论文标题

具有生成对抗攻击的基于RF指纹的身份验证

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack

论文作者

Karunaratne, Samurdhi, Krijestorac, Enes, Cabric, Danijela

论文摘要

物理层身份验证依赖于检测无线电设备传输的信号中的独特缺陷以隔离其指纹。最近,越来越多地提出了基于深度学习的身份验证剂,以使用这些指纹对设备进行分类,因为与传统方法相比,它们具有更高的精度。但是,在其他领域中已经显示,将精心制作的扰动添加到合法投入中可能会欺骗此类分类器。这可能会破坏身份验证者提供的安全性。与在其他领域中应用的对抗攻击不同,对手无法控制传播环境。因此,为了调查无线通信中这种攻击的严重性,我们考虑了未经授权的发射器,试图将其信号归类为由深度学习的认证者授权。我们证明了基于增强的学习攻击,仅使用身份验证者的二进制身份验证决策 - 依靠其信号以渗透系统。在软件定义的无线电测试床上进行的大量模拟和实验表明,在适当的通道条件下,在最大变形水平上,有可能以超过90%的成功率可靠地欺骗身份验证器。

Physical layer authentication relies on detecting unique imperfections in signals transmitted by radio devices to isolate their fingerprint. Recently, deep learning-based authenticators have increasingly been proposed to classify devices using these fingerprints, as they achieve higher accuracies compared to traditional approaches. However, it has been shown in other domains that adding carefully crafted perturbations to legitimate inputs can fool such classifiers. This can undermine the security provided by the authenticator. Unlike adversarial attacks applied in other domains, an adversary has no control over the propagation environment. Therefore, to investigate the severity of this type of attack in wireless communications, we consider an unauthorized transmitter attempting to have its signals classified as authorized by a deep learning-based authenticator. We demonstrate a reinforcement learning-based attack where the impersonator--using only the authenticator's binary authentication decision--distorts its signals in order to penetrate the system. Extensive simulations and experiments on a software-defined radio testbed indicate that at appropriate channel conditions and bounded by a maximum distortion level, it is possible to fool the authenticator reliably at more than 90% success rate.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源