Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
Cross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduce...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/3314595 |
id |
doaj-acc7c6c4d6334e3781a7a1f707a073b4 |
---|---|
record_format |
Article |
spelling |
doaj-acc7c6c4d6334e3781a7a1f707a073b42021-09-06T00:00:54ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/3314595Spoofing Attack Detection Using Machine Learning in Cross-Technology CommunicationQuan Sun0Xinyu Miao1Zhihao Guan2Jin Wang3Demin Gao4College of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCollege of Information Science and TechnologyCross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduces communication costs. However, compared with the traditional homogeneous network model, CTC technique also makes it easier to implement spoofing attacks in heterogeneous networks. WiFi devices with long communication distances and sufficient energy supply can directly launch spoofing attacks against ZigBee devices, which brings severe security concerns for heterogeneous wireless communications. In this paper, we focus on the CTC spoofing attack, especially spoofing attacks from WiFi to ZigBee and propose a machine learning-based method to detect spoofing attacks for heterogeneous wireless networks by using physical-layer information. First, we model the received signal strength (RSS) data of legitimate ZigBee devices to construct a one-class support vector machine (OSVM) classifier for detecting CTC spoofing attacks depending on the obtained training samples. Then, we simulated CTC spoofing attacks in a live testbed and evaluated the performance of our detection method. Results show that our approach is highly effective in spoofing detection. Even if the distance between the legitimate ZigBee device and WiFi attacker is near each other (i.e., less than 2 m) and does not require a large number of samples, the detection rate and precision of our method are both over 90%. Finally, we employ the OSVM classifier to obtain samples of spoofing attacks and then explore using SVM to further improve the performance of the classifier.http://dx.doi.org/10.1155/2021/3314595 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Quan Sun Xinyu Miao Zhihao Guan Jin Wang Demin Gao |
spellingShingle |
Quan Sun Xinyu Miao Zhihao Guan Jin Wang Demin Gao Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication Security and Communication Networks |
author_facet |
Quan Sun Xinyu Miao Zhihao Guan Jin Wang Demin Gao |
author_sort |
Quan Sun |
title |
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication |
title_short |
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication |
title_full |
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication |
title_fullStr |
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication |
title_full_unstemmed |
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication |
title_sort |
spoofing attack detection using machine learning in cross-technology communication |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0122 |
publishDate |
2021-01-01 |
description |
Cross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4 G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduces communication costs. However, compared with the traditional homogeneous network model, CTC technique also makes it easier to implement spoofing attacks in heterogeneous networks. WiFi devices with long communication distances and sufficient energy supply can directly launch spoofing attacks against ZigBee devices, which brings severe security concerns for heterogeneous wireless communications. In this paper, we focus on the CTC spoofing attack, especially spoofing attacks from WiFi to ZigBee and propose a machine learning-based method to detect spoofing attacks for heterogeneous wireless networks by using physical-layer information. First, we model the received signal strength (RSS) data of legitimate ZigBee devices to construct a one-class support vector machine (OSVM) classifier for detecting CTC spoofing attacks depending on the obtained training samples. Then, we simulated CTC spoofing attacks in a live testbed and evaluated the performance of our detection method. Results show that our approach is highly effective in spoofing detection. Even if the distance between the legitimate ZigBee device and WiFi attacker is near each other (i.e., less than 2 m) and does not require a large number of samples, the detection rate and precision of our method are both over 90%. Finally, we employ the OSVM classifier to obtain samples of spoofing attacks and then explore using SVM to further improve the performance of the classifier. |
url |
http://dx.doi.org/10.1155/2021/3314595 |
work_keys_str_mv |
AT quansun spoofingattackdetectionusingmachinelearningincrosstechnologycommunication AT xinyumiao spoofingattackdetectionusingmachinelearningincrosstechnologycommunication AT zhihaoguan spoofingattackdetectionusingmachinelearningincrosstechnologycommunication AT jinwang spoofingattackdetectionusingmachinelearningincrosstechnologycommunication AT demingao spoofingattackdetectionusingmachinelearningincrosstechnologycommunication |
_version_ |
1717780194813542400 |