Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning (2312.16715v1)

Published 27 Dec 2023 in cs.CR, cs.AI, cs.LG, cs.NI, and eess.SP

Abstract: Low-Power Wide-Area Network (LPWAN) technologies, such as LoRa, have gained significant attention for their ability to enable long-range, low-power communication for Internet of Things (IoT) applications. However, the security of LoRa networks remains a major concern, particularly in scenarios where device identification and classification of legitimate and spoofed signals are crucial. This paper studies a deep learning framework to address these challenges, considering LoRa device identification and legitimate vs. rogue LoRa device classification tasks. A deep neural network (DNN), either a convolutional neural network (CNN) or feedforward neural network (FNN), is trained for each task by utilizing real experimental I/Q data for LoRa signals, while rogue signals are generated by using kernel density estimation (KDE) of received signals by rogue devices. Fast Gradient Sign Method (FGSM)-based adversarial attacks are considered for LoRa signal classification tasks using deep learning models. The impact of these attacks is assessed on the performance of two tasks, namely device identification and legitimate vs. rogue device classification, by utilizing separate or common perturbations against these signal classification tasks. Results presented in this paper quantify the level of transferability of adversarial attacks on different LoRa signal classification tasks as a major vulnerability and highlight the need to make IoT applications robust to adversarial attacks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. M. Bor, J. Vidler, and U. Roedig, “LoRa for the internet of things,” in International Conference on Embedded Wireless Systems and Networks, 2016.
  2. R. S. Sinha, Y. Wei, and S.-H. Hwang, “A survey on LPWA technology: LoRa and NB-IoT,” Ict Express, vol. 3, no. 1, pp. 14–21, 2017.
  3. A. Zourmand, A. L. K. Hing, C. W. Hung, and M. AbdulRehman, “Internet of things (IoT) using LoRa technology,” in IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS), 2019.
  4. T. Sondrol, B. Jalaian, and N. Suri, “Investigating LoRa for the internet of battlefield things: A cyber perspective,” in IEEE Military Communications Conference (MILCOM), 2018.
  5. T. Erpek, T. J. O’Shea, Y. E. Sagduyu, Y. Shi, and T. C. Clancy, “Deep learning for wireless communications,” Development and Analysis of Deep Learning Architectures, pp. 223–266, 2020.
  6. N. E. West and T. O’shea, “Deep architectures for modulation recognition,” in IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), 2017.
  7. Y. Shi, K. Davaslioglu, Y. E. Sagduyu, W. C. Headley, M. Fowler, and G. Green, “Deep learning for RF signal classification in unknown and dynamic spectrum environments,” in IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), 2019.
  8. G. Shen, J. Zhang, A. Marshall, L. Peng, and X. Wang, “Radio frequency fingerprint identification for LoRa using deep learning,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 8, pp. 2604–2616, 2021.
  9. P. Robyns, E. Marin, W. Lamotte, P. Quax, D. Singelée, and B. Preneel, “Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning,” in ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017.
  10. A. Elmaghbub and B. Hamdaoui, “LoRa device fingerprinting in the wild: Disclosing RF data-driven fingerprint sensitivity to deployment variability,” IEEE Access, vol. 9, pp. 142 893–142 909, 2021.
  11. A. Al-Shawabka, P. Pietraski, S. B. Pattar, F. Restuccia, and T. Melodia, “DeepLoRa: Fingerprinting LoRa devices at scale through deep learning and data augmentation,” in International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2021.
  12. G. Shen, J. Zhang, A. Marshall, and J. R. Cavallaro, “Towards scalable and channel-robust radio frequency fingerprint identification for LoRa,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 774–787, 2022.
  13. A. Almohamad, M. Hasna, S. Althunibat, K. Tekbıyık, and K. Qaraqe, “A Deep Learning Model for LoRa Signals Classification Using Cyclostationay Features,” in International Conference on Information and Communication Technology Convergence (ICTC), 2021.
  14. E. Lo and J. Kohl, “Internet of Things (IoT) Discovery Using Deep Neural Networks,” in IEEE Winter Conference on Applications of Computer Vision (WACV), 2020.
  15. A. Jagannath and J. Jagannath, “Multi-task learning approach for automatic modulation and wireless signal classification,” in IEEE International Conference on Communications (ICC), 2021.
  16. Y. Shi, K. Davaslioglu, and Y. E. Sagduyu, “Generative adversarial network for wireless signal spoofing,” in ACM Workshop on Wireless Security and Machine Learning (WiseML), 2019.
  17. ——, “Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing,” IEEE Transactions on Cognitive Communications and Networking, vol. 7, no. 1, pp. 294–303, 2020.
  18. M. Sadeghi and E. G. Larsson, “Adversarial attacks on deep-learning based radio signal classification,” IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 213–216, 2018.
  19. B. Kim, Y. E. Sagduyu, K. Davaslioglu, T. Erpek, and S. Ulukus, “Channel-aware adversarial attacks against deep learning-based wireless signal classifiers,” IEEE Transactions on Wireless Communications, vol. 21, no. 6, pp. 3868–3880, 2021.
  20. D. Adesina, C.-C. Hsieh, Y. E. Sagduyu, and L. Qian, “Adversarial machine learning in wireless communications using RF data: A review,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 77–100, 2023.
  21. Y. E. Sagduyu, Y. Shi, T. Erpek, W. Headley, B. Flowers, G. Stantchev, and Z. Lu, “When wireless security meets machine learning: Motivation, challenges, and research directions,” arXiv preprint arXiv:2001.08883, 2020.
  22. I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” arXiv preprint arXiv:1412.6572, 2015.
  23. B. Kim, Y. E. Sagduyu, T. Erpek, K. Davaslioglu, and S. Ulukus, “Channel effects on surrogate models of adversarial attacks against wireless signal classifiers,” in IEEE International Conference on Communications (ICC), 2021.
  24. D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2017.
Citations (1)

Summary

We haven't generated a summary for this paper yet.