PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning

Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. However, previous research efforts mainly focused on terrestrial wireless devices while, to the best of our knowledge, none of the previous work took into consideration satellite transmitters. The satellite scenario is generally challenging because, among others, satellite radio transducers feature non-standard electronics (usually aged and specifically designed for harsh conditions). Moreover, the fingerprinting task is specifically difficult for Low-Earth Orbit (LEO) satellites (like the ones we focus in this paper) since they orbit at about 800Km from the Earth, at a speed of around 25,000Km/h, thus making the receiver experiencing a down-link with unique attenuation and fading characteristics. In this paper, we propose PAST-AI, a methodology tailored to authenticate LEO satellites through fingerprinting of their IQ samples, using advanced AI solutions. Our methodology is tested on real data -- more than 100M I/Q samples -- collected from an extensive measurements campaign on the IRIDIUM LEO satellites constellation, lasting 589 hours. Results are striking: we prove that Convolutional Neural Networks (CNN) and autoencoders (if properly calibrated) can be successfully adopted to authenticate the satellite transducers, with an accuracy spanning between 0.8 and 1, depending on prior assumptions. The proposed methodology, the achieved results, and the provided insights, other than being interesting on their own, when associated to the dataset that we made publicly available, will also pave the way for future research in the area.

[1]  Simone Raponi,et al.  Sound of guns: digital forensics of gun audio samples meets artificial intelligence , 2020, Multimedia Tools and Applications.

[2]  Francesco Carlo Morabito,et al.  A novel statistical analysis and autoencoder driven intelligent intrusion detection approach , 2020, Neurocomputing.

[3]  Wenyuan Xu,et al.  FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting , 2018, AsiaCCS.

[4]  Stratis Ioannidis,et al.  Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[5]  Yang Xu,et al.  DDoS Attacks Detection with AutoEncoder , 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium.

[6]  Roberto Di Pietro,et al.  Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments) , 2019, WiSec.

[7]  Mauro Conti,et al.  Detecting ADS-B Spoofing Attacks Using Deep Neural Networks , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[8]  Roberto Di Pietro,et al.  MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions , 2020, ArXiv.

[9]  Dimitrios Koutsonikolas,et al.  Physical Layer Identification Based on Spatial–Temporal Beam Features for Millimeter-Wave Wireless Networks , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Yurong Liu,et al.  A survey of deep neural network architectures and their applications , 2017, Neurocomputing.

[11]  Michael A. Temple,et al.  An operational and performance overview of the IRIDIUM low earth orbit satellite system , 1999, IEEE Communications Surveys & Tutorials.

[12]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[13]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[14]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Ernest Foo,et al.  A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures , 2016, ACM Comput. Surv..

[16]  Stratis Ioannidis,et al.  No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments , 2020, IEEE Transactions on Cognitive Communications and Networking.

[17]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[18]  Diederik P. Kingma,et al.  An Introduction to Variational Autoencoders , 2019, Found. Trends Mach. Learn..

[19]  Martin Fodslette Møller,et al.  A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.

[20]  Sheng Wang,et al.  A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  Sajid Nazir,et al.  Autoencoder Based Anomaly Detection for SCADA Networks , 2021, Int. J. Artif. Intell. Mach. Learn..

[22]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[23]  Stratis Ioannidis,et al.  Deep Learning for RF Fingerprinting: A Massive Experimental Study , 2020, IEEE Internet of Things Magazine.

[24]  Yi Yu,et al.  Radio Frequency Fingerprint Identification Based on Denoising Autoencoders , 2019, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[25]  Yang Yang,et al.  A Review of Radio Frequency Fingerprinting Techniques , 2020, IEEE Journal of Radio Frequency Identification.

[26]  Brendan J. Frey,et al.  k-Sparse Autoencoders , 2013, ICLR.

[27]  Lijun Qian,et al.  Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).

[28]  Roberto Di Pietro,et al.  GNSS spoofing detection via opportunistic IRIDIUM signals , 2020, WISEC.

[29]  Stratis Ioannidis,et al.  ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[30]  Yoshua Bengio,et al.  How transferable are features in deep neural networks? , 2014, NIPS.

[31]  Hossein Jafari,et al.  IoT Devices Fingerprinting Using Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[32]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[33]  Ryan M. Gerdes,et al.  Spotr: GPS spoofing detection via device fingerprinting , 2020, WISEC.

[34]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.

[35]  Xinyu Zhou,et al.  Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).