Adversarial-Resilient RF Fingerprinting: A CNN-GAN Framework for Rogue Transmitter Detection
Dhakal, Shekhar, Kandel
Radio Frequency Fingerprinting (RFF) has evolved as an effective solution for authenticating devices by leveraging the unique imperfections in hardware components involved in the signal generation process. In this work, we propose a Convolutional Neural Network (CNN) based framework for detecting rogue devices and identifying genuine ones using softmax probability thresholding. We emulate an attack scenario in which adversaries attempt to mimic the RF characteristics of genuine devices by training a Generative Adversarial Network (GAN) using In-phase and Quadrature (IQ) samples from genuine devices. The proposed approach is verified using IQ samples collected from ten different ADALM-PLUTO Software Defined Radios (SDRs), with seven devices considered genuine, two as rogue, and one used for validation to determine the threshold.
academic
Adversarial-Resilient RF Fingerprinting: A CNN-GAN Framework for Rogue Transmitter Detection
Radio frequency fingerprinting (RFF) has evolved into an effective solution for device authentication by exploiting unique imperfections in hardware components during signal generation. This paper proposes a framework based on convolutional neural networks (CNN) that employs softmax probability thresholding to detect malicious devices and identify legitimate devices. The study simulates adversarial scenarios where attackers attempt to mimic legitimate device RF characteristics by training in-phase and quadrature (I/Q) samples using generative adversarial networks (GANs). The methodology is validated using I/Q samples collected from 10 different ADALM-PLUTO software-defined radios (SDRs), where 7 devices are considered legitimate, 2 are malicious, and 1 is reserved for validation to determine the threshold.
With the rapid advancement of wireless communication technology, the proliferation of devices in IoT, sensor networks, unmanned aerial vehicles (UAVs), and other application domains has introduced severe cybersecurity threats, particularly in device authentication and network access management. Traditional cryptographic techniques often incur excessive computational overhead in resource-constrained environments.
Lightweight Authentication Requirements: Resource-constrained environments such as IoT, sensor networks, and UAV networks require lightweight authentication methods
Hardware Fingerprint Uniqueness: Each wireless device possesses a unique identifier in its transmission signals generated by hardware component imperfections
Adversarial Attack Threats: Attackers may not directly employ malicious devices but instead attempt to mimic legitimate device characteristics to gain network access
Single Attack Model: Existing research either considers only genuine malicious devices or focuses solely on synthetically generated samples as malicious devices
Lack of Adversarial Robustness: Most methods do not account for attackers using GAN and similar technologies to mimic legitimate device RF characteristics
Experimental Limitations: Many studies validate only in ideal environments, lacking consideration of real adversarial scenarios
Novel Framework: To the authors' knowledge, this is the first work validating out-of-distribution device detection performance using both real device I/Q samples and GAN-synthesized samples
Dual Attack Model: Simultaneously addresses genuine malicious devices and attack scenarios using GANs to mimic legitimate device characteristics
CNN-GAN Joint Framework: Proposes a comprehensive solution combining CNN classifiers and GAN generators
Practical Threshold Method: Develops a unified approach for open-set detection and closed-set classification based on softmax probability thresholding
Input: I/Q signal samples from wireless devices
Output:
Binary Classification: Distinguishing legitimate devices from malicious devices
Multi-class Classification: Classifying detected legitimate devices to specific device categories
Constraints: Must handle unseen malicious devices and GAN-generated mimicry samples
Existing work either considers only genuine malicious devices or focuses solely on synthetic samples, lacking comprehensive treatment of both attack types.
The paper cites 13 relevant references covering critical works in RF fingerprinting, deep learning, GANs, and wireless security, providing solid theoretical foundations for the research.
Overall Assessment: This is an innovative work in the RF fingerprinting domain that systematically addresses device authentication under adversarial attack scenarios for the first time. Despite relatively limited experimental scale, the novel methodology and credible results provide valuable contributions to the field's development.