TechRxiv
2023_IEEE_OJCOMS_Initial.pdf (1.02 MB)

Assessing Adversarial Replay and Deep Learning-Driven Attacks on Specific Emitter Identification-based Security Approaches

Download (1.02 MB)
preprint
posted on 2023-06-08, 14:53 authored by Joshua Tyler, Mohamed Fadul, Matthew Hilling, Donald ReisingDonald Reising, Daniel Loveless

Specific Emitter Identification (SEI) detects, characterizes, and identifies emitters by exploiting distinct, inherent, and unintentional features present in their transmitted signals. Since its introduction a significant amount of work has been conducted; however, most assume the emitters are passive and that their identifying signal features are immutable and difficult to mimic. Suggesting the emitters are reluctant and incapable of developing and implementing effective SEI countermeasures; however, Deep Learning (DL) has been shown capable of learning emitter-specific features directly from their raw in-phase and quadrature signal samples and Software-Defined Radios (SDRs) are capable of manipulating them. Based on these capabilities, it is fair to question the ease at which an emitter can effectively mimic the SEI features of another or manipulate its own to hinder or defeat SEI. This work considers SEI mimicry using three signal features mimicking countermeasures; “off-the-self” DL; two SDRs of different sizes, weights, power, and cost (SWaP-C); handcrafted and DL-based SEI processes, and a “coffee shop” deployment. Our results show “off-the-shelf” DL algorithms and SDR enables SEI mimicry; however, adversary success is hindered by: (i) the use of decoy emitter signals, (ii) integration of a denoising autoencoder, and (iii) SDR SWaP-C constraints. 

History

Email Address of Submitting Author

donald-reising@utc.edu

ORCID of Submitting Author

0000-0002-9393-7104

Submitting Author's Institution

The University of Tennessee at Chattanooga

Submitting Author's Country

  • United States of America