Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary

Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfect...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of Cyber Security and Mobility 2024-09, p.887-916
Hauptverfasser: Reising, Donald R., Tyler, Joshua H., Fadul, Mohamed K. M., Hilling, Matthew R., Loveless, T. Daniel
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 916
container_issue
container_start_page 887
container_title Journal of Cyber Security and Mobility
container_volume
creator Reising, Donald R.
Tyler, Joshua H.
Fadul, Mohamed K. M.
Hilling, Matthew R.
Loveless, T. Daniel
description Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.
doi_str_mv 10.13052/jcsm2245-1439.1354
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_13052_jcsm2245_1439_1354</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_13052_jcsm2245_1439_1354</sourcerecordid><originalsourceid>FETCH-LOGICAL-c894-5ca7ac98d590d79c2294c84067f62257f45049a0240a50a2509f0c6c9d8f7ab93</originalsourceid><addsrcrecordid>eNo1kF1LwzAUhoMoOOZ-gTf5A9WTrya5HGPTwkTR4W1J00SjNh1JGezf2855dQ7PC-_hPAjdErgjDAS9_7K5o5SLgnCmRyb4BZqdABdSXZ73KbxGi5xDAwyIUETyGTJVt0_9wbX4dYM3IX64tE8hDkVj8gir1sUhDEf87lLwwZoh9BGHiIdPh1-Syy5ah3uPTcRv6wo_hS7Y77EGL9uDS9mk4w268uYnu8V5ztFus96tHovt80O1Wm4LqzQvhDXSWK1aoaGV2lKquVUcSulLSoX0XADXBigHI8BQAdqDLa1ulZem0WyO2F-tTX3Oyfl6_KMb79cE6pOn-t9TPamoJ0_sFxeBXAU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</creator><creatorcontrib>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</creatorcontrib><description>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</description><identifier>ISSN: 2245-1439</identifier><identifier>EISSN: 2245-4578</identifier><identifier>DOI: 10.13052/jcsm2245-1439.1354</identifier><language>eng</language><ispartof>Journal of Cyber Security and Mobility, 2024-09, p.887-916</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Reising, Donald R.</creatorcontrib><creatorcontrib>Tyler, Joshua H.</creatorcontrib><creatorcontrib>Fadul, Mohamed K. M.</creatorcontrib><creatorcontrib>Hilling, Matthew R.</creatorcontrib><creatorcontrib>Loveless, T. Daniel</creatorcontrib><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><title>Journal of Cyber Security and Mobility</title><description>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</description><issn>2245-1439</issn><issn>2245-4578</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo1kF1LwzAUhoMoOOZ-gTf5A9WTrya5HGPTwkTR4W1J00SjNh1JGezf2855dQ7PC-_hPAjdErgjDAS9_7K5o5SLgnCmRyb4BZqdABdSXZ73KbxGi5xDAwyIUETyGTJVt0_9wbX4dYM3IX64tE8hDkVj8gir1sUhDEf87lLwwZoh9BGHiIdPh1-Syy5ah3uPTcRv6wo_hS7Y77EGL9uDS9mk4w268uYnu8V5ztFus96tHovt80O1Wm4LqzQvhDXSWK1aoaGV2lKquVUcSulLSoX0XADXBigHI8BQAdqDLa1ulZem0WyO2F-tTX3Oyfl6_KMb79cE6pOn-t9TPamoJ0_sFxeBXAU</recordid><startdate>20240903</startdate><enddate>20240903</enddate><creator>Reising, Donald R.</creator><creator>Tyler, Joshua H.</creator><creator>Fadul, Mohamed K. M.</creator><creator>Hilling, Matthew R.</creator><creator>Loveless, T. Daniel</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240903</creationdate><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><author>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c894-5ca7ac98d590d79c2294c84067f62257f45049a0240a50a2509f0c6c9d8f7ab93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Reising, Donald R.</creatorcontrib><creatorcontrib>Tyler, Joshua H.</creatorcontrib><creatorcontrib>Fadul, Mohamed K. M.</creatorcontrib><creatorcontrib>Hilling, Matthew R.</creatorcontrib><creatorcontrib>Loveless, T. Daniel</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of Cyber Security and Mobility</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reising, Donald R.</au><au>Tyler, Joshua H.</au><au>Fadul, Mohamed K. M.</au><au>Hilling, Matthew R.</au><au>Loveless, T. Daniel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</atitle><jtitle>Journal of Cyber Security and Mobility</jtitle><date>2024-09-03</date><risdate>2024</risdate><spage>887</spage><epage>916</epage><pages>887-916</pages><issn>2245-1439</issn><eissn>2245-4578</eissn><abstract>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</abstract><doi>10.13052/jcsm2245-1439.1354</doi><tpages>30</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2245-1439
ispartof Journal of Cyber Security and Mobility, 2024-09, p.887-916
issn 2245-1439
2245-4578
language eng
recordid cdi_crossref_primary_10_13052_jcsm2245_1439_1354
source EZB-FREE-00999 freely available EZB journals
title Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A07%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20RF%20Fingerprint-based%20Identity%20Verification%20in%20the%20Presence%20of%20an%20SEI%20Mimicking%20Adversary&rft.jtitle=Journal%20of%20Cyber%20Security%20and%20Mobility&rft.au=Reising,%20Donald%20R.&rft.date=2024-09-03&rft.spage=887&rft.epage=916&rft.pages=887-916&rft.issn=2245-1439&rft.eissn=2245-4578&rft_id=info:doi/10.13052/jcsm2245-1439.1354&rft_dat=%3Ccrossref%3E10_13052_jcsm2245_1439_1354%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true