skip to main content
10.1145/3098243.3098267acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning

Published:18 July 2017Publication History

ABSTRACT

Physical-layer fingerprinting investigates how features extracted from radio signals can be used to uniquely identify devices. This paper proposes and analyses a novel methodology to fingerprint LoRa devices, which is inspired by recent advances in supervised machine learning and zero-shot image classification. Contrary to previous works, our methodology does not rely on localized and low-dimensional features, such as those extracted from the signal transient or preamble, but uses the entire signal. We have performed our experiments using 22 LoRa devices with 3 different chipsets. Our results show that identical chipsets can be distinguished with 59% to 99% accuracy per symbol, whereas chipsets from different vendors can be fingerprinted with 99% to 100% accuracy per symbol. The fingerprinting can be performed using only inexpensive commercial off-the-shelf software defined radios, and a low sample rate of 1 Msps. Finally, we release all datasets and code pertaining to these experiments to the public domain.

References

  1. Martin Abadi, Ashish Agarwal, and others. 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 (2016).Google ScholarGoogle Scholar
  2. Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proc. 14th Int. Conf. Mobile computing and networking. ACM, 116--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: a library for support vector machines. Trans. on Intelligent Systems and Technology (TIST) 2, 3 (2011), 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Boris Danev and Srdjan Capkun. 2009. Transient-based identification of wireless sensor nodes. In Proc. 2009 Int. Conf. on Information Processing in Sensor Networks. IEEE Computer Society, 25--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, and Thomas S. Benjamin. 2012. Towards practical identification of HF RFID devices. Trans. on Information and System Security (TISSEC) 15, 2, Article 7 (July 2012), 24 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Boris Danev, Thomas S. Heydt-Benjamin, and Srdjan Čapkun. 2009. Physical-layer Identification of RFID Devices. In Proc. 18th Conf. on USENIX Security Symposium (SSYM'09). USENIX Association, Berkeley, CA, USA, 199--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proc. 3rd Conf. on Wireless network security. ACM, 89--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Boris Danev, Davide Zanetti, and Srdjan Capkun. 2012. On physical-layer identification of wireless devices. Computing Surveys (CSUR) (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, and others. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise.. In Kdd, Vol. 96. 226--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, and Jizhong Zhao. 2016. Geneprint: generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Trans. on Networking 24, 2 (2016), 846--858. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Marti A. Hearst, Susan T Dumais, Edgar Osuna, John Platt, and Bernhard Scholkopf. 1998. Support vector machines. IEEE Intelligent Systems and their Applications 13, 4 (1998), 18--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems. 1097--1105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Christoph H Lampert, Hannes Nickisch, and Stefan Harmeling. 2014. Attribute-based classification for zero-shot visual object categorization. IEEE Trans. on Pattern Analysis and Machine Intelligence 36, 3 (2014), 453--465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hugo Larochelle, Dumitru Erhan, and Yoshua Bengio. 2008. Zero-data Learning of New Tasks. In Proc. 23rd Nat. Conf. on Artificial Intelligence. 646--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Yao Lu. 2015. Unsupervised Learning on Neural Network Outputs. CoRR abs/1506.00990 (2015).Google ScholarGoogle Scholar
  16. Aaron Van den Oord, Nal Kalchbrenner, and Koray Kavukcuoglu. 2016. Pixel Recurrent Neural Networks. In Proc. 33rd Int. Conf. on Machine Learning. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C David Page and Sriraam Natarajan. 2014. Encyclopedia of Machine Learning and Data Mining. 2 (2014), 1--24.Google ScholarGoogle Scholar
  18. F. Pedregosa, G. Varoquaux, and others. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Benjamin W. Ramsey, Stubbs, and others. 2015. Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers. Int. Journal of Critical Infrastructure Protection 8 (2015), 27--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Benjamin W Ramsey, Michael A Temple, and Barry E Mullins. 2012. PHY foundation for multi-factor ZigBee node authentication. In Global Communications Conference (GLOBECOM). IEEE, 795--800.Google ScholarGoogle ScholarCross RefCross Ref
  21. K. Bonne Rasmussen and S. Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks. In Proc. 3th. Int. Conf. Security and Privacy in Communications Networks and the Workshops - SecureComm. 331--340.Google ScholarGoogle Scholar
  22. Saeed Ur Rehman, Kevin Sowerby, and Colin Coghill. 2012. RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In Communications Theory Workshop (AusCTW), 2012 Australian. IEEE, 90--95.Google ScholarGoogle ScholarCross RefCross Ref
  23. KA Remley, CA Grosvenor, RT Johnk, DR Novotny, PD Hale, MD McKinley, A Karygiannis, and E Antonakakis. 2005. Electromagnetic signatures of WLAN cards and network security. In Proc. 5th IEEE Int. Symposium on Signal Processing and Information Technology. IEEE, 484--488.Google ScholarGoogle ScholarCross RefCross Ref
  24. Karen Simonyan, Sander Dieleman, Andrew Senior, and Alex Graves. 2016. WaveNet: A Generative Model for Raw Audio. (2016), 1--15.Google ScholarGoogle Scholar
  25. Richard Socher, Milind Ganjoo, Christopher D Manning, and Andrew Ng. 2013. Zero-shot learning through cross-modal transfer. In Advances in Neural Information Processing Systems. 935--943. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N Sornin, M Luis, T Eirich, T Kramp, and O Hersent. 2015. LoRaWAN™ Specifications. LoRa™ Alliance (2015).Google ScholarGoogle Scholar
  27. Christian Szegedy, Wei Liu, and others. 2015. Going deeper with convolutions. In Proc. IEEE Conf. on Computer Vision and Pattern Recognition. 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  28. Tien Dang Vo-Huu, Triet Dang Vo-Huu, and Guevara Noubir. 2016. Fingerprinting Wi-Fi Devices Using Software Defined Radios. In Proc. 9th Conf. Security & Privacy in Wireless and Mobile Networks. ACM, 3--14. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '17: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
        July 2017
        297 pages
        ISBN:9781450350846
        DOI:10.1145/3098243

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 July 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader