IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v17y2025i2p68-d1584588.html
   My bibliography  Save this article

Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN

Author

Listed:
  • Azita Pourghasem

    (Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK)

  • Raimund Kirner

    (Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK)

  • Athanasios Tsokanos

    (Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK)

  • Iosif Mporas

    (Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK)

  • Alexios Mylonas

    (Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK)

Abstract

The use of wireless sensor networks (WSNs) in critical applications such as environmental monitoring, smart agriculture, and industrial automation has created significant security concerns, particularly due to the broadcasting nature of wireless communication. The absence of physical-layer authentication mechanisms exposes these networks to threats like spoofing, compromising data authenticity. This paper introduces a multi-attribute physical layer authentication (PLA) scheme to enhance WSN security by using physical attributes such as received signal strength indicator (RSSI), battery level (BL), and altitude. The LoRaWAN join procedure, a key risk due to plain text transmission without encryption during initial communication, is addressed in this study. To evaluate the proposed approach, a partially synthesized dataset was developed. Real-world RSSI values were sourced from the LoRa at the Edge Dataset, while BL and altitude columns were added to simulate realistic sensor behavior in a forest fire detection scenario. Machine learning (ML) models, including Logistic Regression (LR), Random Forest (RF), and K-Nearest Neighbors (KNN), were compared with deep learning (DL) models, such as Multi-Layer Perceptron (MLP) and Convolutional Neural Networks (CNN). The results showed that RF achieved the highest accuracy among machine learning models, while MLP and CNN delivered competitive performance with higher resource demands.

Suggested Citation

  • Azita Pourghasem & Raimund Kirner & Athanasios Tsokanos & Iosif Mporas & Alexios Mylonas, 2025. "Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN," Future Internet, MDPI, vol. 17(2), pages 1-14, February.
  • Handle: RePEc:gam:jftint:v:17:y:2025:i:2:p:68-:d:1584588
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/17/2/68/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/17/2/68/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:2:p:68-:d:1584588. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.