Not logged in.

Contribution Details

Type Bachelor's Thesis
Scope Discipline-based scholarship
Title Implementation and Detection of Spectrum Sensing Data Falsification Attacks Affecting Crowdsensing Platforms
Organization Unit
Authors
  • Robin Wassink
Supervisors
  • Alberto Huertas Celdran
  • Jan Von der Assen
  • Burkhard Stiller
Language
  • English
Institution University of Zurich
Faculty Faculty of Business, Economics and Informatics
Date 2022
Abstract Text The usage of mobile data has increased massively over the past few years and the trend is only rising. A part of this trend is due to the growth of the Internet-of-Things (IoT), which is merging the digital and physical worlds. IoT devices are collecting and transmitting countless of bits over the wireless spectrum and as a result, the radio frequency (RF) spectrum is getting bursty and overcrowded. Yet IoT devices are also beneficial for the RF spectrum, as they are used as sensors in monitoring networks that analyze the spectrum usage to optimize the use of the wireless spectrum. However, these devices are well-known to be resource-constrained and therefore a growing cybersecurity concern. In a sensing network, they are vulnerable to Spectrum Sensing Data Falsification (SSDF) attacks trying to manipulate the data. Recent research has proposed behavioral fingerprinting and Machine/Deep Learning (ML/DL) to detect those attacks. To improve the limitations of the recent literature, another implementation of the latest defined SSDF attacks is proposed in this thesis. The sensing software used in the crowdsensing monitoring platform ElectroSense has been modified to implement seven SSDF attacks. The attacks have been executed in several different configurations whilest the behavior of the infected device has been observed based on the system call trace. A Machine Learning (ML) framework thereafter has cleaned the gathered datasets, extracted features and trained multiple unsupervised ML algorithms with normal behavior data. The infected data has then been classified by the models to evaluate the anomaly detection performance in different settings. The experiments have demonstrated that the proposed implementation using variables is not reliably detectable compared to previous implementations using files stored in disk.
PDF File Download
Export BibTeX