Unauthorized Broadcasting Identification: A Deep LSTM Recurrent Learning Approach

被引:65
|
作者
Ma, Jitong [1 ]
Liu, Hao [1 ]
Peng, Chen [2 ]
Qiu, Tianshuang [1 ]
机构
[1] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] Shanghai Jiao Tong Univ, SITU UM Joint Inst, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcasting; Training; Logic gates; Recurrent neural networks; Wireless communication; Feature extraction; Channel state information; Broadcasting identification; long short-term memory (LSTM); recurrent neural network (RNN); NETWORK;
D O I
10.1109/TIM.2020.3008988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio broadcasting plays an important role in our daily life. Meanwhile, with the development of wireless communications, the application of software-defined radio platforms gives rise to cheap and easy design of illegal broadcasting stations. These unauthorized broadcasting stations sometimes illegally occupy licensed frequency band, especially associated with amateur radios and unlicensed personal communication devices and services. These unauthorized broadcasting stations may severely interfere with the authorized broadcasting and further disrupt the management of spectrum resource in civil applications, such as emergency services and air traffic control. However, it still remains a challenging task to automatically and effectively identify the unauthorized broadcasting in complicated electromagnetic environments. Aiming at developing an intelligent and efficient unauthorized broadcasting identification system, in this article, a novel identification approach is proposed based on long short-term memory (LSTM) recurrent neural network (RNN), and LabVIEW software. In our approach, first, a series of LabVIEW applications are developed to drive USRP 2930s for the acquisition of broadcasting signals. Then, the LSTM identification network is proposed to recognize unauthorized broadcasting. Through the special gate structure inside, the proposed LSTM framework can effectively extract the distinguishing features, such as channel state information and RF device fingerprinting. Simulation results show that the proposed LSTM-based approach perform better than other contrastive methods, especially in identification accuracy. Implementation results also demonstrate that the proposed method has an outstanding unauthorized broadcasting identification performance with a high accuracy, i.e., identify the unauthorized broadcasting signals with 99.83% accuracy at the licensed frequency of 107.8 MHz, in realistic electromagnetic environments.
引用
收藏
页码:5981 / 5983
页数:3
相关论文
共 50 条
  • [31] A deep learning approach for anomaly detection based on SAE and LSTM in mechanical equipment
    Li, Zhe
    Li, Jingyue
    Wang, Yi
    Wang, Kesheng
    International Journal of Advanced Manufacturing Technology, 2019, 103 (1-4): : 499 - 510
  • [32] A Deep Learning Approach to Predict Weather Data Using Cascaded LSTM Network
    Al Sadeque, Zarif
    Bui, Francis M.
    2020 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2020,
  • [33] A novel bidirectional LSTM deep learning approach for COVID-19 forecasting
    Nway Nway Aung
    Junxiong Pang
    Matthew Chin Heng Chua
    Hui Xing Tan
    Scientific Reports, 13
  • [34] A deep learning approach for anomaly detection based on SAE and LSTM in mechanical equipment
    Zhe Li
    Jingyue Li
    Yi Wang
    Kesheng Wang
    The International Journal of Advanced Manufacturing Technology, 2019, 103 : 499 - 510
  • [35] Unsupervised learning in LSTM recurrent neural networks
    Klapper-Rybicka, M
    Schraudolph, NN
    Schmidhuber, J
    ARTIFICIAL NEURAL NETWORKS-ICANN 2001, PROCEEDINGS, 2001, 2130 : 684 - 691
  • [36] Learning precise timing with LSTM recurrent networks
    Gers, FA
    Schraudolph, NN
    Schmidhuber, J
    JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (01) : 115 - 143
  • [37] A hybrid GRU and LSTM-based deep learning approach for multiclass structural damage identification using dynamic acceleration data
    Das, Tanmay
    Guchhait, Shyamal
    ENGINEERING FAILURE ANALYSIS, 2025, 170
  • [38] A Deep LSTM Approach for Activity Recognition
    Guney, Selda
    Erdas, Cagatay Berke
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 294 - 297
  • [39] Economic LSTM Approach for Recurrent Neural Networks
    Khalil, Kasem
    Eldash, Omar
    Kumar, Ashok
    Bayoumi, Magdy
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2019, 66 (11) : 1885 - 1889
  • [40] Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
    Shan, Shawn
    Wenger, Emily
    Zhang, Jiayun
    Li, Huiying
    Zheng, Haitao
    Zhao, Ben Y.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1589 - 1604