首页> 外文期刊>IEEE Transactions on Cognitive Communications and Networking >No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments
【24h】

No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments

机译:没有留下无线电:通过深入学习物理层硬件损伤的无线电指纹识别

获取原文
获取原文并翻译 | 示例

摘要

Due to the unprecedented scale of the Internet of Things, designing scalable, accurate, energy-efficient and tamper-proof authentication mechanisms has now become more important than ever. To this end, in this paper we present ORACLE, a novel system based on convolutional neural networks (CNNs) to "fingerprint" (i.e., identify) a unique radio from a large pool of devices by deep-learning the fine-grained hardware impairments imposed by radio circuitry on physical-layer I/Q samples. First, we show how hardware-specific imperfections are learned by the CNN framework. Then, we extensively evaluate the performance of ORACLE on several first-of-its-kind large-scale datasets of WiFi-transmissions collected "in the wild", as well as a dataset of nominally-identical (i.e., equal baseband signals) WiFi devices, reaching 80-90% accuracy is many cases with the error gap arising due to channel-induced effects. Finally, we show through an experimental testbed, how this accuracy can reach over 99% by intentionally inserting and learning the effect of controlled impairments at the transmitter side, to completely remove the impact of the wireless channel. Furthermore, to scale this approach for classifying potential thousands of radios, we propose an impairment hopping spread spectrum (IHOP) technique that is resilient to spoofing attacks.
机译:由于事物互联网的前所未有的规模,设计可扩展,准确,节能和防篡改认证机制现在变得比以往更重要。为此,在本文中,我们展示了Oracle,这是一种基于卷积神经网络(CNNS)的新系统,以通过深入学习细粒度的硬件损伤来“指纹”(即,指纹“(即,识别)独特的无线电通过无线电电路对物理层I / Q样本施加。首先,我们展示了CNN框架如何学习硬件特定的缺陷。然后,我们广泛地评估Oracle在“在野外”收集的几个WiFi传输大规模数据集上的oracle的性能,以及名义上相同(即等于基带信号)的数据集设备,达到80-90%的精度是许多情况,由于通道诱导的效果导致的误差间隙。最后,我们通过实验测试平台显示,通过故意插入和学习在发射器侧的受控损伤的效果中,这种准确性如何达到99%以上,以完全消除无线信道的影响。此外,为了规模这种方法来分类势力数千次无线电,我们提出了一种损坏的跳频扩频(IHOP)技术,这些技术对于欺骗攻击是有弹性的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号