Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication

Cross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduce...

Full description

Bibliographic Details
Main Authors: Quan Sun, Xinyu Miao, Zhihao Guan, Jin Wang, Demin Gao
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/3314595
id doaj-acc7c6c4d6334e3781a7a1f707a073b4
record_format Article
spelling doaj-acc7c6c4d6334e3781a7a1f707a073b42021-09-06T00:00:54ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/3314595Spoofing Attack Detection Using Machine Learning in Cross-Technology CommunicationQuan Sun0Xinyu Miao1Zhihao Guan2Jin Wang3Demin Gao4College of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduces communication costs. However, compared with the traditional homogeneous network model, CTC technique also makes it easier to implement spoofing attacks in heterogeneous networks. WiFi devices with long communication distances and sufficient energy supply can directly launch spoofing attacks against ZigBee devices, which brings severe security concerns for heterogeneous wireless communications. In this paper, we focus on the CTC spoofing attack, especially spoofing attacks from WiFi to ZigBee and propose a machine learning-based method to detect spoofing attacks for heterogeneous wireless networks by using physical-layer information. First, we model the received signal strength (RSS) data of legitimate ZigBee devices to construct a one-class support vector machine (OSVM) classifier for detecting CTC spoofing attacks depending on the obtained training samples. Then, we simulated CTC spoofing attacks in a live testbed and evaluated the performance of our detection method. Results show that our approach is highly effective in spoofing detection. Even if the distance between the legitimate ZigBee device and WiFi attacker is near each other (i.e., less than 2 m) and does not require a large number of samples, the detection rate and precision of our method are both over 90%. Finally, we employ the OSVM classifier to obtain samples of spoofing attacks and then explore using SVM to further improve the performance of the classifier.http://dx.doi.org/10.1155/2021/3314595
collection DOAJ
language English
format Article
sources DOAJ
author Quan Sun
Xinyu Miao
Zhihao Guan
Jin Wang
Demin Gao
spellingShingle Quan Sun
Xinyu Miao
Zhihao Guan
Jin Wang
Demin Gao
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
Security and Communication Networks
author_facet Quan Sun
Xinyu Miao
Zhihao Guan
Jin Wang
Demin Gao
author_sort Quan Sun
title Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
title_short Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
title_full Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
title_fullStr Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
title_full_unstemmed Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
title_sort spoofing attack detection using machine learning in cross-technology communication
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2021-01-01
description Cross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduces communication costs. However, compared with the traditional homogeneous network model, CTC technique also makes it easier to implement spoofing attacks in heterogeneous networks. WiFi devices with long communication distances and sufficient energy supply can directly launch spoofing attacks against ZigBee devices, which brings severe security concerns for heterogeneous wireless communications. In this paper, we focus on the CTC spoofing attack, especially spoofing attacks from WiFi to ZigBee and propose a machine learning-based method to detect spoofing attacks for heterogeneous wireless networks by using physical-layer information. First, we model the received signal strength (RSS) data of legitimate ZigBee devices to construct a one-class support vector machine (OSVM) classifier for detecting CTC spoofing attacks depending on the obtained training samples. Then, we simulated CTC spoofing attacks in a live testbed and evaluated the performance of our detection method. Results show that our approach is highly effective in spoofing detection. Even if the distance between the legitimate ZigBee device and WiFi attacker is near each other (i.e., less than 2 m) and does not require a large number of samples, the detection rate and precision of our method are both over 90%. Finally, we employ the OSVM classifier to obtain samples of spoofing attacks and then explore using SVM to further improve the performance of the classifier.
url http://dx.doi.org/10.1155/2021/3314595
work_keys_str_mv AT quansun spoofingattackdetectionusingmachinelearningincrosstechnologycommunication
AT xinyumiao spoofingattackdetectionusingmachinelearningincrosstechnologycommunication
AT zhihaoguan spoofingattackdetectionusingmachinelearningincrosstechnologycommunication
AT jinwang spoofingattackdetectionusingmachinelearningincrosstechnologycommunication
AT demingao spoofingattackdetectionusingmachinelearningincrosstechnologycommunication
_version_ 1717780194813542400