Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting

被引:28
作者
Agadakos, Ioannis [1 ]
Agadakos, Nikolaos [1 ,2 ]
Polakis, Jason [2 ]
Amer, Mohamed R. [3 ]
机构
[1] SRI Int, 333 Ravenswood Ave, Menlo Pk, CA 94025 USA
[2] Univ Illinois, Chicago, IL 60680 USA
[3] Robust AI, Palo Alto, CA USA
来源
2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020) | 2020年
关键词
PHYSICAL DEVICE;
D O I
10.1109/EuroSP48549.2020.00028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Prior work has demonstrated techniques for fingerprinting devices based on their network traffic or transmitted signals, which use software artifacts or characteristics of the underlying protocol. However these approaches are not robust or applicable in many real-world scenarios. In this paper we explore the feasibility of device fingerprinting under challenging realistic settings, by identifying artifacts in the transmitted signals caused by devices' unique hardware "imperfections". We develop RF-DCN, a novel Deep Complex-valued Neural Network (DCN) that operates on raw RF signals and is completely agnostic of the underlying applications and protocols. We introduce two DCN variations: a retrofitted Convolutional DCN (CDCN) originally created for acoustic signals, and a novel Recurrent DCN (RDCN) for modeling time series. Our work demonstrates the feasibility of operating on raw I/Q data collected within a narrowband spectrum from open air captures across vastly different modulation schemes. In contrast to prior work, we do not utilize knowledge of the modulation scheme or protocol intricacies such as carrier frequencies. We conduct an extensive experimental evaluation on large and diverse datasets as part of a DARPA red team evaluation, and investigate the effects of different environmental factors as well as neural network architectures and hyperparameters on our system's performance. Our novel RDCN consistently outperforms all baseline neural network architectures, is robust to noise, and can identify a target device even when numerous devices are concurrently transmitting within the band of interest under the same or different protocols. While our experiments demonstrate the applicability of our techniques under challenging conditions where other neural network architectures break down, we identify additional challenges in signal-based fingerprinting and provide guidelines for future explorations.
引用
收藏
页码:322 / 338
页数:17
相关论文
共 82 条
  • [41] King DB, 2015, ACS SYM SER, V1214, P1
  • [42] Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security
    Klein, Randall W.
    Temple, Michael A.
    Mendenhall, Michael J.
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (06) : 544 - 555
  • [43] Remote physical device fingerprinting
    Kohno, T
    Broido, A
    Claffy, KC
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) : 93 - 108
  • [44] Kroon B, 2010, LECT NOTES ARTIF INT, V6206, P198
  • [45] Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints
    Laperdrix, Pierre
    Rudametkin, Walter
    Baudry, Benoit
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 878 - 894
  • [46] Gradient-based learning applied to document recognition
    Lecun, Y
    Bottou, L
    Bengio, Y
    Haffner, P
    [J]. PROCEEDINGS OF THE IEEE, 1998, 86 (11) : 2278 - 2324
  • [47] Long J, 2015, PROC CVPR IEEE, P3431, DOI 10.1109/CVPR.2015.7298965
  • [48] Data augmentation for face recognition
    Lv, Jiang-Jing
    Shao, Xiao-Hu
    Huang, Jia-Shui
    Zhou, Xiang-Dong
    Zhou, Xi
    [J]. NEUROCOMPUTING, 2017, 230 : 184 - 196
  • [49] IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
    Miettinen, Markus
    Sadeghi, Ahmad-Reza
    Marchal, Samuel
    Asokan, N.
    Hafeez, Ibbad
    Tarkoma, Sasu
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 2177 - 2184
  • [50] Mowery K., 2012, P W2SP 2012