Deep learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in the network operating environment still poses a major limitation. This paper presents an experimental framework that aims to study and overcome the sensitivity of LoRa-enabled device fingerprinting to such changes. We first begin by describing RF datasets we collected using our LoRa-enabled wireless device testbed. We then propose a new fingerprinting technique that exploits out-of-band distortion information caused by hardware impairments to increase the fingerprinting accuracy. Finally, we experimentally study and analyze the sensitivity of LoRa RF fingerprinting to various network setting changes. Our results show that fingerprinting does relatively well when the learning models are trained and tested under the same settings. However, when trained and tested under different settings, these models exhibit moderate sensitivity to channel condition changes and severe sensitivity to protocol configuration and receiver hardware changes when IQ data is used as input. However, with FFT data is used as input, they perform poorly under any change.
more »
« less
Hardware and Deep Learning-Based Authentication Through Enhanced RF Fingerprints of 3D-Printed Chaotic Antenna Arrays
Radio frequency (RF) fingerprinting is a hardware-based authentication technique utilizing the distinct distortions in the received signal due to the unique hardware differences in the transmitting device. Existing RF fingerprinting methods only utilize the naturally occurring hardware imperfections during fabrication; hence their authentication accuracy is limited in practical settings even when state-ofthe-art deep learning classifiers are used. In this work, we propose a Chaotic Antenna Array (CAA) system for significantly enhanced RF fingerprints and a deep learning-based device authentication method for CAA. We provide a mathematical model for CAA, explain how it can be cost-effectively manufactured by utilizing mask-free laser-enhanced direct print additive manufacturing (LE-DPAM), and comprehensively analyze the authentication performance of several deep learning classifiers for CAA. Our results show that the enhanced RF signatures of CAA enable highly accurate authentication of hundreds of devices under practical settings.
more »
« less
- Award ID(s):
- 2233774
- PAR ID:
- 10658970
- Publisher / Repository:
- IEEE
- Date Published:
- Journal Name:
- IEEE Access
- Volume:
- 13
- ISSN:
- 2169-3536
- Page Range / eLocation ID:
- 6893 to 6908
- Subject(s) / Keyword(s):
- 3D printing, additive manufacturing, deep learning, device authentication, RF fingerprinting, physical layer, wireless communications, security
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Radio Frequency (RF) device fingerprinting has been recognized as a potential technology for enabling automated wireless device identification and classification. However, it faces a key challenge due to the domain shift that could arise from variations in the channel conditions and environmental settings, potentially degrading the accuracy of RF-based device classification when testing and training data is collected in different domains. This paper introduces a novel solution that leverages contrastive learning to mitigate this domain shift problem. Contrastive learning, a state-of-the-art self-supervised learning approach from deep learning, learns a distance metric such that positive pairs are closer (i.e. more similar) in the learned metric space than negative pairs. When applied to RF fingerprinting, our model treats RF signals from the same transmission as positive pairs and those from different transmissions as negative pairs. Through experiments on wireless and wired RF datasets collected over several days, we demonstrate that our contrastive learning approach captures domain-invariant features, diminishing the effects of domain-specific variations. Our results show large and consistent improvements in accuracy (10.8% to 27.8%) over baseline models, thus underscoring the effectiveness of contrastive learning in improving device classification under domain shift.more » « less
-
5G and open radio access networks (Open RANs) will result in vendor-neutral hardware deployment that will require additional diligence towards managing security risks. This new paradigm will allow the same network infrastructure to support virtual network slices for transmit different waveforms, such as 5G New Radio, LTE, WiFi, at different times. In this multi- vendor, multi-protocol/waveform setting, we propose an additional physical layer authentication method that detects a specific emitter through a technique called as RF fingerprinting. Our deep learning approach uses convolutional neural networks augmented with triplet loss, where examples of similar/dissimilar signal samples are shown to the classifier over the training duration. We demonstrate the feasibility of RF fingerprinting base stations over the large-scale over-the-air experimental POWDER platform in Salt Lake City, Utah, USA. Using real world datasets, we show how our approach overcomes the challenges posed by changing channel conditions and protocol choices with 99.86% detection accuracy for different training and testing days.more » « less
-
Chaotic antenna arrays (CAAs) are phased antenna arrays with randomized antenna elements exhibiting unique and spatially dependent phase errors. CAAs are promising for generating strong RF fingerprints that can be used for device authentication. For the RF fingerprint to remain secure, it is crucial that the phase errors remain unknown to the user of the CAA. This on the other hand inhibits conventional beam steering that relies on a known antenna array structure. Additionally, the user with the CAA cannot employ known physical layer security methods that are based on phased antenna arrays. To alleviate this issue, we propose a novel security method in networks with distributed receivers. The approach combines i) distortion caused by changes in the array pattern with ii) encoding based on the phase difference at distributed locations, which makes the method resistant against eavesdropping. Mitigating the distortion and decoding the signal becomes only possible if the eavesdropper can obtain all signals received at all legitimate receivers.more » « less
-
Abstract Rapid advances in the Internet‐of‐Things (IoT) domain have led to the development of several useful and interesting devices that have enhanced the quality of home living and industrial automation. The vulnerabilities in the IoT devices have rendered them susceptible to compromise and forgery. The problem of device authentication, that is, the question of whether a device's identity is what it claims to be, is still an open problem. Device fingerprinting seems to be a promising authentication mechanism. Device fingerprinting profiles a device based on information available about the device and generate a robust, verifiable and unique identity for the device. Existing approaches for device fingerprinting may not be feasible or cost‐effective for the IoT domain due to the resource constraints and heterogeneity of the IoT devices. Due to resource and cost constraints, behavioral fingerprinting provides promising directions for fingerprinting IoT devices. Behavioral fingerprinting allows security researchers to understand the behavioral profile of a device and to establish some guidelines regarding the device operations. In this article, we discuss existing approaches for behavioral fingerprinting of devices in general and evaluate their applicability for IoT devices. Furthermore, we discuss potential approaches for fingerprinting IoT devices and give an overview of some of the preliminary attempts to fingerprint IoT devices. We conclude by highlighting the future research directions for fingerprinting in the IoT domain. This article is categorized under:Application Areas > Science and TechnologyApplication Areas > InternetTechnologies > Machine LearningApplication Areas > Industry Specific Applicationsmore » « less
An official website of the United States government

