Open Set RF Fingerprinting using Generative Outlier Augmentation
- URL: http://arxiv.org/abs/2108.13099v1
- Date: Mon, 30 Aug 2021 10:12:46 GMT
- Title: Open Set RF Fingerprinting using Generative Outlier Augmentation
- Authors: Samurdhi Karunaratne, Samer Hanna, Danijela Cabric
- Abstract summary: We propose to use generative deep learning methods to emulate unauthorized signal samples for the augmentation of training datasets.
Experiments conducted on a dataset captured from a WiFi testbed indicate that data augmentation allows for significant increases in open set classification accuracy.
- Score: 15.572581983129655
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: RF devices can be identified by unique imperfections embedded in the signals
they transmit called RF fingerprints. The closed set classification of such
devices, where the identification must be made among an authorized set of
transmitters, has been well explored. However, the much more difficult problem
of open set classification, where the classifier needs to reject unauthorized
transmitters while recognizing authorized transmitters, has only been recently
visited. So far, efforts at open set classification have largely relied on the
utilization of signal samples captured from a known set of unauthorized
transmitters to aid the classifier learn unauthorized transmitter fingerprints.
Since acquiring new transmitters to use as known transmitters is highly
expensive, we propose to use generative deep learning methods to emulate
unauthorized signal samples for the augmentation of training datasets. We
develop two different data augmentation techniques, one that exploits a limited
number of known unauthorized transmitters and the other that does not require
any unauthorized transmitters. Experiments conducted on a dataset captured from
a WiFi testbed indicate that data augmentation allows for significant increases
in open set classification accuracy, especially when the authorized set is
small.
Related papers
- Preventing Radio Fingerprinting through Friendly Jamming [5.074726108522963]
Radio frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools.
We examine the hostile usage of radio frequency fingerprinting, which facilitates the unauthorized tracking of wireless devices in the field by malicious entities.
We suggest a method to sanitize the transmitted signal of its fingerprint using a jammer, deployed on purpose to improve devices' anonymity on the channel.
arXiv Detail & Related papers (2024-07-11T09:01:46Z) - Semi-Supervised RF Fingerprinting with Consistency-Based Regularization [18.860503392365644]
Radio frequency (RF) fingerprinting can greatly improve wireless security.
Recent work has shown that RF fingerprinting based on deep learning can significantly outperform conventional approaches.
We leverage deep semi-supervised learning for RF fingerprinting, which relies on a composite data augmentation scheme designed for radio signals.
arXiv Detail & Related papers (2023-04-28T12:08:07Z) - Disentangled Representation Learning for RF Fingerprint Extraction under
Unknown Channel Statistics [77.13542705329328]
We propose a framework of disentangled representation learning(DRL) that first learns to factor the input signals into a device-relevant component and a device-irrelevant component via adversarial learning.
The implicit data augmentation in the proposed framework imposes a regularization on the RFF extractor to avoid the possible overfitting of device-irrelevant channel statistics.
Experiments validate that the proposed approach, referred to as DR-RFF, outperforms conventional methods in terms of generalizability to unknown complicated propagation environments.
arXiv Detail & Related papers (2022-08-04T15:46:48Z) - Decision Forest Based EMG Signal Classification with Low Volume Dataset
Augmented with Random Variance Gaussian Noise [51.76329821186873]
We produce a model that can classify six different hand gestures with a limited number of samples that generalizes well to a wider audience.
We appeal to a set of more elementary methods such as the use of random bounds on a signal, but desire to show the power these methods can carry in an online setting.
arXiv Detail & Related papers (2022-06-29T23:22:18Z) - S3: Supervised Self-supervised Learning under Label Noise [53.02249460567745]
In this paper we address the problem of classification in the presence of label noise.
In the heart of our method is a sample selection mechanism that relies on the consistency between the annotated label of a sample and the distribution of the labels in its neighborhood in the feature space.
Our method significantly surpasses previous methods on both CIFARCIFAR100 with artificial noise and real-world noisy datasets such as WebVision and ANIMAL-10N.
arXiv Detail & Related papers (2021-11-22T15:49:20Z) - Real-time Wireless Transmitter Authorization: Adapting to Dynamic
Authorized Sets with Information Retrieval [15.572581983129655]
In a real-life deployment, a need may arise for transmitters to be added and removed as the authorized set of transmitters changes.
In this paper, we demonstrate that training could be simplified to indexing those feature vectors into a database using locality sensitive hashing (LSH)
We show that approximate nearest neighbor search could be performed on the database to perform transmitter authorization that matches the accuracy of deep learning models.
arXiv Detail & Related papers (2021-11-04T02:00:45Z) - Open Set Recognition with Conditional Probabilistic Generative Models [51.40872765917125]
We propose Conditional Probabilistic Generative Models (CPGM) for open set recognition.
CPGM can detect unknown samples but also classify known classes by forcing different latent features to approximate conditional Gaussian distributions.
Experiment results on multiple benchmark datasets reveal that the proposed method significantly outperforms the baselines.
arXiv Detail & Related papers (2020-08-12T06:23:49Z) - Improving Face Recognition by Clustering Unlabeled Faces in the Wild [77.48677160252198]
We propose a novel identity separation method based on extreme value theory.
It greatly reduces the problems caused by overlapping-identity label noise.
Experiments on both controlled and real settings demonstrate our method's consistent improvements.
arXiv Detail & Related papers (2020-07-14T12:26:50Z) - How to Make 5G Communications "Invisible": Adversarial Machine Learning
for Wireless Privacy [43.156901821548935]
We study the problem of hiding wireless communications from an eavesdropper.
There exists one transmitter that transmits to its receiver in the presence of an eavesdropper.
A cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise.
arXiv Detail & Related papers (2020-05-15T17:45:11Z) - Ensemble Wrapper Subsampling for Deep Modulation Classification [70.91089216571035]
Subsampling of received wireless signals is important for relaxing hardware requirements as well as the computational cost of signal processing algorithms.
We propose a subsampling technique to facilitate the use of deep learning for automatic modulation classification in wireless communication systems.
arXiv Detail & Related papers (2020-05-10T06:11:13Z) - Device Authentication Codes based on RF Fingerprinting using Deep
Learning [2.980018103007841]
Device Authentication Code (DAC) is a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures.
We show that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest.
arXiv Detail & Related papers (2020-04-19T01:50:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.