3.8 Proceedings Paper

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack

Publisher

IEEE
DOI: 10.1109/ICC42927.2021.9500893

Keywords

Transmitter Identification; Deep Learning; Open set recognition; authorization; physical layer authentication

Funding

  1. CONIX Research Center, one of six centers in JUMP, a Semiconductor Research Corporation (SRC) program - DARPA

Ask authors/readers for more resources

The study demonstrates that in wireless communications, unauthorized transmitters can successfully attack a deep learning-based authenticator by distorting signals, potentially undermining the security provided by the authenticator.
Physical layer authentication relies on detecting unique imperfections in signals transmitted by radio devices to isolate their fingerprint. Recently, deep learning-based authenticators have increasingly been proposed to classify devices using these fingerprints, as they achieve higher accuracies compared to traditional approaches. However, it has been shown in domains such as computer vision that adding carefully crafted perturbations to legitimate inputs can fool such classifiers. This can undermine the security provided by the authenticator. Unlike adversarial attacks applied in other domains, an adversary has no control over the propagation environment. Therefore, to investigate the severity of this type of attack in wireless communications, we consider an unauthorized transmitter attempting to have its signals classified as authorized by a deep learning-based authenticator. We demonstrate a reinforcement learning-based attack where the impersonator-using only the authenticator's binary authentication decision-distorts its signals in order to penetrate the system. Extensive simulations and experiments on a software-defined radio testbed indicate that at appropriate channel conditions and bounded by a maximum distortion level, it is possible to fool the authenticator reliably at a success rate of more than 90%.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available