Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting

被引:28
作者
Agadakos, Ioannis [1 ]
Agadakos, Nikolaos [1 ,2 ]
Polakis, Jason [2 ]
Amer, Mohamed R. [3 ]
机构
[1] SRI Int, 333 Ravenswood Ave, Menlo Pk, CA 94025 USA
[2] Univ Illinois, Chicago, IL 60680 USA
[3] Robust AI, Palo Alto, CA USA
来源
2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020) | 2020年
关键词
PHYSICAL DEVICE;
D O I
10.1109/EuroSP48549.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Prior work has demonstrated techniques for fingerprinting devices based on their network traffic or transmitted signals, which use software artifacts or characteristics of the underlying protocol. However these approaches are not robust or applicable in many real-world scenarios. In this paper we explore the feasibility of device fingerprinting under challenging realistic settings, by identifying artifacts in the transmitted signals caused by devices' unique hardware "imperfections". We develop RF-DCN, a novel Deep Complex-valued Neural Network (DCN) that operates on raw RF signals and is completely agnostic of the underlying applications and protocols. We introduce two DCN variations: a retrofitted Convolutional DCN (CDCN) originally created for acoustic signals, and a novel Recurrent DCN (RDCN) for modeling time series. Our work demonstrates the feasibility of operating on raw I/Q data collected within a narrowband spectrum from open air captures across vastly different modulation schemes. In contrast to prior work, we do not utilize knowledge of the modulation scheme or protocol intricacies such as carrier frequencies. We conduct an extensive experimental evaluation on large and diverse datasets as part of a DARPA red team evaluation, and investigate the effects of different environmental factors as well as neural network architectures and hyperparameters on our system's performance. Our novel RDCN consistently outperforms all baseline neural network architectures, is robust to noise, and can identify a target device even when numerous devices are concurrently transmitting within the band of interest under the same or different protocols. While our experiments demonstrate the applicability of our techniques under challenging conditions where other neural network architectures break down, we identify additional challenges in signal-based fingerprinting and provide guidelines for future explorations.
引用
收藏
页码:322 / 338
页数:17
相关论文
共 82 条
  • [1] Acar G., 2013, P 2013 ACM SIGSAC C, P1129, DOI DOI 10.1145/2508859.2516674
  • [2] SHORT-TERM SPECTRAL ANALYSIS, SYNTHESIS, AND MODIFICATION BY DISCRETE FOURIER-TRANSFORM
    ALLEN, JB
    [J]. IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1977, 25 (03): : 235 - 238
  • [3] [Anonymous], 2018, NATL INSTRUMENTS I Q
  • [4] [Anonymous], 2015, P 31 ANN COMP SEC AP
  • [5] [Anonymous], 2019, AIRPLANE TRACKING US
  • [6] [Anonymous], 2019, CONCEPTS ORTHOGONAL
  • [7] [Anonymous], 2015, COMMPY DIGITAL COMMU
  • [8] [Anonymous], 2018, PLOTNEURALNET LATEX
  • [9] [Anonymous], 2010, Pattern Recognition and Machine Learning
  • [10] [Anonymous], 2007, FUNDAMENTALS COMMUNI