Machine Learning Approach to RF Transmitter Identification

With the increasing domain and widespread use of wireless devices in recent years (mobile phones, Internet of Things, Wi-Fi), the electromagnetic spectrum has become extremely crowded. To counter security threats posed by rogue or unknown transmitters, we must identify RF transmitters not only by the data content of the transmissions but also based on the intrinsic physical characteristics of the transmitters. RF waveforms represent a particular challenge because of the extremely high data rates involved and the potentially large number of transmitters sharing a channel in a given location. These factors outline the need for rapid fingerprinting and identification methods that go beyond the traditional hand-engineered approaches. In this paper, we investigate the use of machine learning strategies to the classification and identification problem. We evaluate four different strategies: conventional deep neural nets, convolutional neural nets, support vector machines, and deep neural nets with multi-stage training. The latter was by far the most accurate, achieving 100% classification accuracy of 12 transmitters, and showing remarkable potential for scalability to large transmitter populations.

[1]  M. S. Ramaiah,et al.  Performance of ANN in Pattern Recognition For Process Improvement Using Levenberg- Marquardt And Quasi-Newton Algorithms , 2013 .

[2]  Hiroshi Dozono,et al.  Convolutional Self Organizing Map , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[3]  K. Haigh,et al.  Machine Learning for Embedded Systems : A Case Study , 2015 .

[4]  Raymond Knopp,et al.  Relative channel reciprocity calibration in MIMO/TDD systems , 2010, 2010 Future Network & Mobile Summit.

[5]  L. Buydens,et al.  Facilitating the application of Support Vector Regression by using a universal Pearson VII function based kernel , 2006 .

[6]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[7]  Srdjan Capkun,et al.  Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.

[8]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[9]  T.,et al.  Training Feedforward Networks with the Marquardt Algorithm , 2004 .

[10]  Sigeru Omatu,et al.  Identification of the defective transmission devices using the wavelet transform , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[12]  Guy A. E. Vandenbosch,et al.  An Efficient Method for Antenna Design Optimization Based on Evolutionary Computation and Machine Learning Techniques , 2014, IEEE Transactions on Antennas and Propagation.

[13]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[14]  Tara N. Sainath,et al.  FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .

[15]  Tara Singh Kamal,et al.  Analysis and Design of Circular Fractal Antenna Using Artificial Neural Networks , 2013 .

[16]  Anders Krogh,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[17]  Nitesh V. Chawla,et al.  Deep learning for network analysis: Problems, approaches and challenges , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[18]  Josh Petersen,et al.  Modulation recognition using hierarchical deep neural networks , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[19]  Danijela Cabric,et al.  USRP N210 demonstration of wideband sensing and blind hierarchical modulation classification , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[20]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[21]  Mohammad Bagher Menhaj,et al.  Training feedforward networks with the Marquardt algorithm , 1994, IEEE Trans. Neural Networks.

[22]  N.S. Subotic,et al.  Distributed RADAR waveform design based on compressive sensing considerations , 2008, 2008 IEEE Radar Conference.

[23]  Louis-S. Bouchard,et al.  Feature-Preserving Noise Removal , 2015, IEEE Transactions on Medical Imaging.

[24]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[25]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[26]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition , 2012 .

[27]  Qiang Wang,et al.  An ANN-Based Synthesis Model for the Single-Feed Circularly-Polarized Square Microstrip Antenna With Truncated Corners , 2012, IEEE Transactions on Antennas and Propagation.

[28]  Harold H. Szu,et al.  Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.

[29]  T. Charles Clancy,et al.  Convolutional Radio Modulation Recognition Networks , 2016, EANN.

[30]  John C. Platt,et al.  Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .

[31]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[32]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[33]  Hao Yu,et al.  Levenberg—Marquardt Training , 2011 .

[34]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[35]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[36]  Roberto Battiti,et al.  First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.

[37]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[38]  W. Marsden I and J , 2012 .

[39]  Tien Dang Vo-Huu,et al.  Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.

[40]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[41]  Mala Mitra,et al.  Privacy for RFID Systems to Prevent Tracking and Cloning , 2008 .

[42]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[43]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.