{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T22:58:54Z","timestamp":1772233134372,"version":"3.50.1"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T00:00:00Z","timestamp":1738800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The use of wireless sensor networks (WSNs) in critical applications such as environmental monitoring, smart agriculture, and industrial automation has created significant security concerns, particularly due to the broadcasting nature of wireless communication. The absence of physical-layer authentication mechanisms exposes these networks to threats like spoofing, compromising data authenticity. This paper introduces a multi-attribute physical layer authentication (PLA) scheme to enhance WSN security by using physical attributes such as received signal strength indicator (RSSI), battery level (BL), and altitude. The LoRaWAN join procedure, a key risk due to plain text transmission without encryption during initial communication, is addressed in this study. To evaluate the proposed approach, a partially synthesized dataset was developed. Real-world RSSI values were sourced from the LoRa at the Edge Dataset, while BL and altitude columns were added to simulate realistic sensor behavior in a forest fire detection scenario. Machine learning (ML) models, including Logistic Regression (LR), Random Forest (RF), and K-Nearest Neighbors (KNN), were compared with deep learning (DL) models, such as Multi-Layer Perceptron (MLP) and Convolutional Neural Networks (CNN). The results showed that RF achieved the highest accuracy among machine learning models, while MLP and CNN delivered competitive performance with higher resource demands.<\/jats:p>","DOI":"10.3390\/fi17020068","type":"journal-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T08:53:41Z","timestamp":1738832021000},"page":"68","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2294-7539","authenticated-orcid":false,"given":"Azita","family":"Pourghasem","sequence":"first","affiliation":[{"name":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-6813","authenticated-orcid":false,"given":"Raimund","family":"Kirner","sequence":"additional","affiliation":[{"name":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"given":"Athanasios","family":"Tsokanos","sequence":"additional","affiliation":[{"name":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6984-0268","authenticated-orcid":false,"given":"Iosif","family":"Mporas","sequence":"additional","affiliation":[{"name":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8819-5831","authenticated-orcid":false,"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[{"name":"Cybersecurity and Computing Systems Research Group, Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,6]]},"reference":[{"key":"ref_1","unstructured":"(2020). IEEE Standard for an Architectural Framework for the Internet of Things (IoT) (Standard No. IEEE 2413-2019)."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_3","unstructured":"World Economic Forum (2024, November 05). The Future of Jobs Report 2024. Available online: https:\/\/www.weforum.org\/meetings\/world-economic-forum-annual-meeting-2024\/."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","unstructured":"Mordor Intelligence (2024, November 05). Wireless Sensor Networks (WSNs) Market\u2014Growth, Trends, COVID-19 Impact, and Forecasts (2024\u20132026). Mordor Intelligence., Available online: https:\/\/www.mordorintelligence.com\/."},{"key":"ref_6","unstructured":"LoRa Alliance (2024, November 05). LoRaWAN\u00ae 1.1 Specification. Available online: https:\/\/resources.lora-alliance.org\/technical-specifications\/lorawan-specification-v1-1."},{"key":"ref_7","unstructured":"Rappaport, T.S. (2002). Wireless Communications: Principles and Practice, Prentice Hall. [2nd ed.]."},{"key":"ref_8","first-page":"107186","article-title":"A comprehensive review on the security challenges of wireless sensor networks","volume":"92","author":"Onyancha","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_9","first-page":"27","article-title":"Securing IoT wireless networks using physical layer authentication with machine learning","volume":"22","author":"Bhat","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"ref_10","first-page":"102","article-title":"A Systematic Review of Security in the LoRaWAN Network Protocol","volume":"30","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_11","first-page":"2407","article-title":"A survey of security in WSNs","volume":"21","author":"Jiang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_12","unstructured":"Na, S., Hwang, D., Shin, W., and Kim, K.H. (2017, January 11\u201313). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam."},{"key":"ref_13","first-page":"5279","article-title":"A hybrid deep learning model for wireless sensor network security","volume":"39","author":"Periasamy","year":"2020","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_14","first-page":"2192","article-title":"A survey on physical layer security for cognitive radio networks","volume":"21","author":"Zhang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","first-page":"91","article-title":"Machine learning-based spoofing detection for wireless networks: A survey","volume":"25","author":"Li","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gupta, K., and Shukla, S. (2016, January 3\u20135). Internet of Things: Security challenges for next generation networks. Proceedings of the 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Greater Noida, India.","DOI":"10.1109\/ICICCS.2016.7542301"},{"key":"ref_17","unstructured":"Bai, L., Zhang, J., and Liu, Y. (2021, January 14\u201323). Physical-layer jammer detection in multi-hop IoT networks using machine learning. Proceedings of the IEEE International Conference on Communications, Montreal, QC, Canada."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Bhatia, L., Breza, M., Marfievici, R., and McCann, J.A. (2020, January 16\u201319). LoED: The LoRaWAN at the Edge Dataset. Proceedings of the 3rd International SenSys+BuildSys Workshop on Data: Acquisition to Analysis (DATA \u201920), Virtual Event, Japan.","DOI":"10.1145\/3419016.3431491"},{"key":"ref_19","first-page":"11312","article-title":"Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices","volume":"11","author":"Gupta","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_20","first-page":"1814","article-title":"Physical-Layer Security in IoT Networks Using Feature-Based Deep Learning Approaches","volume":"23","author":"Kumar","year":"2024","journal-title":"IEEE Trans. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Filippou, S., Achilleos, A., Zukhraf, S.Z., Laoudias, C., Malialis, K., and Michael, M.K. (2023, January 20\u201323). A Machine Learning Approach for Detecting GPS Location Spoofing Attacks in Autonomous Vehicles. Proceedings of the 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Florence, Italy.","DOI":"10.1109\/VTC2023-Spring57618.2023.10200857"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Pinto, E.M.d.L., Lachowski, R., Pellenz, M.E., Penna, M.C., and Souza, R.D. (2018, January 16\u201318). A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor Networks. Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland.","DOI":"10.1109\/AINA.2018.00113"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Khoei, T.T., Aissou, G., Al Shamaileh, K., Devabhaktuni, V.K., and Kaabouch, N. (2023, January 18\u201320). Supervised Deep Learning Models for Detecting GPS Spoofing Attacks on Unmanned Aerial Vehicles. Proceedings of the 2023 IEEE International Conference on Electro Information Technology (eIT), Romeoville, IL, USA.","DOI":"10.1109\/eIT57321.2023.10187274"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1186\/s13634-023-01103-1","article-title":"Detecting GNSS spoofing using deep learning","volume":"2024","author":"Li","year":"2024","journal-title":"EURASIP J. Adv. Signal Process."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/68\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:27:44Z","timestamp":1760027264000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,6]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["fi17020068"],"URL":"https:\/\/doi.org\/10.3390\/fi17020068","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,6]]}}}