Abstract
Internet of Things (IoT) as an emerging technology has metamorphized the use of smart devices, exchange of information and enhanced business processes in a ubiquitous and multi-faceted way. As Internet of Things (IoT) continues to gain tractable usage by billions of connected devices personal area network vulnerabilities, as identity and data theft, malware attacks and DDOS (Distributed Denial of Service) have become prevalent. In this study, we investigate the use of Radio Frequency (RF) technology mitigating IoT vulnerabilities. Deployment of secure RF network that enhances interoperability of IoT Devices by allocating unique ID (signature) is evaluated. This study further explores clustering of heterogenous networks of IoT devices using an intelligent Radio Frequency model that identifies labels and anonymizes Radio Waves shared by IoT devices within electromagnetic field. This vulnerability mitigation process encompasses use of Machine learning and neural networks classification to cluster heterogenous IoT and networks shared by IoT devices. The use of unique ID for clustered heterogenous is simulated in this study as against foreign and unauthorized radio frequency threats to paired IoT devices in a shared network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
American Barcode and RFID: AB & R. AB & R. https://www.abr.com/what-is-rfid-how-does-rfid-work/. Accessed 01 Nov 2021
Karygiannis, T., Eydt, B., Barber, G., Phillips, T.: Guidelines for Securing Radio Frequency Identification (RFID) Systems. NIST
Corchia, L., et al.: Radio-frequency identification based on textile, wearable, chipless tags for IoT applications. In: 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0 IoT), pp. 1–5 (2019)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Frontiers 12(5), 491–505 (2010)
Savazzi, S., et al.: A cloud-IoT model for reconfigurable radio sensing: the Radio. Sense platform. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 179–185 (2018)
Oluwole, A.S., Srivastava, V.M.: Modeling of RF security system using smart antennas. In: International Conference on Cyberspace (CYBER-Abuja), Abuja (2015)
Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput. Netw. 186 (2021)
Mohamed, A.M.A., Hamad, Y.A.M.: IoT Security: Review and Future Directions for Protection Models (2020)
Risley, C.: Radio frequency: an invisible espionage threat to enterprises, 8 April 2020
Fernández-Caramés, T.M., Fraga-Lamas, P., Suárez-Albela, M., Castedo, L., Pimenta, T.C.: Radio Frequency Identification. In: A Methodology for Evaluating Security in Commercial RFID Systems (2017)
Gray, C.: IoT market expected to grow due to increase in IoT use cases. Data & Data Analytics (2021)
Patel, M., Rajko, A., Shulman, J., Dahlqvist, F.: Growing opportunities in the Internet of Things. https://www.mckinsey.com/industries/private-equity-and-principal-investors/our-insights/growing-opportunities-in-the-internet-of-things. Accessed 10 Dec 2020
Rassa, E.H.R., Ramli, H.A.M., Azman, A.W.: Analysis on the impact of outdated channel quality information (CQI) correction techniques on real-time quality of service (QoS). In: 2018 IEEE Student Conference on Research and Development (SCOReD), pp. 1–5 (2018)
Hung, P.D., Vinh, B.T.: Vulnerabilities in IoT devices with software-defined radio. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (2019)
Aggarwal, A.: Medium. https://aayushi-aggarwal-27.medium.com/radio-signal-classification-6637b37f7be1. Accessed 22 Mar 2022
Johnston, C.: IMTI, 8 July 2018. https://imti.co/python-data-essentials-matplotlib-seaborn/
Browniee, J.: Train-Test Split for Evaluating Machine Learning Algorithms, 26 August 2020. https://machinelearningmastery.com/train-test-split-for-evaluating-machine-learning-algorithms/
Renner, T., Kliem, A., Kao, O.: The device cloud - applying cloud computing concepts to the internet of things. In: 2014 IEEE 11th International Conference on Ubiquitous Intelligence and Computing and 2014 IEEE 11th International Conference on Autonomic and Trusted Computing and 2014 IEEE 14th International Conference on Scalable Computing and Communications and Its Associated Workshops, pp. 396–401 (2014)
Zheng, D., Hong, Z., Wang, N., Chen, P.: An improved LDA-based ELM classification for intrusion detection algorithm in IoT application, p. 2 (2020)
Alieksieiev, V.: One approach of approximation for incoming data stream in IoT based monitoring system. In: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP) (2018)
Elmaghbub, A., Mejri, S., Hamdaoui, B.: Deep Neural Network Feature Designs for RF Data-Driven Wireless Device Classification, 2 March 2021. https://arxiv.org/pdf/2105.02755.pdf
Köse, M., Taşcioğlu, S., Telatar, Z.: RF fingerprinting of IoT devices based on transient energy spectrum 7, 18715–18726 (2019)
An optimized spectrum sensing implementation based on SVM, KNN and TREE algorithms. In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS) (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Irungu, J., Girma, A. (2023). Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security Architecture. In: Arai, K. (eds) Intelligent Systems and Applications. IntelliSys 2022. Lecture Notes in Networks and Systems, vol 544. Springer, Cham. https://doi.org/10.1007/978-3-031-16075-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-031-16075-2_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16074-5
Online ISBN: 978-3-031-16075-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)