Skip to main content

Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 544))

Included in the following conference series:

  • 739 Accesses

Abstract

Internet of Things (IoT) as an emerging technology has metamorphized the use of smart devices, exchange of information and enhanced business processes in a ubiquitous and multi-faceted way. As Internet of Things (IoT) continues to gain tractable usage by billions of connected devices personal area network vulnerabilities, as identity and data theft, malware attacks and DDOS (Distributed Denial of Service) have become prevalent. In this study, we investigate the use of Radio Frequency (RF) technology mitigating IoT vulnerabilities. Deployment of secure RF network that enhances interoperability of IoT Devices by allocating unique ID (signature) is evaluated. This study further explores clustering of heterogenous networks of IoT devices using an intelligent Radio Frequency model that identifies labels and anonymizes Radio Waves shared by IoT devices within electromagnetic field. This vulnerability mitigation process encompasses use of Machine learning and neural networks classification to cluster heterogenous IoT and networks shared by IoT devices. The use of unique ID for clustered heterogenous is simulated in this study as against foreign and unauthorized radio frequency threats to paired IoT devices in a shared network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. American Barcode and RFID: AB & R. AB & R. https://www.abr.com/what-is-rfid-how-does-rfid-work/. Accessed 01 Nov 2021

  2. Karygiannis, T., Eydt, B., Barber, G., Phillips, T.: Guidelines for Securing Radio Frequency Identification (RFID) Systems. NIST

    Google Scholar 

  3. Corchia, L., et al.: Radio-frequency identification based on textile, wearable, chipless tags for IoT applications. In: 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0 IoT), pp. 1–5 (2019)

    Google Scholar 

  4. Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Frontiers 12(5), 491–505 (2010)

    Article  Google Scholar 

  5. Savazzi, S., et al.: A cloud-IoT model for reconfigurable radio sensing: the Radio. Sense platform. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 179–185 (2018)

    Google Scholar 

  6. Oluwole, A.S., Srivastava, V.M.: Modeling of RF security system using smart antennas. In: International Conference on Cyberspace (CYBER-Abuja), Abuja (2015)

    Google Scholar 

  7. Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput. Netw. 186 (2021)

    Google Scholar 

  8. Mohamed, A.M.A., Hamad, Y.A.M.: IoT Security: Review and Future Directions for Protection Models (2020)

    Google Scholar 

  9. Risley, C.: Radio frequency: an invisible espionage threat to enterprises, 8 April 2020

    Google Scholar 

  10. Fernández-Caramés, T.M., Fraga-Lamas, P., Suárez-Albela, M., Castedo, L., Pimenta, T.C.: Radio Frequency Identification. In: A Methodology for Evaluating Security in Commercial RFID Systems (2017)

    Google Scholar 

  11. Gray, C.: IoT market expected to grow due to increase in IoT use cases. Data & Data Analytics (2021)

    Google Scholar 

  12. Patel, M., Rajko, A., Shulman, J., Dahlqvist, F.: Growing opportunities in the Internet of Things. https://www.mckinsey.com/industries/private-equity-and-principal-investors/our-insights/growing-opportunities-in-the-internet-of-things. Accessed 10 Dec 2020

  13. Rassa, E.H.R., Ramli, H.A.M., Azman, A.W.: Analysis on the impact of outdated channel quality information (CQI) correction techniques on real-time quality of service (QoS). In: 2018 IEEE Student Conference on Research and Development (SCOReD), pp. 1–5 (2018)

    Google Scholar 

  14. Hung, P.D., Vinh, B.T.: Vulnerabilities in IoT devices with software-defined radio. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (2019)

    Google Scholar 

  15. Aggarwal, A.: Medium. https://aayushi-aggarwal-27.medium.com/radio-signal-classification-6637b37f7be1. Accessed 22 Mar 2022

  16. Johnston, C.: IMTI, 8 July 2018. https://imti.co/python-data-essentials-matplotlib-seaborn/

  17. Browniee, J.: Train-Test Split for Evaluating Machine Learning Algorithms, 26 August 2020. https://machinelearningmastery.com/train-test-split-for-evaluating-machine-learning-algorithms/

  18. Renner, T., Kliem, A., Kao, O.: The device cloud - applying cloud computing concepts to the internet of things. In: 2014 IEEE 11th International Conference on Ubiquitous Intelligence and Computing and 2014 IEEE 11th International Conference on Autonomic and Trusted Computing and 2014 IEEE 14th International Conference on Scalable Computing and Communications and Its Associated Workshops, pp. 396–401 (2014)

    Google Scholar 

  19. Zheng, D., Hong, Z., Wang, N., Chen, P.: An improved LDA-based ELM classification for intrusion detection algorithm in IoT application, p. 2 (2020)

    Google Scholar 

  20. Alieksieiev, V.: One approach of approximation for incoming data stream in IoT based monitoring system. In: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP) (2018)

    Google Scholar 

  21. Elmaghbub, A., Mejri, S., Hamdaoui, B.: Deep Neural Network Feature Designs for RF Data-Driven Wireless Device Classification, 2 March 2021. https://arxiv.org/pdf/2105.02755.pdf

  22. Köse, M., Taşcioğlu, S., Telatar, Z.: RF fingerprinting of IoT devices based on transient energy spectrum 7, 18715–18726 (2019)

    Google Scholar 

  23. An optimized spectrum sensing implementation based on SVM, KNN and TREE algorithms. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS) (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Irungu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Irungu, J., Girma, A. (2023). Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture. In: Arai, K. (eds) Intelligent Systems and Applications. IntelliSys 2022. Lecture Notes in Networks and Systems, vol 544. Springer, Cham. https://doi.org/10.1007/978-3-031-16075-2_45

Download citation

Publish with us

Policies and ethics