On the Impact of CDL and TDL Augmentation for RF Fingerprinting Under Impaired Channels

Omer Melih Gul1, Michel Kulhandjian1, Burak Kantarci1,*, Claude D’Amours1, Azzedine Touazi2 and Cliff Ellement2

1Department of EECS, University of Ottawa, Ottawa, ON, Canada
2Artificial Intelligence Solutions, ThinkRF, Ottawa, ON, Canada
E-mail: ogul@uottawa.ca; mkulhand@uottawa.ca; burak.kantarci@uotta wa.ca; cdamours@uottawa.ca; azzedine.touazi@thinkrf.com; cliff.ellement @thinkrf.com
*Corresponding Author
Manuscript received 20 July 2023, accepted 23 November 2023, and ready for publication 21 March 2024.
© 2024 River Publishers

Abstract

Cyber-physical systems have recently been used in several areas (such as connected and autonomous vehicles) due to their high maneuverability. On the other hand, they are susceptible to cyber-attacks. Radio frequency (RF) fingerprinting emerges as a promising approach. This work aims to analyze the impact of decoupling tapped delay line and clustered delay line (TDL+CDL) augmentation-driven deep learning (DL) on transmitter-specific fingerprints to discriminate malicious users from legitimate ones. This work also considers 5G-only-CDL, WiFi-only-TDL augmentation approaches. RF fingerprinting models are sensitive to changing channels and environmental conditions. For this reason, they should be considered during the deployment of a DL model. Data acquisition can be another option. Nonetheless, gathering samples under various conditions for a train set formation may be quite hard. Consequently, data acquisition may not be feasible. This work uses a dataset that includes 5G, 4G, and WiFi samples, and it empowers a CDL+TDL based augmentation technique in order to boost the learning performance of the DL model. Numerical results show that CDL+TDL, 5G-only-CDL, and WiFi-only-TDL augmentation approaches achieve 87.59%, 81.63%, 79.21% accuracy on unobserved data while TDL/CDL augmentation technique and no augmentation approach result in 77.81% and 74.84% accuracy on unobserved data, respectively.

Keywords: Data augmentation, deep learning, RF fingerprinting, secure design, uncrewed aerial vehicles.

1 Introduction

Cyber-physical systems which are networked systems with physical and computational capabilities can be applied to many areas. They include wireless communications, search and rescue, crop spraying and monitoring, and agricultural, fire, or wildlife surveillance. Their integration with wireless communication capabilities brings many advantages. Nevertheless, they may face security issues. To name a few for a sample cyber-physical system, an uncrewed aerial vehicle (UAV) may be susceptible to tampering, masquerading, spoofing, and replay attacks [1, 2].

Considering their various features and characteristics of the systems, various security solutions are suggested at various levels. An intrusion detection system is used to identify suspicious activities in application and network layers. Furthermore, applying message encryption at different levels is of paramount importance to protect data at rest and in transmission. On the basis of this motivation, authentication and encryption-based security solutions for cyber-physical systems have been widely investigated [1]. Recently, Alladi et al. [2] introduce an authentication system based on a physical unclonable function. Bassey et al. [3] discuss the use of authentication codes for an Internet of Things (IoT) device, and by leveraging the Kolmogorov-Smirnov test, it determines the legitimacy of the user of an IoT device.

Despite the existence of encryption and authentication techniques, cyber-physical systems are vulnerable to spoofing attacks that can be coped if system-level security-complemented encryption and authentication-based solutions. For instance, Shi et al. [4] present an anticipatory study via a generative adversarial network (GAN)-based spoofing attacks that aim to bypass the authentication barrier by mimicking legitimate transmitters. To do so, the GAN-based adversarial attack captures channel effects and waveforms. Consequently, it increases the success probability of such an attack. GANs can also be used to safeguard systems against spoofing attacks. Sagduyu et al. [5] exploit the classification outputs of a neural network to deceive adversaries. At lower layers such as in the radio frequency (RF) domain, security by design can be offered to cyber-physical systems.

RF security entails hardware-specific characteristics and imperfections of transmitters. For example, in a connected vehicle network, each vehicle transmitter reveals hardware imperfections during communications via RF transmissions, which is referred to as RF fingerprint of their transmitters. For ultra-reliable low latency communications (URLLC) purposes, RF fingerprinting can suggest security solutions to accelerate security services in comparison to network-layer (L3) solutions. RF fingerprinting can be defined as mining hardware imperfection patterns in manufacturing defaults [6]. DL methods are widely studied and shown to be successful at extracting specific features. Therefore, DL models can be utilized to detect particular RF signatures [7].

Channel impairments affect the performance of DL techniques to identify the RF signatures of a transmitter [8, 9]. It is not feasible to collect data in all circumstances. For this reason, applying augmentation methods for RF fingerprinting is a viable solution to deal with channel impairments during the DL training process. As a special type of augmentation technique, adversarial machine learning can be used prior to training DL classifiers for RF fingerprinting [10].

This study that was initially presented in [23] differs from the existing works with the following points:

• To the best of our knowledge, this is the first work focusing on applying different types of data augmentation on raw time-domain signals in heterogeneous environments with real-world data.

• We decouple the tapped delay line (TDL) and clustered delay line (CDL) augmentation approaches such that 5G data is augmented by CDL whereas WiFi data is augmented by transforming it by TDL (referred to as CDL+TDL hereafter).

This study extends our work in [23] with the following points:

• We propose a 5G-only-CDL augmentation approach where only 5G data is augmented with CDL transform. Thus, we can observe its difference from CDL/TDL augmentation.

• We propose a WiFi-only-TDL augmentation approach where only WiFi data is augmented with TDL transform. Thus, we can observe its difference from CDL/TDL augmentation.

This paper is structured as follows. Related work is reviewed in Section 2. Section 3 gives the system model and problem definition. Section 4 introduces the 5G-only-CDL and WiFi-only-TDL augmentation techniques. Section 5 introduces the decoupled CDL+TDL augmentation technique. Section 6 presents simulation results. Section 8 concludes this work and presents future work.

2 Related Work

This section presents the most relevant literature on RF fingerprinting. The work presented by Cekic et al. primarily focuses on multiple WiFi protocols (IEEE 802.11a and IEEE802.11.g) and automatic dependent surveillance-broadcast (ADS-B) protocol [11] to identify two main transmitter characteristics, namely in-phase and quadrature-phase (I/Q) imbalance, and power amplifier nonlinearity. A comparison of additive white Gaussian noise (AWGN) and without augmentation is presented. Shea et al. in [12] report that complex-value networks may not be sufficient for radio signal classification in many real-world applications.

Sankhe et al. [13] leverage raw I/Q samples to characterize static channels, which eliminates the coefficient prediction requirement. On the other hand, complex demodulated symbols are utilized to remove channel effects. By exploiting direct current (DC) offset and I/Q imbalance, a convolutional neural network (CNN) is trained to recognize radio signal signatures under static and varying channel characteristics.

Ozturk et al. [14] present a CNN-based approach that takes spectrograms and time-series images of RF signals as inputs. Transient signals with low signal-to-noise-ratio (SNR) are prone to noise effects; hence, it is not viable to use a time series-based model. As a result of the frequency range consideration by spectrograms, more accurate outputs can be obtained in comparison to the time series-based model.

RF signatures of UAVs are aimed to be identified by Mohanti et al. [15] under a CNN with VGG backbone. To tackle I/Q imbalance, amplitude changes are fed into real and imaginary components. It is worth noting that DL-based fingerprinting mechanisms can recognize UAV radio signals only if the channel conditions do not change across training and test phases. To cope with this phenomenon, the authors propose a processing block to arrange I/Q instances.

Soltanie et al. [16] propose two alternate augmentation methods that build on two finite impulse response filters. The first method is trained under a dataset generated in MATLAB and validated under a DARPA dataset. These methods have been shown to run with raw I/Q instances without quadrature phase shift keying (QPSK) modulation. The high throughput task group (TGn) of wireless local area network (WLAN) channel data samples are augmented with AWGN to mimic more realistic channel behavior. This method can perform well with channels that have not been seen before. Testing of this method is performed by considering the boundaries of single-channel models.

For RF fingerprinting purposes, Reus-Muns et al. [17] built a dataset that comprises WiFi, 5G, and LTE samples and feed raw I/Q samples into a neural network. The focal point of that work is to investigate the accuracy degradation between training and test data acquired on different days with different channel conditions. When the train and test data belong to the same day, the accuracy is sufficient whereas when the test is performed in a different day, the accuracy is remarkably degraded. To remediate this issue, leveraging triplet loss functions is proposed by Reus-Muns et al. [17] so that the accuracy is acceptable even if the training and test data are collected on different days, i.e., with different propagation conditions. Zhao et al. [18] present an analysis of wireless signals for UAV model classification by combining auxiliary classifier generative adversarial network (ACGAN) and Wasserstein generative adversarial network (WGAN) where root mean squared propagation is applied as an accelerator and signals obtained by applying a band-pass filter.

Table 1

images

Table 1 presents a comparative list of the relevant works that are closest to the work presented in this paper. It is observed that the majority of the relevant works rely on either synthetic datasets generated in MATLAB or datasets that contain modulated data. Training and testing on different days (i.e., varying channel conditions) is pursued by few studies. Since CDL/TDL augmentation was shown to perform well in the previous work in [19], this work aims to pursue a detailed investigation of decoupling CDL and TDL on 5G and WiFi waveforms, respectively under data-scarce scenarios.

images

Figure 1 In this network, base stations B5 and B6 communicates with mobile phone by resembling B2 and B3 (spoofing attack).

3 System Model and Problem Definition

This section introduces the system model before proceeding with the methodological details. Figure 1 illustrates the system model.

Autonomous vehicles, similar to other cyberphysical systems, are vulnerable to spoofing attacks. Each wireless device operates with slight hardware imperfections that are caused during manufacturing. These hardware imperfections can be recognized on radio signals as their wireless signatures, which are referred to as the RF fingerprint of the device. Alongside the enhanced mobile broadband (eMBB) and massive machine type communications (mMTC), the ultra-reliable low latency communications (URLLC) use case of 5G, requires security by design, for which RF fingerprinting is an ideal candidate.

The problem formulation for RF fingerprinting is as follows: A receiver aims to identify transmitters based on their RF signatures in time-domain raw signal samples.

The objective of this study is to obtain high accuracy under Day-2 data when the radio signal classifier is trained under Day-1 data. Thus, we aim to provide insights into decoupling the channel condition effects and the transmitter impairments. The radio signal instances in the data consist of 5G, WiFi, and LTE waveforms in the POWDER Dataset that were originally presented in [17]. The dataset includes 60 .bin files for Day-1 and 60 .bin files for Day-2 that are equally split between the 5G, 4G/LTE, and WiFi waveforms for both days.

4 5G-only-CDL and WiFi-only-TDL Augmentation Approaches

As previously stated, RF fingerprinting is susceptible to a variety of channel and environmental conditions; as a result, RF fingerprinting requires effective solutions that are robust (in terms of accuracy) in a variety of circumstances. Data augmentation-based solutions are required to develop neural network architectures that take the channel conditions into consideration. In fact, the goal of data augmentation is to develop a method that can replicate radio signal traces in a variety of channel and environmental settings.

In this section, we propose two augmentation approaches where each of CDL and TDL transforms are applied to just one of the communication technologies data (5G, WiFi) instead of applying the same transform to all data. In the first subsection, we first propose a 5G-only-CDL augmentation approach different from CDL/TDL approach. Then, in the second subsection, we propose a WiFi-only-TDL augmentation approach different from CDL/TDL approach.

4.1 5G-only-CDL Augmentation Approach

In this subsection, we attempt to observe the effect of applying CDL transform on just a subset (5G data) of the dataset instead of applying CDL transform to all data. This provides more insight for us to present the CDL+TDL augmentation approach, which is proposed in [23], in the following section.

We used the MATLAB 5G Toolbox (found in [20]) to apply CDL-transform on only 5G signals for data augmentation to train the model before the unseen data with channel impairments. A minimalist illustration of 5G-only-CDL augmentation is given in Figure 2.

images

Figure 2 The proposed 5G-only-CDL augmentation architecture.

images

Figure 3 The proposed WiFi-only-TDL augmentation architecture.

4.2 WiFi-only-TDL Augmentation Approach

In this subsection, we would like to observe the effect of applying TDL transform on just a subset (WiFi data) of the dataset instead of applying TDL transform to all data. This provides more insight for us to present the CDL+TDL augmentation approach, which is proposed in [23], in the following section.

We suggest using the MATLAB 5G Toolbox (found in [20]) to apply TDL-transform on only WiFi signals for data augmentation to train the model before the unseen data with channel impairments.

A minimalist illustration of WiFi-only-TDL augmentation is given in Figure 3.

5 Decoupled CDL and TDL (CDL+TDL) Augmentation Approach

As stated earlier, RF fingerprinting is vulnerable to varying channel and environmental conditions; hence, RF fingerprinting calls for effective solutions that are robust (in terms of accuracy) under these varying conditions. To account for the channel conditions in the design of a neural network architecture, data augmentation-based solutions are needed. Indeed, the rationale for data augmentation is to come up with a technique that can mimic radio signal traces under varying channel and environmental conditions.

In order to train the model prior to the unobserved data with channel impairments, we propose to decouple CDL and TDL augmentation via MATLAB 5G Toolbox (available in [20]) for 5G and WiFi signals. All models are designed for full frequency ranges. It may be scaled further for observing the desired root-mean-square (RMS) delay spread. Therefore, special models for line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios can be designed [21]. In addition to the Day-1 data of the dataset, we aim to add more knowledge that represents characteristics of unobserved data on Day-1. The rationale for this is to cope with the channel impairments / varying channel conditions on Day-2. To do so, more information is added to Day-1 data so as to learn and handle channel impairments during the test of Day-2 data.

The previous work in [19] introduces CDL/TDL augmentation which is quite suitable to output augmented data from 5G samples. Additionally, this paper shows that augmenting WiFi samples with TDL works well with WiFi samples.

This work introduces the decoupled CDL+TDL augmentation technique that augments 5G data samples by transforming them via CDL transformation, and WiFi data samples by transforming them via TDL transformation. Day-1 (train) data is augmented via this augmentation technique, and Day-2 data for testing.

It should be noted that CDL/TDL augmentation technique applies the same transform to all waveforms types of 5G, LTE, and WiFi data. In other words, it applies CDL transform to all or TDL transform to all. Both transforms are highly correlated with each other so their performance figures are alike. On the other hand, the CDL+TDL augmentation technique decouples TDL and CDL transforms by applying CDL transform just on 5G-waveform data and TDL transform just on WiFi data for data augmentation (LTE-waveform data is not augmented in CDL+TDL augmentation approach).

A minimalist illustration of decoupled CDL+TDL augmentation is given in Figure 4.

images

Figure 4 The proposed decoupled CDL+TDL augmentation architecture.

Figure 5 shows the classifier structure which is adopted from the study in [17].

images

Figure 5 The classifier used in CDL+TDL augmentation architecture.

6 Numerical Results

As mentioned in Section III, the POWDER dataset [17] is used in this work to test the decoupled CDL+TDL, 5G-only-CDL, and WiFi-only-TDL augmentation approaches. The public dataset used in this work includes raw I/Q signal samples transmitted from four base stations. The data instances of 5G, WiFi, and LTE signals in the dataset are collected on two different days, i.e., Day-1 and Day-2.

To cope with the channel impairments, we use CDL transformation for 5G samples and TDL transformation for WiFi samples for data augmentation. Moreover, for a better comparison of CDL+TDL, 5G-only-CDL, and WiFi-only-TDL augmentation approaches with CDL/TDL augmentation introduced in [19], we use the same settings in [19] and the POWDER dataset in [17].

Table 2 exhibits the accuracy levels under the CDL+TDL augmentation technique, 5G-only-CDL, WiFi-only-TDL, TDL/ CDL augmentation technique, and no augmentation in the four base station scenario under the POWDER dataset. The training process lasts 16 epochs for all cases.

Table 2

images

images

Figure 6 t-SNE visualization for Train Data with no augmentation.

images

Figure 7 t-SNE visualization for Train Data with TDL/CDL Augmentation.

images

Figure 8 t-SNE visualization for Test data.

Numerical results show that the decoupled CDL+TDL augmentation achieves significantly better performance than the TDL/CDL-based augmentation and no augmentation approaches for the scenario where the model is trained with Day-1 data and tested under Day-2 data. According to the numerical results, the decoupled CDL+TDL, 5G-only-CDL, WiFi-only-TDL augmentation techniques achieve an accuracy level of 87.59%, 81.63%, 79.21%, respectively on previously unobserved data whereas TDL/CDL augmentation technique and no augmentation approach result in an accuracy level of 77.81% and 74.84%, respectively on unobserved data. Figures 68 demonstrate the t-SNE plots for four base stations to visualize the impact of the augmentation methods.

7 Future Research Challenges

This paper investigates several potential wireless security problems and proposes wireless device fingerprinting methods. In this section, we identify a few significant open research difficulties and possibilities to construct a robust radio frequency fingerprinting system (RFFS) for completeness. These issues include simulation-reality gap, the impact of receiver hardware, RFFS vulnerabilities [8].

7.1 Simulation-reality Gap

Synthetic data realism is also crucial. Deep learning models trained on synthetic data are hard to apply to real radio transmissions. The synthetic dataset’s assumptions about transmitter hardware defects and fading channel vs actual hardware and environmental impacts create a capability gap. Real-world data from IoT sensors and radios are scarce, which leads to synthetic data. In natural language processing (NLP) and computer vision (CV), large-scale datasets like MNIST [24], Stanford sentiment [25], IMDb [26], Sentiment140 [27], etc., are easily available. Existing datasets cannot be used in different machine learning frameworks since there is no standard dataset structure and organization. To achieve universal performance, neural networks must be trained with more data. Generalization is the first step to deployment-ready fingerprinting.

7.2 Impact of Receiver Hardware

Like transmitter hardware, receiver hardware captures and processes emissions for fingerprinting. The receiver hardware’s phase noise, clock offsets, filter distortions, IQ imbalance, etc., could alter the transmitter’s measured fingerprint to look like a rogue or unrecognized emitter. The ADC sampling rate and low pass filter (LPF) bandwidth are equally crucial in keeping fingerprint features in the PSD side lobes. Using MicaZ sensors, higher sampling rates retained fingerprint features but increased noise [28].

The transmitter and receiver antenna polarization and orientation can also affect the radiation pattern and fingerprint extraction performance. Emitter antenna hardware imperfections can contribute to the fingerprint feature set for wireless emitter identification [29]. The quantity, type, direction, and polarization of receiving antennas can affect fingerprinting system classification performance.

In supervised learning, several receiver hardware captures for an emitter might be used. The model could generalize and distinguish the emitter fingerprint from recorded waveforms with a bigger training data set. Training on samples from certain receiver hardware and analyzing the learned emitter function can determine fingerprinting algorithm independence.

7.3 RFFS Vulnerabilities

Broadcast wireless emitters are vulnerable to identity spoofing. Impersonation, DoS, bandwidth theft, etc. It’s often forgotten that passive receiver threats can accumulate cognitive RFFS from transmitter emissions. Another intriguing research challenge to improve wireless security is developing or perturbing the emitter fingerprint so that only legitimate receivers can extract or identify it. RF fingerprinting is expected to be robust to impersonation attacks due to the difficulty of duplicating frontend impairments with replay assaults due to the replaying device’s hardware faults. This area is still mostly unexplored. Modulation-based RF fingerprinting is more vulnerable to impersonation attempts than transient-based [30]. Another study in [31] examined how numerous low-end receivers made with cheap analog components affected modulation-based RF fingerprinting’s impersonation resistance. The receivers’ RF fingerprints differed from the transmitter’s. As mentioned above, the receiver’s hardware defects enhance the fingerprint feature set. They use this information to combat impersonation attacks by claiming that the impersonator would not be able to extract the receiver hardware’s fingerprint features, making RFFS even more secure. Jamming DoS assaults, when the intruder transmits continuously on the working frequency, can also affect the RFFS. RFFS’s resilience to DoS attacks will need further investigation. Jamming can also be utilized for clandestine and confidential activities to hide transmitters’ RF fingerprints. In [32], WiFi transmissions were experimentally analyzed for RF fingerprint obfuscation that only the authentic receiver can extract. Random phase faults allow only authentic receivers with a preshared key and randomization index to decode the message and fingerprint.

8 Conclusion

Deep Learning (DL) has been shown to strengthen RF fingerprinting in identifying a transmitter; however, identification accuracy may fail in the presence of unobserved data due to changing channel conditions. Since collecting data under all circumstances is not feasible, data augmentation emerges as a viable approach. Previously, Day-1 data was augmented by using TDL/CDL transformation along with AWGN added on the transformed data. In a four-base station scenario with POWDER dataset, TDL/CDL-based augmentation can result in an accuracy of 77.81% on Day-2. In this study, we introduce the 5G-only-CDL and WiFi-only-TDL approaches along with the decoupled CDL+TDL augmentation where 5G-waveform data is augmented with CDL transformation, and WiFi-waveform data is augmented with TDL transformation. CDL+TDL, 5G-only-CDL, WiFi-only-TDL augmentation approaches have been shown to increase the accuracy level to 87.59%, 81.63%, 79.21% on Day-2 leading to a remarkable improvement in the performance of the TDL/CDL-based augmentation.

References

[1] J.P. Yaacoub, H. Noura, O. Salman, and A. Chehab, “Security analysis of drones systems: attacks, limitations, and recommendations”, Internet of Things. 2020 Sep; 11: 100218.

[2] T. Alladi, Naren, G. Bansal, V. Chamola, M. Guizan, “SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication”, IEEE Transactions on Vehicular Technology, vol. 69, no. 12, December 2020.

[3] J. Bassey, X. Li, L. Qian, “Device authentication codes based on RF fingerprinting using deep learning”, arvix: 2004.08742v1, 19 April 2020.

[4] Y. Shi, K. Davaslioglu, Y. E. Sagduyu, “Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing,” IEEE Transactions on Cognitive Communications and Networking, Mar. 2021.

[5] Y. E. Sagduyu, Y. Shi, and T. Erpek, “Adversarial deep learning for over-the-air spectrum poisoning attacks,” IEEE Transactions on Mobile Computing, Feb. 2021.

[6] Y.S. Shiu, S. Y. Chang, H. C. Wu, S-CH Huang and H. H. Chen, “Physical layer security in wireless networks: a tutorial”, IEEE Wireless Communications, April 2011.

[7] S. Karunaratne, E. Krijestorac and D. Cabric, “Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack”, ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, 2021, pp. 1–6, doi: 10.1109/ICC42927.2021.9500893.

[8] Jagannath, A., Jagannath, J., and Kumar, P.S.P.V.: A Comprehensive Survey on Radio Frequency (RF) Fingerprinting Traditional Approaches, Deep Learning, and Open Challenges. Computer Networks, vol. 219, 2022, 109455, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.109455.

[9] C. Comert, O. M. Gul, M. Kulhandjian, A. Touazi, C. Ellement, B. Kantarci, C. D’Amours, “Secure Design of Cyber-Physical Systems at the Radio Frequency Level: Machine and Deep Learning-Driven Approaches, Challenges and Opportunities”, the book chapter (accepted on 20 April 2022) for a book publication by Springer, pp. 1–32.

[10] J. Liu, M. Nogueira, J. Fernandes and B. Kantarci, “Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems”, in IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 123–159, Firstquarter 2022.

[11] M. Cekic, S. Gopalakrishnan, U. Madhow, “Wireless fingerprinting via deep learning the impact of confounding factors”, 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp. 677–684

[12] T. J. O’Shea, T. Roy, T. C. Clansy, “Over the air deep learning based radio signal classification”, IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 168–179, Feb. 2018.

[13] K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis and K. Chowdhury, “ORACLE: Optimized Radio clAssification through convolutional neuraL networks,” IEEE Conference on Computer Communications (Infocom), 2019, pp. 370–378.

[14] E. Ozturk, F. Erden, and I. Guvenc “RF-based low-SNR classification of UAVs using convolutional neural networks”, arXiv online, arXiv:2009.05519v2

[15] S. Mohanti, N. Soltani, K. Sankhe, D. Jaisinghani, M. Di Felice and K. Chowdhury, “AirID: Injecting a custom RF fingerprint for enhanced UAV identification using deep learning”, GLOBECOM 2020 – 2020 IEEE Global Communications Conference, 2020, pp. 1–6.

[16] N. Soltani, K. Sankhe, J. Dy, S. Ioannidis, and K. Chowdhury, “More is better: Data augmentation for channel-resilient RF fingerprinting”, IEEE Communications Magazine, September 2020.

[17] G. Reus-Muns, D. Jaisinghani, K. Sankhe, K. R. Chowdhury, “Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR Platform”, GLOBECOM 2020 IEEE Global Communications Conference.

[18] C. Zhao, C. Chen, Z. Cai, M. Shi, X. Du, and M. Guizani, “Classification of small uavs based on auxiliary classifier wasserstein gans”, in IEEE Global Communications Conference (GLOBECOM) 2018, pp. 206–-212.

[19] C. Cömert, M. Kulhandjian, O. M. Gul, A. Touazi, C. Ellement, B. Kantarci, C. D’Amours, “Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels”, ACM WiseML 2022, pp. 3–8.

[20] End to end Simulations, Mathworks, available at: https://www.mathworks.com/help/5g/end-to-end-simulation.html.

[21] Study on channel model for frequencies from 0.5 to 100 GHz, ETSI Technical Report, version 16.1.0 Release 16, available at: https://www.etsi.org/deliver/etsi_tr/138900_138999/138901/16.01.00_60/tr_138901v160100p.pdf.

[22] N. Moseley, C.H. Slump, “A low-complexity feed-forward I/Q imbalance compensation algorithm”, Computational Statistics & Data Analysis, January 2006.

[23] O. M. Gul, M. Kulhandijan, B. Kantarci, A. Touazi, C. Ellement, C. D’Amours, “On the Impact of CDL and TDL Augmentation for RF Fingerprinting under Impaired Channels”, 48th Wireless World Research Forum (WWRF 2022), 07–09 November 2022, UAE, pp. 1–6.

[24] Y. LeCun and C. Cortes, “MNIST handwritten digit database”, 2010. [Online]. Available: http://yann.lecun.com/exdb/mnist/.

[25] R. Socher, A. Perelygin, J. Wu, J. Chuang, C. D. Manning, A. Ng, and C. Potts, “Recursive deep models for semantic compositionality over a sentiment treebank”, in Proc. of Empirical Methods in Natural Language Processing, 2013.

[26] A. L. Maas, R. E. Daly, P. T. Pham, D. Huang, A. Y. Ng, and C. Potts, “Learning word vectors for sentiment analysis”, in Proc. of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. Portland, Oregon, USA: Association for Computational Linguistics, June 2011, pp. 142–150. [Online]. Available: http://www.aclweb.org/anthology/P11-1015.

[27] A. Go, R. Bhayani, and L. Huang, “Twitter sentiment classification using distant supervision”, pp. 1-6, 2009. [Online]. Available: http://www.stanford.edu/~alecmgo/papers/TwitterDistantSupervision09.pdf.

[28] W. Wang, Z. Sun, S. Piao, B. Zhu, and K. Ren, “Wireless physical layer identification: Modeling and validation,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2091–2106, 2016.

[29] B. Danev, T. S. Heydt-Benjamin, and S. Capkun, “Physical-layer identification of rfid devices”, in USENIX security symposium, 2009, pp. 199–214.

[30] B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, “Attacks on physical-layer identification”, in Proc. of the Third ACM Conference on Wireless Network Security, ser. WiSec ’10. New York, NY, USA: Association for Computing Machinery, 2010, pp. 89–98. [Online]. Available: https://doi.org/10.1145/1741866.1741882.

[31] S. U. Rehman, K. W. Sowerby, and C. Coghill, “Analysis of impersonation attacks on systems using rf fingerprinting and low-end receivers”, Journal of Computer and System Sciences, vol. 80, no. 3, pp. 591–601, 2014, special Issue on Wireless Network Intrusion. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0022000013001220.

[32] L. F. Abanto-Leon, A. Bauml, G. H. A. Sim, M. Hollick, and A. Asadi, “Stay connected, leave no trace: Enhancing security and privacy in wifi via obfuscating radiometric fingerprints”, Proc. ACM Meas. Anal. Comput. Syst., vol. 4, no. 3, Nov 2020. [Online]. Available: https://doi.org/10.1145/3428329.

Biographies

images

Omer Melih Gul (S’17, M’21) received BSc., MSc., and PhD. degrees from the Department of Electrical and Electronics Engineering at Middle East Technical University (METU), Ankara, Turkiye, in 2012, 2014, and 2020, respectively by working as a research assistant at the same department. His research interests include machine learning applications, wireless security, networking, scheduling, IoT, UAV, robotics, blockchain and edge/fog computing. He has co-authored over 30 papers and 4 book chapters. He was awarded third place in the 2019 Lance Stafford Larson Outstanding Student Paper Award by the IEEE Computer Society. He was also awarded third place in the poster competition at the 2021 IEEE Rising Stars Global Conference. In 2022, he worked as a postdoctoral fellow at the School of Electrical Engineering and Computer Science at the University of Ottawa, Canada. He is a recipient of the best paper award at the 48th Wireless World Research Forum (WWRF) in 2022. Currently, he is an assistant professor in the Department of Computer Engineering at Bahcesehir University in Istanbul, Turkiye. He is also an Editor at (Springer) Telecommunications Systems and Wireless Networks journals.

On the IEEE volunteering side, after holding several IEEE volunteer roles, he has currently been a Member-at-Large (MGA Board) and the Region 8 (EMEA) Coordinator at the IEEE Computer Society since April 2021. He was awarded the 2022 IEEE MGA Young Professionals Achievement Award. He was also the chair of IEEE Turkey Young Professionals Affinity Group which was awarded the 2021 IEEE Region 8 Outstanding Young Professionals Affinity Group Award and the 2022 IEEE MGA Young Professionals Hall of Fame Honorable Mention.

images

Michel Kulhandjian (M’18-SM’20) received his B.S. degree in Electronics Engineering and Computer Science (Minor), with “Summa Cum Laude” from the American University in Cairo (AUC) in 2005, and the M.S. and Ph.D. degrees in Electrical Engineer from the State University of New York at Buffalo in 2007 and 2012, respectively. He was employed at Alcatel-Lucent, in Ottawa, Ontario, in 2012. In the same year he was appointed as a Research Associate at EION Inc. In 2016 has been appointed as a Research Scientist at the School of Electrical Engineering and Computer Science at the University of Ottawa. He was also employed as a senior embedded software engineer at L3Harris Technologies from 2016 to 2021. Currently, he is a Research Scientist at the Electrical and Computer Engineering Department at Rice University. He received the Natural Science and Engineering Research Council of Canada (NSERC) Industrial R&D Fellowship (IRDF).

His research interests include wireless multiple access communications, adaptive coded modulation, waveform design for overloaded code-division multiplexing applications, RF and audio fingerprinting, channel coding, space-time coding, adaptive multiuser detection, statistical signal processing, machine learning, covert communications, spread-spectrum steganography and steganalysis. He has served as a guest editor for the Journal of Sensor and Actuator Networks (JSAN). He actively serves as a member of Technical Program Committee (TPC) of IEEE WCNC, IEEE GLOBECOM, IEEE ICC, and IEEE VTC. He has served as a Guest Editor for Journal of Sensor and Actuator Networks. He is a recipient of the best paper award at the 48th Wireless World Research Forum (WWRF) in 2022.

images

Burak Kantarci (S’05, M’09, SM’12) received the Ph.D degree in computer engineering in 2009. He is a Full Professor and the Founding Director of Smart Connected Vehicles Innovation Centre (SCVIC), and the Founding Director of the Next Generation Communications and Computing Networks (NEXTCON) Research Lab, University of Ottawa. He has coauthored over 250 publications in established journals and conferences, and 15 book chapters. He is well known for his contributions to the quantification of data trustworthiness in mobile crowd-sensing (MCS) systems, and game theoretic incentives to promote user participation in MCS campaigns with high value data; as well as AI-backed access control, authentication and machine learning-backed intrusion detection solutions in sensing environments. In 2022, he has been awarded a Minister’s Award of Excellence in Innovation and Entrepreneurship from Ontario Ministry of Colleges and Universities. He served as the Chair of IEEE Communications Systems Integration and Modeling Technical Committee, and has served as the Technical Program Co-Chair/Symposium Co-chair of more than twenty international conferences/symposia/workshops, including IEEE Global Communications Conference (GLOBECOM)—Communications Systems QoS, Reliability and Modeling (CQRM) symposium. In 2021, he has been elected as the new Secretary of IEEE Social Networks Technical Committee. He is an Editor of the IEEE Communications Surveys & Tutorials, IEEE Internet of Things Journal, Vehicular Communications (Elsevier), and an Associate Editor for IEEE Networking Letters, and Journal of Cybersecurity and Privacy. He is Editor for several IEEE and Elsevier journals. He was an ACM Distinguished Speaker in 2019-2021, currently an ACM Senior Member. He is IEEE Systems Council and IEEE Communications Society Distinguished Lecturer.

images

Claude D’Amours (Member, IEEE) received the B.A.Sc., M.A.Sc., and Ph.D. degrees in electrical engineering from the University of Ottawa, in 1990, 1992, and 1995, respectively. In 1992, he was employed as a Systems Engineer at Calian Communications Ltd. In 1995, he joined the Communications Research Centre, Ottawa, ON, Canada, as a Systems Engineer. Later in 1995, he joined the Department of Electrical and Computer Engineering, Royal Military College of Canada, Kingston, ON, Canada, as an Assistant Professor. He joined the School of Information Technology and Engineering (SITE), which has since been renamed as the School of Electrical Engineering and Computer Science (EECS), University of Ottawa, as an Assistant Professor, in 1999. From 2007 to 2011, he has worked as the Vice Dean of undergraduate studies with the Faculty of Engineering and has been working as the Director of the School of EECS, University of Ottawa, since 2013. His research interests include physical layer technologies for wireless communications systems, notably in multiple access techniques and interference cancellation. He is a recipient of the best paper award at 48th Wireless World Research Forum (WWRF) in 2022.

images

Azzedine Touazi received BSc., MSc., and PhD. degrees from Ecole Nationale Polytechnique (ENP) d’Alger and USTHB university, Algeria, all in electrical engineering, in 2003, 2007, and 2017, respectively. His research interests include signal and image processing, machine learning, statistical data analysis, anomaly detection, and 4G/5G networks. He is currently ML and 4G/5G engineer at ThinkRF Corp. Prior to this he held engineering positions at Alcatel-Lucent and Aerosystems International (ASI). Also, he was a researcher at the Center for Development of Advanced Technologies (CDTA). He is a recipient of the best paper award at 48th Wireless World Research Forum (WWRF) in 2022.

images

Cliff Ellement, Head AI Solutions at ThinkRF, has 25 years of Product and Business development experience. He holds a Masters of Electrical Engineering at Concordia University researching Spread-Spectrum and Mobile communications relating anti-jamming and network optimization techniques. Developed a number of products in the Optical, Microwave, and Data networking businesses at Nortel. Later joining Mitel Networks leading the Unified Communications group developing secure Intelligent Enterprise collaboration applications. Cliff has been involved at the intersection of RF Communications, Security and Artificial Intelligence initiatives to help drive the next generation of wireless security solutions for Critical Infrastructures. He is a recipient of the best paper award at 48th Wireless World Research Forum (WWRF) in 2022.