Application of Dual-Tree Complex Wavelet Transforms to Burst Detection and RF Fingerprint Classification

Abstract : This work addresses various Open Systems Interconnection (OSI) Physical (PHY) layer mechanisms to extract and exploit RF waveform features ("fingerprints") that are inherently unique to specific devices and that may be used to provide hardware specific identification (manufacturer, model, and/or serial number). This is addressed by applying a Dual-Tree Complex Wavelet Transform (DT-CWT) to improve burst detection and RF fingerprint classification. A "Denoised VT" technique is introduced to improve performance at lower SNRs, with denoising implemented using a DT-CWT decomposition prior to Traditional VT processing. A newly developed Wavelet Domain (WD) fingerprinting technique is presented using statistical WD fingerprints with Multiple Discriminant Analysis/Maximum Likelihood (MDA/ML) classification. The statistical fingerprint features are extracted from coefficients of a DT-CWT decomposition. Relative to previous Time Domain (TD) results, the enhanced WD statistical features provide improved device classification performance. Additional performance sensitivity results are presented to demonstrate WD fingerprinting robustness for variation in burst location error, MDA/ML training and classification SNRs, and MDA/ML training and classification signal types. For all cases considered, the WD technique proved to be more robust and exhibited less sensitivity when compared with the TD Technique.

[1]  K. Riedel Numerical Bayesian Methods Applied to Signal Processing , 1996 .

[2]  O. Rioul,et al.  Wavelets and signal processing , 1991, IEEE Signal Processing Magazine.

[3]  Michael A. Temple,et al.  Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.

[4]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[5]  Hagit Messer,et al.  Detection of a known transient signal of unknown scaling and arrival time , 1994, IEEE Trans. Signal Process..

[6]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[7]  Hagit Messer,et al.  The use of the wavelet transform in the detection of an unknown transient signal , 1992, IEEE Trans. Inf. Theory.

[8]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[9]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[10]  W. Hargrove,et al.  Photogrammetric Engineering & Remote Sensing , 2022 .

[11]  Robert F. Mills,et al.  Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.

[12]  Orhan Arikan,et al.  Short-time Fourier transform: two fundamental properties and an optimal implementation , 2003, IEEE Trans. Signal Process..

[13]  Dirk Grunwald,et al.  Wireless innovation through software radios , 2008, CCRV.

[14]  Wade Trappe,et al.  Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships , 2007, IEEE Transactions on Information Forensics and Security.

[15]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[16]  Ivan W. Selesnick,et al.  On the Dual-Tree Complex Wavelet Packet and $M$-Band Transforms , 2008, IEEE Transactions on Signal Processing.

[17]  Michael A. Temple,et al.  Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.

[18]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[19]  René Carmona Wavelet identification of transients in noisy time series , 1993, Optics & Photonics.

[20]  D. Hatzinakos,et al.  Bayesian frame synchronization for 802.11a WLANs: experimental results , 2005, Canadian Conference on Electrical and Computer Engineering, 2005..

[21]  J. Dudczyk,et al.  Mixed Method Based on Intrapulse Data and Radiated Emission to Emitter Sources Recognition , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.

[22]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[23]  V. Abhaikumar,et al.  Wavelet based signal processing algorithms for early target detection , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.

[24]  R.T. Johnk,et al.  Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[25]  Jay P. Boris,et al.  Fulfilling the Roosevelts' Vision for American Naval Power (1923-2005) , 2006 .

[26]  Michael A. Temple,et al.  Application of wavelet denoising to improve OFDM-based signal detection and classification , 2010, Secur. Commun. Networks.

[27]  Dimitrios Hatzinakos,et al.  Bayesian frame synchronization using periodic preamble for OFDM-based WLANs , 2005, IEEE Signal Processing Letters.

[28]  J. Dudczyk,et al.  The utilization of unintentional radiation for identification of the radiation sources , 2004, 34th European Microwave Conference, 2004..

[29]  G. V. Anand,et al.  Detection of transient signals by wavelet packet transform and stochastic resonance , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[30]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[31]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[32]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[33]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[34]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[35]  Stephen Del Marco,et al.  Improved transient signal detection using a wavepacket-based detector with an extended translation-invariant wavelet transform , 1997, IEEE Trans. Signal Process..

[36]  E. Merenyi,et al.  Relevance-based Feature Extraction from Hyperspectral Images in the Complex Wavelet Domain , 2006, 2006 IEEE Mountain Workshop on Adaptive and Learning Systems.

[37]  Stephen P. Del Marco,et al.  M-band wavepacket-based transient signal detector using a translation-invariant wavelet transform , 1994 .

[38]  O. Ureten,et al.  Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .

[39]  T. Higuchi Approach to an irregular time series on the basis of the fractal theory , 1988 .

[40]  Hagit Messer,et al.  Detection of a transient signal of unknown scaling and arrival time using the discrete wavelet transform , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.

[41]  H. Hotelling The Generalization of Student’s Ratio , 1931 .

[42]  L. E. Langley,et al.  Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.

[43]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[44]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[45]  Oktay Üreten,et al.  Improved Coarse Timing For Burst Mode OFDM , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[46]  Erzsébet Merényi,et al.  GENERALIZED RELEVANCE LEARNING VECTOR QUANTIZATION FOR CLASSIFICATION-DRIVEN FEATURE EXTRACTION FROM HYPERSPECTRAL DATA , 2006 .

[47]  A. Walden,et al.  Wavelet Methods for Time Series Analysis , 2000 .

[48]  J. Dudczyk,et al.  Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).

[49]  Jeyanthi Hall,et al.  Detection of rogue devices in wireless networks , 2006 .

[50]  M. Mendenhall,et al.  Relevance-Based Feature Extraction for Hyperspectral Images , 2008, IEEE Transactions on Neural Networks.

[51]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[52]  A. Prochazka,et al.  Wavelet transform use for signal classification by self-organizing neural networks , 1995 .

[53]  Marina Vannucci,et al.  Wavelet tests for the detection of transients in the VIRGO interferometric gravitational wave detector , 2005, IEEE Transactions on Instrumentation and Measurement.

[54]  Richard Baraniuk,et al.  The Dual-tree Complex Wavelet Transform , 2007 .