Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary
Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfect...
Gespeichert in:
Veröffentlicht in: | Journal of Cyber Security and Mobility 2024-09, p.887-916 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 916 |
---|---|
container_issue | |
container_start_page | 887 |
container_title | Journal of Cyber Security and Mobility |
container_volume | |
creator | Reising, Donald R. Tyler, Joshua H. Fadul, Mohamed K. M. Hilling, Matthew R. Loveless, T. Daniel |
description | Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own. |
doi_str_mv | 10.13052/jcsm2245-1439.1354 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_13052_jcsm2245_1439_1354</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_13052_jcsm2245_1439_1354</sourcerecordid><originalsourceid>FETCH-LOGICAL-c894-5ca7ac98d590d79c2294c84067f62257f45049a0240a50a2509f0c6c9d8f7ab93</originalsourceid><addsrcrecordid>eNo1kF1LwzAUhoMoOOZ-gTf5A9WTrya5HGPTwkTR4W1J00SjNh1JGezf2855dQ7PC-_hPAjdErgjDAS9_7K5o5SLgnCmRyb4BZqdABdSXZ73KbxGi5xDAwyIUETyGTJVt0_9wbX4dYM3IX64tE8hDkVj8gir1sUhDEf87lLwwZoh9BGHiIdPh1-Syy5ah3uPTcRv6wo_hS7Y77EGL9uDS9mk4w268uYnu8V5ztFus96tHovt80O1Wm4LqzQvhDXSWK1aoaGV2lKquVUcSulLSoX0XADXBigHI8BQAdqDLa1ulZem0WyO2F-tTX3Oyfl6_KMb79cE6pOn-t9TPamoJ0_sFxeBXAU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</creator><creatorcontrib>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</creatorcontrib><description>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</description><identifier>ISSN: 2245-1439</identifier><identifier>EISSN: 2245-4578</identifier><identifier>DOI: 10.13052/jcsm2245-1439.1354</identifier><language>eng</language><ispartof>Journal of Cyber Security and Mobility, 2024-09, p.887-916</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Reising, Donald R.</creatorcontrib><creatorcontrib>Tyler, Joshua H.</creatorcontrib><creatorcontrib>Fadul, Mohamed K. M.</creatorcontrib><creatorcontrib>Hilling, Matthew R.</creatorcontrib><creatorcontrib>Loveless, T. Daniel</creatorcontrib><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><title>Journal of Cyber Security and Mobility</title><description>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</description><issn>2245-1439</issn><issn>2245-4578</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo1kF1LwzAUhoMoOOZ-gTf5A9WTrya5HGPTwkTR4W1J00SjNh1JGezf2855dQ7PC-_hPAjdErgjDAS9_7K5o5SLgnCmRyb4BZqdABdSXZ73KbxGi5xDAwyIUETyGTJVt0_9wbX4dYM3IX64tE8hDkVj8gir1sUhDEf87lLwwZoh9BGHiIdPh1-Syy5ah3uPTcRv6wo_hS7Y77EGL9uDS9mk4w268uYnu8V5ztFus96tHovt80O1Wm4LqzQvhDXSWK1aoaGV2lKquVUcSulLSoX0XADXBigHI8BQAdqDLa1ulZem0WyO2F-tTX3Oyfl6_KMb79cE6pOn-t9TPamoJ0_sFxeBXAU</recordid><startdate>20240903</startdate><enddate>20240903</enddate><creator>Reising, Donald R.</creator><creator>Tyler, Joshua H.</creator><creator>Fadul, Mohamed K. M.</creator><creator>Hilling, Matthew R.</creator><creator>Loveless, T. Daniel</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240903</creationdate><title>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</title><author>Reising, Donald R. ; Tyler, Joshua H. ; Fadul, Mohamed K. M. ; Hilling, Matthew R. ; Loveless, T. Daniel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c894-5ca7ac98d590d79c2294c84067f62257f45049a0240a50a2509f0c6c9d8f7ab93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Reising, Donald R.</creatorcontrib><creatorcontrib>Tyler, Joshua H.</creatorcontrib><creatorcontrib>Fadul, Mohamed K. M.</creatorcontrib><creatorcontrib>Hilling, Matthew R.</creatorcontrib><creatorcontrib>Loveless, T. Daniel</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of Cyber Security and Mobility</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reising, Donald R.</au><au>Tyler, Joshua H.</au><au>Fadul, Mohamed K. M.</au><au>Hilling, Matthew R.</au><au>Loveless, T. Daniel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary</atitle><jtitle>Journal of Cyber Security and Mobility</jtitle><date>2024-09-03</date><risdate>2024</risdate><spage>887</spage><epage>916</epage><pages>887-916</pages><issn>2245-1439</issn><eissn>2245-4578</eissn><abstract>Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.</abstract><doi>10.13052/jcsm2245-1439.1354</doi><tpages>30</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2245-1439 |
ispartof | Journal of Cyber Security and Mobility, 2024-09, p.887-916 |
issn | 2245-1439 2245-4578 |
language | eng |
recordid | cdi_crossref_primary_10_13052_jcsm2245_1439_1354 |
source | EZB-FREE-00999 freely available EZB journals |
title | Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A07%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20RF%20Fingerprint-based%20Identity%20Verification%20in%20the%20Presence%20of%20an%20SEI%20Mimicking%20Adversary&rft.jtitle=Journal%20of%20Cyber%20Security%20and%20Mobility&rft.au=Reising,%20Donald%20R.&rft.date=2024-09-03&rft.spage=887&rft.epage=916&rft.pages=887-916&rft.issn=2245-1439&rft.eissn=2245-4578&rft_id=info:doi/10.13052/jcsm2245-1439.1354&rft_dat=%3Ccrossref%3E10_13052_jcsm2245_1439_1354%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |