论文标题
设备身份验证代码基于RF指纹使用深度学习
Device Authentication Codes based on RF Fingerprinting using Deep Learning
论文作者
论文摘要
在本文中,我们提出了设备身份验证代码(DAC),这是一种通过利用其射频(RF)签名来验证IoT设备的新型方法。拟议的DAC基于RF指纹识别,信息理论方法,特征学习和深度学习的歧视能力。具体而言,自动编码器用于自动从RF跟踪中提取功能,并将重建误差用作DAC,并且此DAC是该设备和特定感兴趣的消息所独有的。然后,使用Kolmogorov-Smirnov(K-S)测试来匹配自动编码器生成的重建错误的分布和接收的消息,结果将确定感兴趣的设备是否属于授权用户。我们分别从六个Zigbee和五个通用软件定义的无线电(USRP)设备的两个实验收集的RF痕迹上验证了这一概念。迹线通过不同位置和迁移率以及通道干扰和噪声来确保模型的稳健性,范围跨越了一系列信号噪声比。实验结果表明,DAC能够通过提取任何感兴趣的无线设备所独有的显着特征来防止设备的模拟,并且可用于识别RF设备。此外,所提出的方法在模型培训期间不需要入侵者的RF痕迹,但能够识别训练期间未见的设备,这使其实用。
In this paper, we propose Device Authentication Code (DAC), a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures. The proposed DAC is based on RF fingerprinting, information theoretic method, feature learning, and discriminatory power of deep learning. Specifically, an autoencoder is used to automatically extract features from the RF traces, and the reconstruction error is used as the DAC and this DAC is unique to the device and the particular message of interest. Then Kolmogorov-Smirnov (K-S) test is used to match the distribution of the reconstruction error generated by the autoencoder and the received message, and the result will determine whether the device of interest belongs to an authorized user. We validate this concept on two experimentally collected RF traces from six ZigBee and five universal software defined radio peripheral (USRP) devices, respectively. The traces span a range of Signalto- Noise Ratio by varying locations and mobility of the devices and channel interference and noise to ensure robustness of the model. Experimental results demonstrate that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest and can be used to identify RF devices. Furthermore, the proposed method does not need the RF traces of the intruder during model training yet be able to identify devices not seen during training, which makes it practical.