Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval

11/04/2021
by   Samurdhi Karunaratne, et al.
0

As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excellent outlier detection accuracies when trained and tested on a fixed authorized transmitter set. However in a real-life deployment, a need may arise for transmitters to be added and removed as the authorized set of transmitters changes. In such cases, the system could experience long down-times, as retraining the underlying deep learning model is often a time-consuming process. In this paper, we draw inspiration from information retrieval to address this problem: by utilizing feature vectors as RF fingerprints, we first demonstrate that training could be simplified to indexing those feature vectors into a database using locality sensitive hashing (LSH). Then we show that approximate nearest neighbor search could be performed on the database to perform transmitter authorization that matches the accuracy of deep learning models, while allowing for more than 100x faster retraining. Furthermore, dimensionality reduction techniques are used on the feature vectors to show that the authorization latency of our technique could be reduced to approach that of traditional deep learning-based systems.

READ FULL TEXT

page 1

page 5

research
03/06/2023

Keep It Simple: CNN Model Complexity Studies for Interference Classification Tasks

The growing number of devices using the wireless spectrum makes it impor...
research
10/02/2018

Cloud Chaser: Real Time Deep Learning Computer Vision on Low Computing Power Devices

Internet of Things(IoT) devices, mobile phones, and robotic systems are ...
research
05/31/2019

IoT Network Security from the Perspective of Adversarial Deep Learning

Machine learning finds rich applications in Internet of Things (IoT) net...
research
10/17/2021

Low-Precision Quantization for Efficient Nearest Neighbor Search

Fast k-Nearest Neighbor search over real-valued vector spaces (KNN) is a...
research
05/20/2019

A Bi-Directional Co-Design Approach to Enable Deep Learning on IoT Devices

Developing deep learning models for resource-constrained Internet-of-Thi...
research
05/11/2021

Towards a Model for LSH

As data volumes continue to grow, clustering and outlier detection algor...
research
05/09/2023

The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time

The performance of Radio Frequency (RF) fingerprinting techniques is neg...

Please sign up or login with your details

Forgot password? Click here to reset