Protecting Legitimate SEI Security Approaches From Phase-based Obfuscation Attacks

被引:0
|
作者
Tyler, Joshua H. [1 ]
Reising, Donald R. [1 ]
Fadul, Mohamed K. M. [1 ]
Sartipi, Mina [1 ]
机构
[1] Univ Tennessee Chattanooga, Chattanooga, TN 37403 USA
关键词
Neural Networks; Specific Emitter Identification (SEI); Adversary; SEI Threats; Security; Internet of Things (IoT); FREQUENCY;
D O I
10.1109/ICC45041.2023.10279057
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Specific Emitter Identification (SEI) has proven to be an effective means for passively identifying emitters using unique and distinct features that are unintentionally imparted to waveforms during their formation and transmission. Primarily, the assumption is that the to-be-identified emitters are passive devices incapable or unwilling to resist SEI. However, cost-effective software-defined radios and open-source deep learning algorithms are leading investigators to challenge this assumption. They show that previously exploited features can be modified to reduce or defeat SEI. Recently, RF-Veil has been proposed to combat such attacks by providing emitters with an active means to obfuscate their waveform features. The result is an eavesdropping and impersonation attack resilient SEI process. Despite RF-Veil's security and privacy focus, it is fair to assume that nefarious actors will attempt to abuse it to thwart legitimate SEI security processes. Therefore, this work investigates the identification of nefarious emitters that employ RF-Veil to thwart legitimate SEI security processes. The results show that there is an inherent Residual Phase Offset (RPO) present in preambles that are not removed in traditional phase offset correction. Removing RPO improves SEI performance when using the phase representation of IQ samples and significantly reduces RF-Veil's negative impact on SEI.
引用
收藏
页码:1425 / 1431
页数:7
相关论文
共 50 条
  • [1] Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis
    Redondo, Alberto
    Insua, David Rios
    RISK ANALYSIS, 2020, 40 (12) : 2598 - 2609
  • [2] On the Security of Carrier Phase-Based Ranging
    Olafsdottir, Hildur
    Ranganathan, Aanjhan
    Capkun, Srdjan
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 490 - 509
  • [3] Black box phase-based adversarial attacks on image classifiers
    Hodes, Scott G.
    Blose, Kory J.
    Kane, Timothy J.
    AUTOMATIC TARGET RECOGNITION XXXIV, 2024, 13039
  • [4] Black box phase-based adversarial attacks on image classifiers
    Hodes, Scott G.
    Blose, Kory J.
    Kane, Timothy J.
    JOURNAL OF ELECTRONIC IMAGING, 2025, 34 (01)
  • [5] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
  • [6] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Rajat Subhra Chakraborty
    Swarup Bhunia
    Journal of Electronic Testing, 2011, 27 : 767 - 785
  • [7] Security Assessment of Phase-Based Ranging Systems in a Multipath Environment
    Riaz, Arslan
    Nash, Dylan
    Ngo, Jonathan
    Juvekar, Chiraag
    Nadeau, Phillip
    Yu, Tao
    Yazicigil, Rabia Tugce
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (04)
  • [8] A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation
    Althunibat, Saud
    Sucasas, Victor
    Rodriguez, Jonathan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) : 9931 - 9942
  • [9] Optical security system using phase-based virtual image and interferometer
    Seo, DH
    Kim, SJ
    OPTICAL REVIEW, 2003, 10 (01) : 4 - 7
  • [10] Optical Security System using Phase-based Virtual Image and Interferometer
    Dong-Hoan Seo
    Soo-Joong Kim
    Optical Review, 2003, 10 : 4 - 7