On the Impact of CDL and TDL Augmentation for RF Fingerprinting Under Impaired Channels
Wireless World: Research and Trends Magazine
PDF
HTML

Keywords

Data augmentation
deep learning
RF fingerprinting
secure design
uncrewed aerial vehicles

Abstract

Cyber-physical systems have recently been used in several areas (such as connected and autonomous vehicles) due to their high maneuverability. On the other hand, they are susceptible to cyber-attacks. Radio frequency (RF) fingerprinting emerges as a promising approach. This work aims to analyze the impact of decoupling tapped delay line and clustered delay line (TDL+CDL) augmentation-driven deep learning (DL) on transmitter-specific fingerprints to discriminate malicious users from legitimate ones. This work also considers 5G-only-CDL, WiFi-only-TDL augmentation approaches. RF fingerprinting models are sensitive to changing channels and environmental conditions. For this reason, they should be considered during the deployment of a DL model. Data acquisition can be another option. Nonetheless, gathering samples under various conditions for a train set formation may be quite hard. Consequently, data acquisition may not be feasible. This work uses a dataset that includes 5G, 4G, and WiFi samples, and it empowers a CDL+TDL based augmentation technique in order to boost the learning performance of the DL model. Numerical results show that CDL+TDL, 5G-only-CDL, and WiFi-only-TDL augmentation approaches achieve 87.59%, 81.63%, 79.21% accuracy on unobserved data while TDL/CDL augmentation technique and no augmentation approach result in 77.81% and 74.84% accuracy on unobserved data, respectively.

https://doi.org/10.13052/2794-7254.006
PDF
HTML

References

J.P. Yaacoub, H. Noura, O. Salman, and A. Chehab, “Security analysis of drones systems: attacks, limitations, and recommendations”, Internet of Things. 2020 Sep; 11: 100218.

T. Alladi, Naren, G. Bansal, V. Chamola, M. Guizan, “SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication”, IEEE Transactions on Vehicular Technology, vol. 69, no. 12, December 2020.

J. Bassey, X. Li, L. Qian, “Device authentication codes based on RF fingerprinting using deep learning”, arvix: 2004.08742v1, 19 April 2020.

Y. Shi, K. Davaslioglu, Y. E. Sagduyu, “Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing,” IEEE Transactions on Cognitive Communications and Networking, Mar. 2021.

Y. E. Sagduyu, Y. Shi, and T. Erpek, “Adversarial deep learning for over-the-air spectrum poisoning attacks,” IEEE Transactions on Mobile Computing, Feb. 2021.

Y.S. Shiu, S. Y. Chang, H. C. Wu, S-CH Huang and H. H. Chen, “Physical layer security in wireless networks: a tutorial”, IEEE Wireless Communications, April 2011.

S. Karunaratne, E. Krijestorac and D. Cabric, “Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack”, ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, 2021, pp. 1–6, doi: 10.1109/ICC42927.2021.9500893.

Jagannath, A., Jagannath, J., and Kumar, P.S.P.V.: A Comprehensive Survey on Radio Frequency (RF) Fingerprinting Traditional Approaches, Deep Learning, and Open Challenges. Computer Networks, vol. 219, 2022, 109455, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.109455.

C. Comert, O. M. Gul, M. Kulhandjian, A. Touazi, C. Ellement, B. Kantarci, C. D’Amours, “Secure Design of Cyber-Physical Systems at the Radio Frequency Level: Machine and Deep Learning-Driven Approaches, Challenges and Opportunities”, the book chapter (accepted on 20 April 2022) for a book publication by Springer, pp. 1–32.

J. Liu, M. Nogueira, J. Fernandes and B. Kantarci, “Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems”, in IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 123–159, Firstquarter 2022.

M. Cekic, S. Gopalakrishnan, U. Madhow, “Wireless fingerprinting via deep learning the impact of confounding factors”, 55th Asilomar Conference on Signals, Systems, and Computers, 2021, pp. 677–684

T. J. O’Shea, T. Roy, T. C. Clansy, “Over the air deep learning based radio signal classification”, IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 168–179, Feb. 2018.

K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis and K. Chowdhury, “ORACLE: Optimized Radio clAssification through convolutional neuraL networks,” IEEE Conference on Computer Communications (Infocom), 2019, pp. 370–378.

E. Ozturk, F. Erden, and I. Guvenc “RF-based low-SNR classification of UAVs using convolutional neural networks”, arXiv online, arXiv:2009.05519v2

S. Mohanti, N. Soltani, K. Sankhe, D. Jaisinghani, M. Di Felice and K. Chowdhury, “AirID: Injecting a custom RF fingerprint for enhanced UAV identification using deep learning”, GLOBECOM 2020 – 2020 IEEE Global Communications Conference, 2020, pp. 1–6.

N. Soltani, K. Sankhe, J. Dy, S. Ioannidis, and K. Chowdhury, “More is better: Data augmentation for channel-resilient RF fingerprinting”, IEEE Communications Magazine, September 2020.

G. Reus-Muns, D. Jaisinghani, K. Sankhe, K. R. Chowdhury, “Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR Platform”, GLOBECOM 2020 IEEE Global Communications Conference.

C. Zhao, C. Chen, Z. Cai, M. Shi, X. Du, and M. Guizani, “Classification of small uavs based on auxiliary classifier wasserstein gans”, in IEEE Global Communications Conference (GLOBECOM) 2018, pp. 206–-212.

C. Cömert, M. Kulhandjian, O. M. Gul, A. Touazi, C. Ellement, B. Kantarci, C. D’Amours, “Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels”, ACM WiseML 2022, pp. 3–8.

End to end Simulations, Mathworks, available at: https://www.mathworks.com/help/5g/end-to-end-simulation.html.

Study on channel model for frequencies from 0.5 to 100 GHz, ETSI Technical Report, version 16.1.0 Release 16, available at: https://www.etsi.org/deliver/etsi_tr/138900_138999/138901/16.01.00_60/tr_138901v160100p.pdf.

N. Moseley, C.H. Slump, “A low-complexity feed-forward I/Q imbalance compensation algorithm”, Computational Statistics & Data Analysis, January 2006.

O. M. Gul, M. Kulhandijan, B. Kantarci, A. Touazi, C. Ellement, C. D’Amours, “On the Impact of CDL and TDL Augmentation for RF Fingerprinting under Impaired Channels”, 48th

Wireless World Research Forum (WWRF 2022), 07–09 November 2022, UAE, pp. 1–6.

Y. LeCun and C. Cortes, “MNIST handwritten digit database”, 2010. [Online]. Available: http://yann.lecun.com/exdb/mnist/.

R. Socher, A. Perelygin, J. Wu, J. Chuang, C. D. Manning, A. Ng, and C. Potts, “Recursive deep models for semantic compositionality over a sentiment treebank”, in Proc. of Empirical Methods in Natural Language Processing, 2013.

A. L. Maas, R. E. Daly, P. T. Pham, D. Huang, A. Y. Ng, and C. Potts, “Learning word vectors for sentiment analysis”, in Proc. of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. Portland, Oregon, USA: Association for Computational Linguistics, June 2011, pp. 142–150. [Online]. Available: http://www.aclweb.org/anthology/P11-1015.

A. Go, R. Bhayani, and L. Huang, “Twitter sentiment classification using distant supervision”, pp. 1-6, 2009. [Online]. Available: http://www.stanford.edu/~alecmgo/papers/TwitterDistantSupervision09.pdf.

W. Wang, Z. Sun, S. Piao, B. Zhu, and K. Ren, “Wireless physical layer identification: Modeling and validation,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2091–2106, 2016.

B. Danev, T. S. Heydt-Benjamin, and S. Capkun, “Physical-layer identification of rfid devices”, in USENIX security symposium, 2009, pp. 199–214.

B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, “Attacks on physical-layer identification”, in Proc. of the Third ACM Conference on Wireless Network Security, ser. WiSec ’10. New York, NY, USA: Association for Computing Machinery, 2010, pp. 89–98. [Online]. Available: https://doi.org/10.1145/1741866.1741882.

S. U. Rehman, K. W. Sowerby, and C. Coghill, “Analysis of impersonation attacks on systems using rf fingerprinting and low-end receivers”, Journal of Computer and System Sciences, vol. 80, no. 3, pp. 591–601, 2014, special Issue on Wireless Network Intrusion. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0022000013001220.

L. F. Abanto-Leon, A. Bauml, G. H. A. Sim, M. Hollick, and A. Asadi, “Stay connected, leave no trace: Enhancing security and privacy in wifi via obfuscating radiometric fingerprints”, Proc. ACM Meas. Anal. Comput. Syst., vol. 4, no. 3, Nov 2020. [Online]. Available: https://doi.org/10.1145/3428329.

Downloads

Download data is not yet available.