Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes thanks: An IEEE-formatted version of this article is published in IEEE Network. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Bechir Hamdaoui and Abdurrahman Elmaghbub School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, Oregon, USA
{hamdaoui,elmaghba}@oregonstate.edu
Abstract

Deep-learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in the network operating environment still poses a major limitation. This paper presents an experimental framework that aims to study and overcome the sensitivity of LoRa-enabled device fingerprinting to such changes. We first begin by describing RF datasets we collected using our LoRa-enabled wireless device testbed. We then propose a new fingerprinting technique that exploits out-of-band distortion information caused by hardware impairments to increase the fingerprinting accuracy. Finally, we experimentally study and analyze the sensitivity of LoRa RF fingerprinting to various network setting changes. Our results show that fingerprinting does relatively well when the learning models are trained and tested under the same settings. However, when trained and tested under different settings, these models exhibit moderate sensitivity to channel condition changes and severe sensitivity to protocol configuration and receiver hardware changes when IQ data is used as input. However, with FFT data is used as input, they perform poorly under any change.

Device fingerprinting, LoRa datasets, deep learning, experimental study, hardware impairments.

I Introduction

LoRa (short for Long Range) wireless technology has become the de facto physical platform for a wide range of Internet of Things (IoT) networks and applications. In recent years, hundreds of IoT application developers have adopted LoRaWAN protocol, a wide-area network (WAN) protocol built on top of the LoRa physical layer as the solution for enabling long-range connectivity between IoT devices. Recent studies estimate that the global number of connected IoT devices, currently at 12.3 Billion, is projected to reach 27 Billion globally by 2025 [IoTAnalytics-21]. With the increased adoption of LoRa technology coupled with the growing numbers of connected IoT devices, there is undoubtedly an urgent need for efficient security mechanisms to protect such emerging LoRa-enabled devices and networks.

Physical-layer security approaches that are based on wireless RF (radio frequency) fingerprints have recently emerged as potential device identification solutions for automated monitoring of authorized IoT network access [abbas2021improving]. What distinguishes these fingerprinting solutions from higher-layer ones is the inability of attackers to replicate the fingerprints. As a result, they are foreseen to complement to conventional cryptographic security approaches to further protect networks against unauthorized access.

RF fingerprinting consists of extracting features from the received RF signals and using them to uniquely identify the transmitting devices [jian2020deep]. However, the feature selection process has, until recently, been performed manually, thus requiring RF signal domain expertise and many trial-and-error iterations to find the best feature set. Driven by the recent success of applying deep learning to image recognition and natural language processing [masone2021survey], attempts in using deep learning to solve wireless networking problems [elsayed2019ai], including device fingerprinting [hamdaoui2020deep], have also yielded promising results. Deep-learning-driven RF fingerprinting techniques can automatically process raw RF signals and extract the features without needing domain knowledge [cekic2020robust]. For instance, they can exploit the random distortions in the received RF signals that are caused by the device hardware impairments to extract signatures that are unique to the devices [sankhe2019oracle]. However, as the radio technology continues to advance, the variation in the impairments across different devices also continues to decrease, thereby resulting in a decrease in the distances between devices in the feature space. This decrease makes the task of device fingerprinting more challenging, as it becomes more sensitive even to the slightest changes in the wireless channel condition and/or the network deployment setting. For instance, in [al2020exposing], the authors attributed the sensitivity of deep learning models to channel overfitting, and concluded that equalizing I/Q (in-phase/quadrature) data can mitigate this problem. An artificial noise adding approach was proposed in [zhou2021robust] to increase the robustness of ZigBee device identification against channel variability. In [cekic2020wireless], the authors studied the location sensitivity and proposed augmentation and estimation strategies to promote generalization across time and location. These studies are critical to the deployment of RF fingerprinting techniques in real-world. However, they were limited to WiFi, ADS-B (automatic dependent surveillance-broadcast) and ZigBee data and focused on changes along the time and location dimensions only.

In this paper, we experimentally study the sensitivity of LoRa device fingerprinting to such changes, assess its ability to classify different LoRa IoT devices with identical hardware components, and propose an approach to improve its identification accuracy. More specifically, we:

  • Released massive RF datasets collected from LoRa devices that cover a number of indoor and outdoor scenarios, with varying deployment settings, including the experiment location and time, the LoRa protocol configuration, and the receiver hardware.

  • Presented a new technique that exploits out-of-band distortion information caused by hardware impairments to provide unique, device-specific signatures that are then leveraged to increase the fingerprinting accuracy.

  • Conducted an experimental study that discloses the sensitivity of deep-learning-based LoRa RF fingerprinting to various network deployment changes while considering two different data input representations of the sampled RF signals: time-domain IQ and frequency-domain FFT (fast Fourier transform).

Our results reveal that the fingerprinting techniques do relatively well when trained and tested under the same deployment settings, with FFT representation as input outperforming the IQ representation. However, if trained and tested under different settings, when IQ data is used as input to the learning models, these techniques show moderate sensitivity to channel condition variations and deep sensitivity to system setting variations such as changes in the LoRa protocol configuration and receiver hardware. However, when FFT data is used as input, they perform exceptionally poorly, regardless of the type of change.

The rest of the paper is organized as follows. Section II describes the testbed and the collected datasets. Section III explains the hardware impairments and highlights their impact on the out-of-band (OOB) spectrum emissions, and Section IV presents the proposed technique leveraging OOB emissions to increase fingerprinting accuracy. Section V presents result findings showing the vulnerability of RF fingerprinting to various changes in the network operating environment. Section VI discusses open challenges and future research directions. Lastly, Section VII concludes the article.

Ii Testbed and Dataset Collection

Ii-a LoRa Device Experimental Testbed

Experimental LoRa device testbed.
Fig. 1: Experimental LoRa device testbed.

Fig. 1 depicts our testbed, consisting of Pycom LoRa-enabled devices and Ettus USRP B receivers. USRP receivers used for signal sampling were configured at a center frequency of MHz and a sampling rate of MS/s. Each device was connected to a dedicated antenna and configured for Raw-LoRa mode transmissions with: KHz bandwidth, a spreading factor (SF) of , a preamble of , a TX power of dBm, and a coding rate of . We used MicroPython to program and configure the Pycom transmitter boards, and GNURadio software to configure the USRP B receivers to capture and preprocess LoRa transmissions and to store sampled data into files. PyCom devices were configured to transmit their data using the LoRa protocol. LoRa uses a tunable parameter, termed spreading factor (SF), to adjust the data rates and energy usage so at to compensate for signal strength degradation or power capacity limitation. SF ranges from 7 to 12, with higher values yielding longer ranges and lower data rates.

Ii-B Experimental Scenarios and RF Datasets

Our RF datasets, collected using the testbed described in Section II-A, provide both time-domain IQ samples and their corresponding FFT representations for multiple different scenarios, specifically designed to enable thorough assessment of fingerprinting approaches. In all scenarios, we consider a total bandwidth of MHz that covers in-band as well as an adjacent out-of-band spectrum of LoRa transmissions. The reason for choosing this bandwidth is explained in Section IV when we present our proposed technique. Recorded IQ and FTT data samples are stored into binary files in compliance with the Signal Metadata Format (SigMF), where a metadata file written in plaintext JSON (JavaScript object notation) is created for each binary file to include recording information such as sampling rate, recording time/day, carrier frequency, and other parameters. In this work, we use the following experimental scenarios (The complete RF datasets—with a more comprehensive scenario set, detailed description and downloading links—can found at [elmaghbub2021comprehensive]).

  • Different Days (Indoor and Outdoor) Scenario, with data collected over multiple consecutive days using the same receiver. For each day, each device generated ten s-long transmissions, separated one minute apart from each other. This multi-day scenario allows us to study the robustness of deep learning models when trained on data collected on one day but tested on data captured on a different day.

  • Different Locations (Indoor and Outdoor) Scenario, to study of how well the deep learning models perform when trained and tested on data captured in different locations. For this, we considered three different locations/environments—room, office, and outdoor, and captured LoRa transmissions at each of these locations, all taken on the same day using the same receiver. One s-long transmission is collected from each device at each location, with -minute duration separating the collections from the consecutive devices.

  • Different Configurations (Indoor) Scenario, to study the sensitivity of fingerprinting to LoRa configuration changes. Ideally, the learning models should still perform well even when tested using an SF configuration that is different from that used for training. To assess this, we collected data samples under: 
    Configuration 1: SF = 7; bit rate = 5470 bps 
    Configuration 2: SF = 8; bit rate = 3125 bps  
    Configuration 3: SF = 11; bit rate = 537 bps 
    Configuration 4: SF = 12; bit rate = 293 bps. 
    All four configurations have a transmit power of 20dBm, a bandwidth of 125KHz, and a coding rate of 4/5. For each configuration, one s-long transmission was collected from each device in an indoor setup. All experiments were taken on the same day using the same receiver.

  • Different Receivers (Indoor) Scenario, to assess the sensitivity of the learning models to changes in the receiver hardware. This is because receivers, like transmitters, also have hardware impairments that can impact the robustness of the learning models. For this, we collected data from the 25 Pycom transmitting devices with two identical USRP B receivers. For each receiver, one s-long transmission was captured from each transmitter in an indoor setup.

In all these experiments, in order to allow for the study of the impact of one parameter at time (e.g., time, location, configuration, and receiver), we chose a transmitter-receiver distance that can be fixed for all scenarios. Because was the maximum feasible distance in the indoor case, we set that distance to for all cases. Unless mentioned otherwise, SF is set to , which is the default value of LoRa protocol.

Iii Transmitter Hardware Impairments and Their Out-of-Band Spectrum Emissions

Hardware imperfections originated during manufacturing of the various hardware components of the transmitter, such as the local oscillator (LO), power amplifier (PA), and mixer, cause the characteristics of transmitted RF signals to deviate from their ideal values. This deviation creates unique fingerprints of the transmitting devices that can be exploited to identify them. Despite the engineering efforts aimed at minimizing these impairments, they cannot be removed completely, leading to some remaining distortions in the received RF signal that can still be exploited to serve as device fingerprints. For illustration, we use in this paper the phase noise impairment caused by the local oscillator’s imperfections to explain how such an impairment can be exploited for device fingerprinting. Detailed analysis of this, as well as other hardware impairments, can be found in [elmaghbub2020widescan].

Iii-a Phase Noise Caused by Local Oscillator

Typical direct conversion transmitters use quadrature mixer configuration to upconvert, at the carrier frequency , the in-phase and quadrature components of the baseband signal using two independent mixers, one used for the and one for the components. First, using the two mixers, the and components are each multiplied (separately and in parallel) with one of the two oscillating signals, one coming from the LO port and the other also coming from the LO port but shifted by 90°. The outputs of the two mixers are summed together to form the upconverted signal modulated at the carrier frequency . For an ideal LO, the periodic oscillating signal generated by the LO can be represented as a pure sinusoidal waveform , which preserves the original spectrum shape in the upconversion operation. For real scenarios, however, the time domain instability of the oscillating signals generated by real LOs causes random phase fluctuations in the signal, which results in a spectral expansion around the spectrum of the carrier signal. More formally, the oscillating signal generated by real LOs can be expressed as , where represents the phase noise, which results in a random rotation of the signal constellation observed at the receiver and thus incurs undesired out-of-band (OOB) emission.

Iii-B Out-of-Band Emissions Caused by Phase Noise

To illustrate this OOB emission, consider applying the Fourier transform to the output of an in-phase mixer, , which is the product of the in-phase baseband signal, , and the real LO signal, . Straightforward Fourier analysis shows that the phase noise term, , results in a bandwidth expansion beyond the original signal’s spectrum around the carrier frequency . This bandwidth expansion is originated from the convolution of the spectrum of the upconverted signal centered around and that of the phase noise (or precisely Fourier transform of ). We refer the readers to [elmaghbub2020widescan] for formal expressions of this Fourier analysis. The characteristics of LO-originated spectrum regrowth depend on the magnitude of the LO’s phase noise, which varies from one device to another, and therefore, different devices will exhibit different OOB distortions. This can be seen in Fig. 2, in which we plotted the spectra of one LoRa transmission from one of the Pycom devices (Device 1) and two distorted variations of the same signal with phase noise magnitude equaling to (Device 2) and (Device 3). The figure clearly shows that the OOB spectrum shapes of Device 2 and Device 3 are different from one another and from that of Device 1. As shown later, our technique exploits these OOB frequency features generated by the phase noises and other hardware impairments to enhance device fingerprinting accuracy.

Normalized 1MHz spectra of a LoRa signal (Device 1) and two variants of the same signal distorted with two phase noise magnitudes, 0.2 (Device 2) and 0.4 (Device 3).
Fig. 2: Normalized 1MHz spectra of a LoRa signal (Device 1) and two variants of the same signal distorted with two phase noise magnitudes, 0.2 (Device 2) and 0.4 (Device 3).

Iv Exploiting Out-of-Band Emission Information for Distinctive Device Fingerprints

In the previous section, we showed how hardware impairments cause out-of-band (OOB) emissions in the spectrum surrounding the in-band region that exhibit distinctive device features. In this section, we propose to leverage these distinctive features to enhance device fingerprinting accuracy. The extraction of such features from the surrounding spectrum could be achieved via oversampling or extending the filtered band to include the OOB spectral region. The novelty of the proposed technique lies therefore in the fact that the OOB distortions caused by hardware impairments are unique to the transmitting devices, thereby providing signatures that can be used to uniquely identify them. The proposed fingerprinting technique (i) is resilient against feature cloning and modification since it inherently relies on hardware-driven features that are too difficult to temper with, (ii) does not impose changes on the transmitters, and (iii) incurs little processing at the receiver side that can be done with existing radio technology.

Iv-a Classification Accuracy

To assess the effectiveness of the proposed technique, we implemented a Convolutional Neural Network (CNN) model (see Section V-A for detail) and evaluated the classification accuracy, obtained under each of the proposed (in-band and OOB) and conventional (in-band only) techniques, using our RF datasets described in Section II-B. Fig. 3 shows the average testing accuracy achieved under both techniques for the Indoor and Outdoor setups while considering both domain-time IQ and frequency-domain FFT representations as an input to the learning models. First, note that when the FFT is used as the input to the learning models, the proposed (in-band and OOB) approach achieves a much higher accuracy compared to the conventional approach. More specifically, in both indoor and outdoor scenarios, the proposed approach achieves an accuracy of about whereas that achieved under the conventional one is only about . This increase in the accuracy is due to the fact that the proposed technique extracts its features from both the signal’s in-band spectrum and the adjacent spectrum, thereby capturing out-of-band distortion information caused by the hardware impairments as explained in Section III. Second, observe that the proposed approach does slightly better than the conventional approach only in the indoor setting when IQ is used as the input to the learning models. More detail on the evaluation setup and learning model architecture is provided in Section V.

Iv-B Computation Cost

System complexity and training time are other essential metrics when proposing authentication techniques as they impact the speed of the process and challenge the scalability. Our proposed technique does not incur additional computational costs at the transmitters, and instead, it only requires a slightly higher sampling rate at the receiver side, which is feasible without a considerable overhead due to the advances in the sampling capabilities of radio technologies. Furthermore, compared to the in-band only approach, our technique does not result in an increase in the training time, nor does involve more model parameters.

Conventional (in-band only) versus proposed (in-band and OOB) under both Indoor and Outdoor Scenarios.
Fig. 3: Conventional (in-band only) versus proposed (in-band and OOB) under both Indoor and Outdoor Scenarios.

V Revealing LoRa Device Fingerprinting Sensitivity: Experimental Results

Sensitivity to changes in channel conditions due to temporal and spatial variability. USRP Receiver 1 is used for data sampling and collection, and LoRa protocol configuration is set to Config 1 (SF=7). Loc 1 is an indoor/room environment, Loc 2 is an outdoor environment, and Loc 3 is indoor/office environment.
Fig. 4: Sensitivity to changes in channel conditions due to temporal and spatial variability. USRP Receiver 1 is used for data sampling and collection, and LoRa protocol configuration is set to Config 1 (SF=7). Loc 1 is an indoor/room environment, Loc 2 is an outdoor environment, and Loc 3 is indoor/office environment.

In this section, we present experimental results to disclose and understand the performance sensitivity of LoRa device fingerprinting and classification to network deployment and channel condition variability. Throughout this section, we only study the proposed technique that we discussed in Section IV.

V-a CNN Architecture and Parameters

Deep CNNs have been the most commonly used architectures in deep-learning-based RF fingerprinting with the state of the art performances. And hence, CNNs have been perceived as the appropriate candidate for showing the advantage of our technique. For our evaluation, we employ a CNN model similar to the one used in [liu2017deep], where the data input, represented as 2-dimensional (one for real, one for imaginary) tensor, is fed to the first convolution layer of the CNN. This first layer has sixteen x filters, each learning I and Q time variations, all generating distinct feature maps (with the exception of the last convolution layer whose filters are of size x generating features for both I and Q at the same time). After each (except the last) convolution layer there is a Batch Normalization layer, a Leaky Rectified Linear Unit activation, and a Maximum Pooling layer of [ ] stride and x size. The last convolution layer is followed by a x Average Pooling layer whose output is fed an input to -neuron Fully Connected layer, which is then followed by another activation layer and dropout layer (dropout rate = ). The output of the Fully Connected layer is fed at last to the classifier layer. The probabilities of each input frame is produced by a Softmax classifier employed at the last layer of the CNN.

Stochastic Gradient Descent is used to update the CNN weights. The momentum optimizer of the gradient descent has an initial learning rate, rate drop factor, rate drop period, and a L2-regularization value of , , , and , respectively. The categorical cross-entropy is used as the loss function and the back-propagation method is used to minimize the prediction error. We used MATLAB’s Deep Learning Toolbox to implement the CNN model, and run the classifier using our collected datasets (with for training, for validation, and for testing) on a computing cluster containing 6 Nvidia dgx2 nodes with 16 V100 GPUs. For CNN’s input data, we used a sliding window of size samples with stride size that is equal to the window size.

V-B Input Data Representation

We study the use of two different representations of the data input to the learning model: raw time-domain IQ data and its frequency-domain FFT representation.

V-B1 IQ Representation

IQ representation frames are generated by first creating fixed-size 1D complex-valued vectors, whose real and imaginary parts correspond to the I (in-phase) and Q (quadrature) components, and then converting these 1D complex-valued vectors into two 1D real-valued vectors, , with each dimension carrying the I and Q samples.

V-B2 FFT Representation

This provides the spectral components of the sampled signal to reveal its frequency features, thus capturing the spectrum artifacts generated by the various hardware impairments. FFT representation frames are generated by first converting the time-domain signal samples into frequency domain using MATLAB’s fft function. Then the resulted 1D complex-valued vectors is converted into two 1D real-valued vectors, one carrying the real part and one carrying the imaginary part.

Sensitivity to changes in LoRa SF configuration and USRP receiver hardware. All experiments are conducted during the same day at the same location, Loc 1 (indoor/room).
Fig. 5: Sensitivity to changes in LoRa SF configuration and USRP receiver hardware. All experiments are conducted during the same day at the same location, Loc 1 (indoor/room).

V-C Sensitivity of Fingerprinting Accuracy to Wireless Channel Condition Variability

Fig. 4 shows the fingerprinting accuracy behavior observed when the deep learning models are trained and tested under same/different channel conditions while considering both IQ and FFT representations as input to the models. Fig. 4(a) reveals the accuracy when training and testing are done using the same channel conditions; i.e., the training and testing data is collected during the same time at the same location, Loc 1, which is an Indoor (room) environment. Figs. 4(b) and 4(c) show the accuracy achieved when the channel conditions used during training are different from those used during testing, due to temporal (Fig. 4(b)) or spacial (Fig. 4(c)) variations. The results shown in Fig. 4(b) are based on the Different Days Scenario (Indoor) datasets, and those shown in Fig. 4(c) are based on the Different Locations Scenario datasets, all described in Section II-B. Similar results were obtained for the Outdoor scenarios, but omitted here due to space limitation.

We begin by looking at the results depicted in Fig. 4(a), when the channel conditions used for training and testing are the same. First, observe that the achieved accuracy is consistent throughout each of the 4 studied days. Second, observe that the FFT data representation achieves an accuracy of about higher than that achieved under the IQ representation.

Now when the training and testing are done under different channel conditions, whether due to time change (Fig. 4(b)) or due to location change (Fig. 4(c)), the accuracy drops substantially for both types of input representation, IQ and FFT. Our findings are consistent with previous studies, indicating that the learning models tend to latch into channel-related as opposed to device-related features, making them unable to maintain their high accuracy under channel condition changes.

Another interesting observation we make is that when training and testing are performed under different channels, FFT performs worse than IQ, regardless of whether the channel condition variation occurs due to a temporal or a spatial change. In both types of change, the accuracy drops from about to about under IQ but from about to about under FFT. Our conclusion is that the learning models seem to be more resilient to channel condition changes when using time-domain IQ representation as its input as opposed to using the frequency-domain FFT representation. This suggests that the impact of channel impairment variations is more profound in the frequency domain than in the time domain.

V-D Sensitivity of Fingerprinting Accuracy to System Setting Variability

Fig. 5 shows the accuracy when the training and testing are performed while keeping the same wireless channel conditions (same time and same location) but varying the LoRa protocol configuration and/or the receiver hardware. Specifically, it presents the fingerprinting accuracy behavior when training and testing are done under: same LoRa configuration and same receiver hardware (Fig. 5(a)), different LoRa configuration but same receiver hardware (Fig. 5(b)), and same LoRa configuration but different receiver hardware (Fig. 5(c)). For this experiment, we consider the four different LoRa configurations described in Section II-B and two identical USRP B receivers: Rec 1 and Rec 2. Recall that, as discussed in Section II-B, changing the spreading factor (SF) of LoRa modulation changes the data rate, reception sensitivity, and power consumption, which in turn results in a change of the shape of the spectrum. Fig. 6 shows spectrum shapes of the four LoRa configurations considered in our datasets, which are described in Section II-B. Note the difference in the spectrum shape observed under each of the four LoRa configurations.

Spectrum visualization of 4 LoRa configurations: Conf1, Conf2, Conf3 and Conf4 correspond to SF=7, SF=8, SF=11 and SF=12, respectively.
Fig. 6: Spectrum visualization of 4 LoRa configurations: Conf1, Conf2, Conf3 and Conf4 correspond to SF=7, SF=8, SF=11 and SF=12, respectively.

From Fig. 5(a), we first observe that FFT input representation consistently outperforms IQ representation when same configuration is used during training and testing. Also, we observe that for the IQ case, the higher the spreading factor, the higher the degradation in the accuracy. Now surprisingly, as can clearly be seen from Fig. 5(b), the learning models perform very poorly, under both IQ and FFT input representations, when tested and trained using different SF configurations, even when data capturing is done during the same time and at the same location. The figure shows that the testing accuracy decreases significantly to about (what random guesses achieve) when configuration 1 is used for training while configuration 2, 3 or 4 is used for testing, and this is regardless of whether FFT or IQ is used for data input.

Fig. 5(c), showing the accuracy behavior when using a receiver during testing that is different from that used during training, allows us to assess the impact of the receiver’s impairments on the performance. This is done by using two identical USRP B receivers (Rec 1 and Rec 2) that capture the transmissions of the devices at the same location (indoor/room), using the same LoRa configuration, and during the same time. This set of results is obtained based on the RF datasets presented in the Different Receivers Scenario, explained in Section II-B. Like in the case of changes occurring in the LoRa configuration, Fig. 5(c) shows that the accuracy drops significantly when training and testing are done on different receivers, with a lesser severity in the case of IQ representation; this is true for both: train on Rec1 / test on Rec2 and train on Rec2 / test on Rec1.

We conclude that unlike when changes occur in the channel conditions, the learning models completely lose their ability to classify devices when changes occur in the LoRa configuration and/or the receiver hardware, implying that changes in the system setting yield drastic changes in the data distribution, severely crippling fingerprinting performances.

Vi Open Issues and Future Directions

We next highlight a few key open challenges that require further investigation:

  • We view the randomness and unpredictability of the wireless channel as one of the main obstacles that hinder the real-world deployment of data-driven RF fingerprinting techniques. Deep-learning-based RF fingerprinting approaches are still not robust to distribution shifts due to changes in the network deployment environment. The real-world applicability of these techniques is at stake as long as the robustness issue is not fundamentally solved.

  • We believe that gaining some transparency into what these deep learning-based models actually learn and then being able to encourage them to latch onto the hardware-specific (the real signature), not time-variant nor channel-related RF features, would significantly increase the robustness of existing deep learning models.

  • So far, most research efforts have focused on fingerprinting and classifying known devices in a closed set scenario. Shifting the RF fingerprinting problem into the ’open set’ classification realm would be crucial in promoting and accelerating the adoption of these techniques in the real world. Semi-Supervised learning and meta-learning have the potential to play a critical role in this transformation.

  • Lastly, the overall security of machine learning models is another vital issue that has gained a lot of interest recently. Adversarial poisoning attacks, for example, can impact the prediction functionality of deep-learning-based techniques. Therefore, the robustness of deep-learning-based RF fingerprinting models against Adversarial and other attacks should be given special attention in the near future [lalouani2021countering].

Vii Conclusion

This paper presents an experimental framework that investigates the robustness of deep-learning-based RF fingerprinting of LoRa-enabled devices against changes in the network deployment environment. We propose a new fingerprinting technique that exploits out-of-band distortion information caused by hardware impairments to provide device-specific signatures that can be used to enhance fingerprinting performances. Using LoRa RF datasets, we show that the deep learning models perform relatively well when trained and tested under the same network deployment settings, but poorly when trained and tested under different settings.

Viii Acknowledgement

This research is supported in part by the National Science Foundation and Intel under Award No. 2003273. We would like to thank Intel researchers, Dr. Kathiravetpillai Sivanesan, Dr. Lily Yang, Dr. Richard Dorrance, and Dr. Vesh Raj Sharma Banjade, for their constructive feedback.

References

Bechir Hamdaoui is a professor in the School of EECS at Oregon State University. His research interests are in the general areas of networked systems, wireless & network security, and computer networks. He currently serves as the Chair for the IEEE Communication Society (ComSoc)’s Wireless Communications Technical Committee (WTC).

Abdurrahman Elmaghbub received the B.S. (2019) and M.S. (2021) degrees in ECE from Oregon State University, where he is currently pursuing his Ph.D. degree. His research interests include wireless communication and networking, with a current focus on applying deep learning to wireless device classification.