Spoofing Attack Detection in the Physical Layer with Commutative Neural Networks

11/08/2022
by   Daniel Romero, et al.
0

In a spoofing attack, an attacker impersonates a legitimate user to access or tamper with data intended for or produced by the legitimate user. In wireless communication systems, these attacks may be detected by relying on features of the channel and transmitter radios. In this context, a popular approach is to exploit the dependence of the received signal strength (RSS) at multiple receivers or access points with respect to the spatial location of the transmitter. Existing schemes rely on long-term estimates, which makes it difficult to distinguish spoofing from movement of a legitimate user. This limitation is here addressed by means of a deep neural network that implicitly learns the distribution of pairs of short-term RSS vector estimates. The adopted network architecture imposes the invariance to permutations of the input (commutativity) that the decision problem exhibits. The merits of the proposed algorithm are corroborated on a data set that we collected.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/16/2020

Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing

The spoofing attack is critical to bypass physical-layer signal authenti...
research
11/01/2018

An Adaptive Pruning Algorithm for Spoofing Localisation Based on Tropical Geometry

The problem of spoofing attacks is increasingly relevant as digital syst...
research
05/03/2019

Generative Adversarial Network for Wireless Signal Spoofing

The paper presents a novel approach of spoofing wireless signals by usin...
research
01/12/2021

A Compact Deep Learning Model for Face Spoofing Detection

In recent years, face biometric security systems are rapidly increasing,...
research
10/16/2020

Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles

Global Navigation Satellite System (GNSS) provides Positioning, Navigati...
research
04/18/2018

Combating the Control Signal Spoofing Attack in UAV Systems

Unmanned aerial vehicle (UAV) system is vulnerable to the control signal...
research
01/27/2018

Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network

The Controller Area Network (CAN) bus serves as a legacy protocol for in...

Please sign up or login with your details

Forgot password? Click here to reset