RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach

In some wireless networks Received Signal Strength Indicator (RSSI) based device profiling may be the only viable approach to combating MAC-layer spoofing attacks, while in others it can be used as a valuable complement to the existing defenses. Unfortunately, the previous research works on the use...

Full description

Bibliographic Details
Main Authors: Pooria Madani, Natalija Vlajic
Format: Article
Language:English
Published: MDPI AG 2021-08-01
Series:Journal of Cybersecurity and Privacy
Subjects:
Online Access:https://www.mdpi.com/2624-800X/1/3/23
_version_ 1797518698802577408
author Pooria Madani
Natalija Vlajic
author_facet Pooria Madani
Natalija Vlajic
author_sort Pooria Madani
collection DOAJ
description In some wireless networks Received Signal Strength Indicator (RSSI) based device profiling may be the only viable approach to combating MAC-layer spoofing attacks, while in others it can be used as a valuable complement to the existing defenses. Unfortunately, the previous research works on the use of RSSI-based profiling as a means of detecting MAC-layer spoofing attacks are largely theoretical and thus fall short of providing insights and result that could be applied in the real world. Our work aims to fill this gap and examine the use of RSSI-based device profiling in dynamic real-world environments/networks with moving objects. The main contributions of our work and this paper are two-fold. First, we demonstrate that in dynamic real-world networks with moving objects, RSSI readings corresponding to one fixed transmitting node are neither stationary nor i.i.d., as generally has been assumed in the previous literature. This implies that in such networks, building an RSSI-based profile of a wireless device using a single statistical/ML model is likely to yield inaccurate results and, consequently, suboptimal detection performance against adversaries. Second, we propose a novel approach to MAC-layer spoofing detection based on RSSI profiling using multi-model Long Short-Term Memory (LSTM) autoencoder—a form of deep recurrent neural network. Through real-world experimentation we prove the performance superiority of this approach over some other solutions previously proposed in the literature. Furthermore, we demonstrate that a real-world defense system using our approach has a built-in ability to self-adjust (i.e., to deal with unpredictable changes in the environment) in an automated and adaptive manner.
first_indexed 2024-03-10T07:33:23Z
format Article
id doaj.art-f11e57ddd39c418290462f8cfc80d1a9
institution Directory Open Access Journal
issn 2624-800X
language English
last_indexed 2024-03-10T07:33:23Z
publishDate 2021-08-01
publisher MDPI AG
record_format Article
series Journal of Cybersecurity and Privacy
spelling doaj.art-f11e57ddd39c418290462f8cfc80d1a92023-11-22T13:42:37ZengMDPI AGJournal of Cybersecurity and Privacy2624-800X2021-08-011345346910.3390/jcp1030023RSSI-Based MAC-Layer Spoofing Detection: Deep Learning ApproachPooria Madani0Natalija Vlajic1Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, CanadaElectrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, CanadaIn some wireless networks Received Signal Strength Indicator (RSSI) based device profiling may be the only viable approach to combating MAC-layer spoofing attacks, while in others it can be used as a valuable complement to the existing defenses. Unfortunately, the previous research works on the use of RSSI-based profiling as a means of detecting MAC-layer spoofing attacks are largely theoretical and thus fall short of providing insights and result that could be applied in the real world. Our work aims to fill this gap and examine the use of RSSI-based device profiling in dynamic real-world environments/networks with moving objects. The main contributions of our work and this paper are two-fold. First, we demonstrate that in dynamic real-world networks with moving objects, RSSI readings corresponding to one fixed transmitting node are neither stationary nor i.i.d., as generally has been assumed in the previous literature. This implies that in such networks, building an RSSI-based profile of a wireless device using a single statistical/ML model is likely to yield inaccurate results and, consequently, suboptimal detection performance against adversaries. Second, we propose a novel approach to MAC-layer spoofing detection based on RSSI profiling using multi-model Long Short-Term Memory (LSTM) autoencoder—a form of deep recurrent neural network. Through real-world experimentation we prove the performance superiority of this approach over some other solutions previously proposed in the literature. Furthermore, we demonstrate that a real-world defense system using our approach has a built-in ability to self-adjust (i.e., to deal with unpredictable changes in the environment) in an automated and adaptive manner.https://www.mdpi.com/2624-800X/1/3/23IoT securityspoofingMAC authenticationintrusion detection systemLSTM autoencoders
spellingShingle Pooria Madani
Natalija Vlajic
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
Journal of Cybersecurity and Privacy
IoT security
spoofing
MAC authentication
intrusion detection system
LSTM autoencoders
title RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
title_full RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
title_fullStr RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
title_full_unstemmed RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
title_short RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
title_sort rssi based mac layer spoofing detection deep learning approach
topic IoT security
spoofing
MAC authentication
intrusion detection system
LSTM autoencoders
url https://www.mdpi.com/2624-800X/1/3/23
work_keys_str_mv AT pooriamadani rssibasedmaclayerspoofingdetectiondeeplearningapproach
AT natalijavlajic rssibasedmaclayerspoofingdetectiondeeplearningapproach