Protecting Legitimate SEI Security Approaches From Phase-based Obfuscation Attacks

被引:0
|
作者
Tyler, Joshua H. [1 ]
Reising, Donald R. [1 ]
Fadul, Mohamed K. M. [1 ]
Sartipi, Mina [1 ]
机构
[1] Univ Tennessee Chattanooga, Chattanooga, TN 37403 USA
关键词
Neural Networks; Specific Emitter Identification (SEI); Adversary; SEI Threats; Security; Internet of Things (IoT); FREQUENCY;
D O I
10.1109/ICC45041.2023.10279057
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Specific Emitter Identification (SEI) has proven to be an effective means for passively identifying emitters using unique and distinct features that are unintentionally imparted to waveforms during their formation and transmission. Primarily, the assumption is that the to-be-identified emitters are passive devices incapable or unwilling to resist SEI. However, cost-effective software-defined radios and open-source deep learning algorithms are leading investigators to challenge this assumption. They show that previously exploited features can be modified to reduce or defeat SEI. Recently, RF-Veil has been proposed to combat such attacks by providing emitters with an active means to obfuscate their waveform features. The result is an eavesdropping and impersonation attack resilient SEI process. Despite RF-Veil's security and privacy focus, it is fair to assume that nefarious actors will attempt to abuse it to thwart legitimate SEI security processes. Therefore, this work investigates the identification of nefarious emitters that employ RF-Veil to thwart legitimate SEI security processes. The results show that there is an inherent Residual Phase Offset (RPO) present in preambles that are not removed in traditional phase offset correction. Removing RPO improves SEI performance when using the phase representation of IQ samples and significantly reduces RF-Veil's negative impact on SEI.
引用
收藏
页码:1425 / 1431
页数:7
相关论文
共 50 条
  • [31] Protecting Wireless Sensor Networks from Internal Attacks Based on Uncertain Decisions
    Huang, Xu
    Ahmed, Muhammad R.
    Sharma, Dharmendra
    Cui, Hongyan
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1854 - 1859
  • [32] A hybrid methodology with learning based approach for protecting systems from DDoS attacks
    Ramesh, G.
    Gorantla, Venkata Ashok K.
    Gude, Venkataramaiah
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1317 - 1325
  • [33] DECODING PHASE-BASED INFORMATION FROM SSVEP RECORDINGS: A COMPARATIVE STUDY
    Manyakov, Nikolay V.
    Chumerin, Nikolay
    Combaz, Adrien
    Robben, Arne
    van Vliet, Marijn
    Van Hulle, Marc M.
    2011 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2011,
  • [34] Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
    Inam Ullah
    Asra Noor
    Shah Nazir
    Farhad Ali
    Yazeed Yasin Ghadi
    Nida Aslam
    The Journal of Supercomputing, 2024, 80 : 5870 - 5899
  • [35] Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
    Ullah, Inam
    Noor, Asra
    Nazir, Shah
    Ali, Farhad
    Ghadi, Yazeed Yasin
    Aslam, Nida
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05): : 5870 - 5899
  • [36] Data-driven model identification near a supercritical Hopf bifurcation using phase-based approaches
    Wilson, Dan
    PHYSICA D-NONLINEAR PHENOMENA, 2025, 476
  • [37] Fabrication of Max Phase-Based Gradient Porous Materials from Preceramic Paper
    Krotkevich, D. G.
    Kashkarov, E. B.
    Mingazova, Y. R.
    Lider, A. M.
    Travitzky, N.
    RUSSIAN PHYSICS JOURNAL, 2023, 65 (12) : 2186 - 2192
  • [38] Advanced phase-based segmentation of multiple cells from brightfield microscopy images
    Ali, Rehan
    Gooding, Mark
    Christlieb, Martin
    Brady, Michael
    2008 IEEE INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING: FROM NANO TO MACRO, VOLS 1-4, 2008, : 181 - +
  • [39] A Local Phase-Based Algorithm for Registration of CMR Scans from Multiple Visits
    Kelly, Christopher
    Neubauer, Stefan
    Choudhury, Robin
    Dall'Armellina, Erica
    Grau, Vicente
    2014 COMPUTING IN CARDIOLOGY CONFERENCE (CINC), VOL 41, 2014, 41 : 937 - 940
  • [40] Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs
    Potestad-Ordonez, Francisco Eugenio
    Casado-Galan, Alejandro
    Tena-Sanchez, Erica
    SENSORS, 2024, 24 (05)