TY - JOUR
T1 - Detecting and Localizing Wireless Spoofing Attacks on the Internet of Medical Things
AU - Jayaraj, Irrai Anbu
AU - Shanmugam, Bharanidharan
AU - Azam, Sami
AU - Thennadil, Suresh
PY - 2024/12
Y1 - 2024/12
N2 - This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based on spatial correlation calculated from received signal strength (RSS). To detect and mitigate wireless spoofing attacks in IoMT environments effectively, the hybrid approach combines spatial correlation analysis, Deep CNN classification, Elliptic Curve Cryptography (ECC) encryption, and DSRM-powered attack detection enhanced (DADE) detection and localization (DAL) frameworks. A deep neural network (Deep CNN) was used to classify trusted transmitters based on Python Spyder3 V5 and ECC encrypted Hack RF Quadrature Signals (IQ). For localizing targets, this paper also presents DADE and DAL frameworks implemented on Eclipse Java platforms. The hybrid approach relies on spatial correlation based on signal strength. Using the training methods of Deep CNN1, Deep CNN2, and Long Short-Term Memory (LSTM), it was possible to achieve accuracies of 98.88%, 95.05%, and 96.60% respectively.
AB - This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based on spatial correlation calculated from received signal strength (RSS). To detect and mitigate wireless spoofing attacks in IoMT environments effectively, the hybrid approach combines spatial correlation analysis, Deep CNN classification, Elliptic Curve Cryptography (ECC) encryption, and DSRM-powered attack detection enhanced (DADE) detection and localization (DAL) frameworks. A deep neural network (Deep CNN) was used to classify trusted transmitters based on Python Spyder3 V5 and ECC encrypted Hack RF Quadrature Signals (IQ). For localizing targets, this paper also presents DADE and DAL frameworks implemented on Eclipse Java platforms. The hybrid approach relies on spatial correlation based on signal strength. Using the training methods of Deep CNN1, Deep CNN2, and Long Short-Term Memory (LSTM), it was possible to achieve accuracies of 98.88%, 95.05%, and 96.60% respectively.
KW - Deep-CNN
KW - Hack RF
KW - IoMT
KW - software defined radio
KW - wireless spoofing
UR - http://www.scopus.com/inward/record.url?scp=85213459474&partnerID=8YFLogxK
U2 - 10.3390/jsan13060072
DO - 10.3390/jsan13060072
M3 - Article
AN - SCOPUS:85213459474
SN - 2224-2708
VL - 13
SP - 1
EP - 21
JO - Journal of Sensor and Actuator Networks
JF - Journal of Sensor and Actuator Networks
IS - 6
M1 - 72
ER -