix
5.3. Model Classification Performance
5.4. Model Switching at Runtime
6. Discussions and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lashkari, A.H.; Danesh, M.M.S.; Samadi, B. A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). In Proceedings of the 2009 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, China, 8–11 August 2009; pp. 48–52. [Google Scholar]
- The Independent IT Security Institute AX Test. 2017. Available online: https://www.iot-tests.org/2017/06/hue-let-there-be-light/ (accessed on 1 September 2020).
- Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, V.L.; Lin, P.C.; Hwang, R.H. Energy depletion attacks in low power wireless networks. IEEE Access 2019, 7, 51915–51932. [Google Scholar] [CrossRef]
- Ahmad, M.S.; Tadakamadla, S. Short paper: Security evaluation of IEEE 802.11 w specification. In Proceedings of the Fourth ACM Conference on Wireless Network Security, Hamburg, Germany, 14–17 June 2011; pp. 53–58. [Google Scholar]
- Wu, W.; Gu, X.; Dong, K.; Shi, X.; Yang, M. PRAPD: A novel received signal strength-based approach for practical rogue access point detection. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718795838. [Google Scholar] [CrossRef]
- Moosavirad, S.M.; Kabiri, P.; Mahini, H. RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test. J. Adv. Comput. Res. 2013, 4, 65–80. [Google Scholar]
- Demirbas, M.; Song, Y. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06), Buffalo-Niagara Falls, NY, USA, 26–29 June 2006; p. 5. [Google Scholar]
- Aghabozorgi, S.; Shirkhorshidi, A.S.; Wah, T.Y. Time-series clustering—A decade review. Inf. Syst. 2015, 53, 16–38. [Google Scholar] [CrossRef]
- Madani, P.; Vlajic, N.; Sadeghpour, S. MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach. In Proceedings of the 2020 Joint Workshop on CPS & IoT Security and Privacy, Lisbon, Portugal, 15 September 2020; pp. 71–80. [Google Scholar]
- Faria, D.B.; Cheriton, D.R. Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM Workshop on Wireless Security; ACM: New York, NY, USA, 2006; pp. 43–52. [Google Scholar]
- Chen, Y.; Trappe, W.; Martin, R.P. Detecting and localizing wireless spoofing attacks. In Proceedings of the 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, USA, 18–21 June 2007; pp. 193–202. [Google Scholar]
- Sheng, Y.; Tan, K.; Chen, G.; Kotz, D.; Campbell, A. Detecting 802.11 MAC layer spoofing using received signal strength. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 1768–1776. [Google Scholar]
- Gonzales, H.; Bauer, K.; Lindqvist, J.; McCoy, D.; Sicker, D. Practical defenses for evil twin attacks in 802.11. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar]
- Nelson, B.; Rubinstein, B.I.; Huang, L.; Joseph, A.D.; Lee, S.J.; Rao, S.; Tygar, J. Query Strategies for Evading Convex-Inducing Classifiers. J. Mach. Learn. Res. 2012, 13, 13–23. [Google Scholar]
- Madani, P.; Vlajic, N. Robustness of deep autoencoder in intrusion detection under adversarial contamination. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, Raleigh, NC, USA, 10–11 April 2018; pp. 1–8. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A.; Bengio, Y. Deep Learning; MIT press: Cambridge, UK, 2016; Volume 1. [Google Scholar]
- Kim, J.; Kim, J.; Thu, H.L.T.; Kim, H. Long short term memory recurrent neural network classifier for intrusion detection. In Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, 15–17 February 2016; pp. 1–5. [Google Scholar]
- Luo, W.; Liu, W.; Gao, S. Remembering history with convolutional lstm for anomaly detection. In Proceedings of the 2017 IEEE International Conference on Multimedia and Expo (ICME), Hong Kong, China, 10–14 July 2017; pp. 439–444. [Google Scholar]
- Malhotra, P.; Ramakrishnan, A.; Anand, G.; Vig, L.; Agarwal, P.; Shroff, G. LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv 2016, arXiv:1607.00148. [Google Scholar]
- Safaric, S.; Malaric, K. ZigBee wireless standard. In Proceedings of the ELMAR 2006, Zadar, Croatia, 7–9 June 2006; pp. 259–262. [Google Scholar]
- Zhang, Z. Improved adam optimizer for deep neural networks. In Proceedings of the 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), Banff, AB, Canada, 4–6 June 2018; pp. 1–2. [Google Scholar]
- Laxhammar, R. Conformal Anomaly Detection: Detecting Abnormal Trajectories in Surveillance Applications. Ph.D. Thesis, University of Skövde, Skövde, Sweden, 2014. [Google Scholar]
Methodology | Shortcomings | |
---|---|---|
Faria and Cheriton [11] | Using multiple access point recording RSSI values of individual nodes in the network and compare them with historical records and vote on authenticity of the given transmission. | The assumption of the existence of multiple APs is not realistic in many IoT and WSN applications. Using their approach a single AP can be easily evaded as discussed in Madani and Valjic [10]. Also, they did not entertain the existence of variable noises as a result of moving objects in the environment during different time periods. |
Chen et al. [12] | Using k-means clustering and comparing cluster centroids distance to find existence of anomalies in RSSI values. | Treating a sequence of RSSI as identically distributed and independent observations. In Section 1 and Section 5.2 we have discussed in detail why such assumptions are wrong and can be advantageous to the adversary. |
Wu et al. [6] | Using k-means clustering and comparing cluster centroids distance to find existence of anomalies in RSSI values. | Treating a sequence of RSSI as identically distributed and independent observations. In Section 1 and Section 5.2 we have in detail why such assumptions are wrong and can be advantageous to the adversary. |
Sheng et al. [13] | Uses Gaussian mixture models to model observed RSSI from a given node and create a normal/expected RSSI profile. | Capturing diversity caused by antenna diversity implemented by wireless nodes. Although did not entertain the existence of variable noises as a result of moving objects in the environment during different time periods. |
Gonzales et al. [14] | Uses available/neighboring SSIDs and their average RSSI values as observed by a given wireless node to establish expected/normal environment for initiating connection with a given access point. | A valid approach for verifying the validity of an SSID before connecting a mobile wireless node to it. However, this approach cannot guarantee the absence of spoofing once the connection is established and is not useful in settings where no other SSID is available in the environment. |
0% Mixed Window Content | 20% Mixed Window Content | 50% Mixed Window Content | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Day Classifier | Night Classifier | Day Classifier | Night Classifier | Day Classifier | Night Classifier | ||||||||||||||
Precision | Recall | F1-Score | Precision | Recall | F1-Score | Precision | Recall | F1-Score | Precision | Recall | F1-Score | Precision | Recall | F1-Score | Precision | Recall | F1-Score | ||
Multi Model LSTM Autoencoder * | Normal | 1.0 | 0.95 | 0.97 | 1.0 | 0.99 | 0.99 | 1.0 | 0.93 | 0.97 | 1.0 | 0.99 | 0.99 | 1.0 | 0.93 | 0.97 | 1.0 | 0.99 | 0.99 |
Spoofed | 0.97 | 1.0 | 0.98 | 0.99 | 1.0 | 0.99 | 0.93 | 1.0 | 0.96 | 0.98 | 1.0 | 0.99 | 0.93 | 1.0 | 0.96 | 0.98 | 1.0 | 0.99 | |
One-Class SVM [23] (baseline) | Normal | 0.66 | 0.52 | 0.58 | 0.73 | 0.42 | 0.53 | 0.56 | 0.52 | 0.54 | 0.60 | 0.48 | 0.53 | 0.58 | 0.52 | 0.55 | 0.59 | 0.48 | 0.53 |
Spoofed | 0.69 | 0.80 | 0.74 | 0.50 | 0.79 | 0.61 | 0.48 | 0.52 | 0.50 | 0.37 | 0.49 | 0.42 | 0.50 | 0.56 | 0.53 | 0.36 | 0.47 | 0.41 | |
Log-likelihood ratio [13] | Normal | 0.85 | 0.92 | 0.88 | 0.83 | 0.89 | 0.86 | 0.75 | 0.89 | 0.81 | 0.73 | 0.78 | 0.75 | 0.77 | 0.91 | 0.83 | 0.81 | 0.89 | 0.85 |
Spoofed | 0.87 | 0.90 | 0.88 | 0.92 | 0.95 | 0.93 | 0.76 | 0.81 | 0.78 | 0.84 | 0.83 | 0.83 | 0.80 | 0.83 | 0.81 | 0.85 | 0.92 | 0.88 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Madani, P.; Vlajic, N. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. J. Cybersecur. Priv. 2021, 1, 453-469. https://doi.org/10.3390/jcp1030023
Madani P, Vlajic N. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. Journal of Cybersecurity and Privacy. 2021; 1(3):453-469. https://doi.org/10.3390/jcp1030023
Chicago/Turabian StyleMadani, Pooria, and Natalija Vlajic. 2021. "RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach" Journal of Cybersecurity and Privacy 1, no. 3: 453-469. https://doi.org/10.3390/jcp1030023
APA StyleMadani, P., & Vlajic, N. (2021). RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach. Journal of Cybersecurity and Privacy, 1(3), 453-469. https://doi.org/10.3390/jcp1030023