Internet of Things

Cybersecurity: malicious connected objects betrayed by their radio frequencies

Date:

Changed on 19/02/2025

There are billions of connected objects in the world, and this number is ever-increasing. This abundance poses a major cybersecurity threat: in this mass of objects, how can we pinpoint the malicious ones used for attacks? Inria’s scientists have put forward a new method: authentication of connected objects using their radio frequency fingerprint and machine learning.
L'équipe-projet Fun a travaillé sur l’identification des objets connectés à partir de leur empreinte radiofréquence.
Mathieu Génon / Inria

Two smartphones or two smart watches of the same model and same brand are identical, aren’t they? “Don’t be fooled”, says Valeria Loscri, Head of Research of the Fun project team at the Inria Centre at the University of Lille. The standardised mass production of connected objects does not mean that there aren’t tiny differences or imperfections between them. These differences can impact the radio frequencies emitted by the objects, which can result in a shift in the carrier frequency or a phase shift on an oscillator or another part of the microcircuit. 

The Fun (Future Ubiquitous Networksproject team therefore looked into a way of using these imperfections to effectively authenticate devices for security reasons. “They can be compared to identical twins. They look exactly alike but they don’t have the same fingerprints”, explains Valeria Loscri.

Unique and almost unforgeable imperfections

Scientists intend to use these imperfections to their advantage. Faced with the growing threat of illegal devices infiltrating wireless networks, to steal identity for example, the possibility of distinguishing a malicious device from others is a way to secure communication.

Verbatim

These manufacturing flaws have unique characteristics that are difficult to reproduce, even with the advanced techniques that cyber criminals use to steal identities. We have therefore analysed the radio frequencies of various connected objects. This data is unique and almost unforgeable.

Auteur

Ildi Alla

Poste

PhD student in the Fun project-team

Realistic test subjects thanks to reprogramming

Using these actual measurements, the team simulated three realistic communication environment scenarios, involving a number of different objects, some of them authorised, and some not. The team experimented with these scenarios using software-defined radios, which are configurable emitting and receiving devices. Using these devices, they managed to reproduce the emissions of several connected object test samples, each one defined by its own specific and unique imperfections.

Verbatim

Without these configurable devices, we would have needed a vast quantity of connected objects to test all the possibilities. Here, rather than leaving things to chance, we tested by adding an imperfection, then two, three... to determine how many imperfections are needed to be able to identify a device.

Auteur

Selma Yahia

Poste

Postdoctoral researcher in the Fun project-team

L'équipe-projet Fun a travaillé sur l’identification des objets connectés à partir de leur empreinte radiofréquence.
Mathieu Génon / Inria
Configurable emitting and receiving radio devices made it possible to reproduce the emissions of several connected object test samples.

Machine learning to authenticate connected objects

These samples were analysed by training different machine learning models to recognise combinations of imperfections and characterise objects accordingly: Random Forest, Support Vector Machines, K-Nearest Neighbors, XGBoost and logistic regression.

“Of these models, Random Forest has proven the most effective”, says Valeria Loscri. “This machine learning algorithm associates the results of several decision trees to then produce one single output. This has been used to authenticate connected objects with a combination of three imperfections, with a detection rate exceeding 96%, even in the most demanding environments! ” 

The three scientists also tested their solution in various cyberattack scenarios, such as using interference to assess the resistance to background noise, or multi-node attacks involving several malicious devices acting simultaneously.

3

communication scenarios tested

96 %

detection rate

3

badges obtained at the ACSAC conference

A robust, energy-efficient solution

Ultimately, this approach combining the identification of connected objects based on materials and machine learning models could prove more effective than traditional cryptographic methods when it comes to cybersecurity. Not only does the Fun project-team’s solution use much less computing power and energy, it also avoids the use of data encryption keys that can be intercepted or corrupted. 

What are the researchers doing now?

Verbatim

We are continuing our research to develop our authentication method and make it universal. This involves training our data using other learning methods such as Deep Learning.

Auteur

Valeria Loscri

Poste

Chercheuse dans l'équipe-projet Fun

And the Fun project-team can applaud themselves for the results they have already achieved: “Our solution has proven to be effective, robust and flexible. A number of cybersecurity experts actually showed an interest in it at the Annual Computer Security Applications Conference (ACSAC) in December 2024 in Hawaii.” (See below)

L'équipe-projet Fun a travaillé sur l’identification des objets connectés à partir de leur empreinte radiofréquence.
Mathieu Génon / Inria
L'apprentissage automatique a servi à reconnaître des combinaisons de défauts afin de caractériser les objets connectés.

Research acclaimed for its openness

The Annual Computer Security Applications Conference (ACSAC) in December 2024 in Hawaii presented an opportunity to participate in an ‘artefact evaluation’ session. Valeria Loscri, Selma Yahia and Ildi Alla decided to submit their software and data to be evaluated. The aim? Encourage the replicability of scientific results, by making them available to the community, and accelerating research by using models that have already been developed by other teams. To encourage this approach, badges are awarded.

In concrete terms, the ACSAC suggested that authors of publications use a virtual machine to experiment with their solution. The researchers from Inria’s Fun project-team downloaded their data onto this server, as well as the learning methods that had been developed. Rapporteurs observed that the solution works perfectly. Moreover, the method developed by Inria was well-documented, making it easier to apply to an open science environment. As a result, Valeria Loscri, Selma Yahia and Ildi Alla were awarded three badges, acknowledging the quality of their research and the possibility of reproducing their results on an experimental basis: Code Available, Code Reviewed and Code Reproducible.

Finally, the team discussed their work at a workshop entitled  ‘LASER’. The purpose was to review the initial statistics-based results that were not conclusive. This is because a negative outcome can also contribute to progressive developments, by preventing other researchers from going down the same path! “It was a rewarding experience and we were able to discuss our work with leading experts in the field of cybersecurity”, enthuses Ildi Alla. “The feedback we were given has even inspired us to explore new research paths. ”

Find out more

For experts