MAC ID Spoofing-Resistant Radio Fingerprinting

We explore the resistance of deep learning methods for radio fingerprinting to MAC ID spoofing. We demonstrate that classifying transmission slices enables classification of a transmission with a fixed-length input deep classifier, enhances shift-invariance, and, most importantly, makes the classifier resistant to MAC ID spoofing. This is a consequence of the fact that the classifier does not learn to use the MAC ID to classifying among transmissions, but relies on other inherent discriminating signals, e.g., device imperfections. We demonstrate this via experiments on transmissions generated using two protocols, namely, WiFi and ADS-B.

[1]  Wojciech Samek,et al.  Methods for interpreting and understanding deep neural networks , 2017, Digit. Signal Process..

[2]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Raheem Beyah,et al.  GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.

[4]  Geoffrey E. Hinton,et al.  Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[5]  T. Charles Clancy,et al.  Convolutional Radio Modulation Recognition Networks , 2016, EANN.

[6]  Yi Zhang,et al.  Spectrum Monitoring for Radar Bands Using Deep Convolutional Neural Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[7]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[8]  Chang-Tien Lu,et al.  On Passive Wireless Device Fingerprinting using Infinite Hidden Markov Random Field , 2012 .

[9]  Damon McCoy,et al.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.

[10]  Iman Tabatabaei Ardekani,et al.  Effect of channel impairments on radiometric fingerprinting , 2015, 2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[11]  Ke Gao,et al.  A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[12]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[13]  Kemal Davaslioglu,et al.  Generative Adversarial Network for Wireless Signal Spoofing , 2019, WiseML@WiSec.

[14]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[15]  Keith E. Nolan,et al.  Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[16]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[17]  Stratis Ioannidis,et al.  Deep Learning Convolutional Neural Networks for Radio Identification , 2018, IEEE Communications Magazine.

[18]  Stratis Ioannidis,et al.  ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[19]  Tien Dang Vo-Huu,et al.  Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.

[20]  Victor C. M. Leung,et al.  Deep-Reinforcement-Learning-Based Optimization for Cache-Enabled Opportunistic Interference Alignment Wireless Networks , 2017, IEEE Transactions on Vehicular Technology.

[21]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.