A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data
Abstract
:1. State-of-The-Art-Review and Paper Contributions
- Offering a thorough survey of RFF methods applied with GNSS and non-GNSS wireless data in the literature, and discussing which of these RFF methods have potential in GNSS, and in particular in GNSS with pre-correlation data. Finding good anti-spoofing methods based on pre-correlation GNSS data could have tremendous benefits for the future GNSS receivers, by being able to detect and remove non-genuine signals even before processing them further in the acquisition and tracking loops. Our survey is unique in the current literature, as the RFF methods for GNSS have to date not been widely investigated and there is a current lack of unified surveys on this;
- Proposing a step-by-step problem definition of RFF in the context of GNSS signals, by delving in depth in the sources of possible transmitter hardware impairments, and also discussing the possible channel and receiver–hardware impairments; this problem decomposition into feature-by-feature investigation is also lacking from the current GNSS literature, to the best of our knowledge;
- Proposing a four-step generic RFF approach, consisting of: feature identification, feature extraction, data pre-processing, and data classification. Classical ML and transforms methods are used in this four-step methodology, but the four-step block diagram is rather novel;
- Presenting the mathematical models of different GNSS transmitter features, with a particular emphasis of five main identified features, namely: the power amplifier non-linearities, the digital-to-analog converters’ non-linearities, the phase noises of the local oscillators, the I/Q imbalances, and the band-pass filtering at the edge of the transmitter front-end; unified mathematical methods of the transmitter HW impairments are not found in the current literature to the best of the authors’ knowledge;
- Providing the equivalent transmitter block diagrams for GNSS and spoofers by incorporating the aforementioned five hardware effects into the models;
- Presenting an illustrative simulation-based analysis based under ideal conditions in order to emphasize the impact of each HW feature on the RFF performance. Three feature extractors to identify the transmitter HW impairments were used, namely the kurtosis, the Teager–Kaiser energy operator (TKEO), and the spectrogram. The classification accuracies given as examples are based on support vector machines (SVM). Such a simplified analysis allows us to identify the strongest features among the five considered ones and to point out the remaining challenges to overcome to achieve the feasibility of RFF methods under more realistic GNSS scenarios;
- Bringing in a qualitative discussion on the existing algorithms and providing a roadmap towards further research on RFF in GNSS for interference detection and classification.
2. Problem Definition and Use-Case Example
- Simplistic spoofing attacks, such as those generated by a software defined radio (SDR) GNSS generator connected to an antenna. In this type of attack, the GNSS transmitter is not synchronized to the genuine GNSS satellites, which means that there are typically jumps in the carrier-to-noise ratios (CNR) and Doppler shifts measured at the receiver and such spoofing attacks can be identified in the pseudorange domain via various consistency checks algorithms, such as those described in [27,28,29];
- Intermediate spoofing attacks [30,31]: these are more complex than the simplistic attacks as they combine a GNSS generator with a GNSS receiver and are able to align the code-phase and synchronize the frequency with the signal transmitted from a genuine GNSS satellite in the sky. A replay attack or a meaconing attack with a single receiver (when the signal from a genuine GNSS satellite is captured and re-sent with a delay) is an example of such an intermediate spoofing attack;
- Sophisticated spoofing attacks [32]: these are the most complex spoofing attacks to mitigate, as they are an extension of the intermediate spoofing attack, where the signals received from multiple GNSS antennas (sometimes placed at different locations) are modified (e.g., through random delays and Doppler shifts) and re-transmitted in a combined manner, in such a way that the receiver is duped to believe the signals are obtained from various genuine satellites.
- Pre-correlation link-level methods relying on signal samples before the acquisition stage, i.e., on I/Q data. This is the case addressed in this paper. Such pre-correlation anti-spoofing methods are still very rare in the literature;
- Identification of relevant features—this step refers to first identifying the different RF ‘features’ created by the inherent hardware impairments in any transmitter. Several such features will be subsequently described in Section 3;
- Feature-extraction transform—this steps refers to choosing a suitable feature-extraction transform to emphasize the selected features from the previous step. Several feature-extraction transforms are addressed in Section 5;
- Data pre-processing stage—this step refers to choosing the most suitable format of saving the data at the output of the feature-extraction transform, namely as time-stamped vector data, in matrix form, as an image of certain size and number of pixels, etc. The data format selection will be influenced by the algorithms selected in the feature-classification step, as subsequently described in Section 6, as well as by the data type at the output of the feature-extraction step. For example, spectrogram-type data are also easily stored in image form, while transforms such as kurtosis or Teager–Kaiser are more suitable to be stored in a vector format;
- Feature classification—this step refers to applying a selected classification methods, such as based on analytically-derived thresholds or on machine learning algorithms when training data are available, and classifying the received signal into ‘genuine’ versus ‘non-genuine/spoofer’ classes. Several feature classification approaches are discussed in Section 6. A qualitative discussion is then provided in Section 9.
3. Transmitter Hardware Impairments or ‘RF Features’ Overview
- Phase noise (PN): PN is unavoidable in any wireless transmitter, as it is introduced by the transmitter clock instabilities; atomic clocks on-board genuine GNSS transmitters are intuitively expected to have lower phase noise than the clock of spoofers and other malicious transmitters [36,37,38]. PN models are discussed in Section 3.1;
- Power amplifier (PA) non-linearities: non-linearities close to the saturation region for PAs (and especially for high-power amplification needs as it is the case of GNSS transmitters) can represent an important HW feature to distinguish between different transmitters. In addition to non-linearities, possible memory effects of the PA can also create differentiating features at the transmitter. PA models are discussed in Section 3.2;
- I/Q imbalance: the I/Q imbalance in a transmitter is introduced in the translation of the baseband signals to passband signals due to the facts that the phase shift is not perfectly at in the analogue domain and that the analogue gain is not perfectly matched for I and Q components. I/Q imbalance models are discussed in Section 3.3;
- Digital-to-analog converter (DAC) non-linearity: signal distortions are also possibly produced by the non-linear DAC operation at each transmitter. DAC models are discussed in Section 3.4;
- Band-pass filter (BPF) passband and out-of-band ripples: the transmitter BPF filter also puts its ‘fingerprint’ on the transmitted signal and can act as a smoother of the other HW features. BPF models are discussed in Section 3.5.
3.1. PN Models
3.2. PA Non-Linearity Models
3.3. I/Q Imbalance Models
3.4. DAC Models
3.5. BPF Models
4. Equivalent Block Diagrams for GNSS and Spoofing Signals
4.1. Equivalent Transmitter Block Diagrams
4.2. Equivalent Block Diagram of the Full Transmitter-Channel-Receiver Chain
5. RF Feature Extractors
5.1. Error Vector Magnitude (EVM)
5.2. Kurtosis
5.3. Teager–Kaiser Energy Operator (TKEO)
5.4. I/Q Data Spectrograms and Other Short-Time-Short-Frequency (STSF) Transforms
5.5. Wavelet Transforms
6. RF Feature Classifiers
6.1. Threshold-Based Classification
6.2. ML-Based Classification
6.2.1. kNN Classifier
6.2.2. SVM Classifier
- Linear kernel: ;
- Polynomial kernel: , d is the exponent;
- Sigmoid kernel: , and ;
- Gaussian kernel (also known as an rbf kernel): .
6.2.3. CNN Classifier
- The convolutional layer applies a convolution operation between the input signal matrix and a filter (or kernel) (the input signals here are the signals that come to the convolutional layer; the input does not necessarily mean the input data to the beginning of neural networks). For example, Figure 16 considers a ‘input’ and a filter, the red rectangle selects the same size of data as the filter, then the selected data have a convolution operation with the filter. The red rectangle moves after each convolution operation until all the ‘input’ data experience the convolution operation with the filter.
- The pooling layer will reduce the number of parameters; it is essentially a sampling method. The common pooling methods are max pooling, average pooling, and sum pooling. Here, we provide an example of max pooling in Figure 17. Max pooling: it chooses the largest number in the selected data.
- The fully connected layer is the actual neural network, by using the activation function, such as the sigmoid (or logistic function), we are able to label the outputs. A common fully connected layer is made of three parts, the input layer, the hidden layer(s) (also refers to neurons), and the output layer. Figure 18 gives an example of a fully connected neural network. The fully connected neural network can be composed of multiple layers of fully connected neurons. Each layer can be followed by an activation function, such as a relu, sigmoid, or logistic function. The output layer, the last layer of the neural network, commonly uses a sigmoid activation function to assign the probability to each possible class. Figure 18 gives an example of a fully connected neural network.
6.2.4. Other Approaches
7. Simulation-Based Example and Feature Down Selection
8. Comparative Summary of Pre-Correlation RFF Methods in Existing Literature
9. Qualitative Discussion and Open Challenges
10. Conclusions and Roadmap Ahead
- Addressing the impact of the signal mixtures from signals from various satellites and various frequency bands: typically, the received signal is a mixture of all satellites visible in the sky at the considered moment, and possibly, of one or several spoofing signals. One approach to look at a single signal at a time would be to first despread each signal from each identified pseudo-random code, and then apply successive or parallel interference cancellation methods to identify each signal, one by one. The errors in the estimation of the signals from various satellites would, of course, affect the quality of the re-constructed signal, and possibly, the accuracy of the RFF-based classification. Another approach would be to create huge training databases with all possible mixtures of satellites in the sky and to use those databases in the classification process;
- Evaluating and mitigating the impact of channel multipath and fading effects: each wireless channel (from satellite or spoofer) has its own random signature, determined by the multipath delays, Doppler spreads, and fading effects. As these effects are random in nature, they will, most likely, not provide additional ‘features’, but will have a negative impact on the strength of the transmitter features. The effect of the wireless channels upon the RFF algorithms can be further investigated via simulation- or measurement-based approaches and it remains a topic of future investigation;
- Understanding the impact of the receiver HW features upon the RFF methods: while the same receiver is capturing either genuine GNSS signals or a mixture of genuine signals and spoofer(s), and thus the same receiver effects are present in both situations (spoofer present or spoofer absent), the receiver also has local oscillators, ADC and filter blocks, etc., and each of them can introduce additional phase noises, non-linearities and I/Q imbalances. Intuitively, such effects will have a negative impact upon the classification accuracy compared to an ideal receiver (without any HW imperfections), but such effects need to be further analysed based on measurements or simulated data.
- Dealing with the negative impact of high noise levels on RFF performance, especially when dealing with low-power signals such as those in the pre-correlation domain: GNSS signals in urban scenarios, such as GNSS receivers on-board of drones flying through tall buildings, can be received at relatively low CNRs, and these low CNRs are likely to act as smoothers of the transmitter features, to the point of fading them out. It remains an open research question what the CNR threshold is above which the RFF methods with pre-correlation GNSS samples are likely to work;
- Validating through real-field measurements the promising RFF performance for authenticating GNSS signals.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
ADC | Analog-to-Digital Converter |
AGC | Automatic Gain Control |
ANOVA | Analysis of Variance |
APSK | Amplitude and Phase Shift Keying (modulation) |
BLE | Bluetooth Low Energy |
BPF | Band-Pass filter |
BPSK | Binary Phase Shift Keying (modulation) |
CDMA | Code Division Multiple Access |
CNR | Carrier-to-Noise Ratio |
CNN | Convolutional Neural Networks |
CWT | Continuous Wavelet Transform |
DAC | Digital-to-Analog Converter |
DE | Dispersion Entropy |
DQPSK | Differential Quadrature Phase Shift Keying (modulation) |
DWT | Discrete Wavelet Transform |
ESA | European Space Agency |
ESTEC | European Space Research and Technology Centre |
GNSS | Global Navigation Satellite System |
GPS | Global Positioning System |
GLRT | Gaussian Likelihood Ratio Test |
FE | Front-End |
FIR | Finite Impulse Response |
GNSS | Global Navigation Satellite System |
GSM | Global System for Mobile Communications |
HHT | Hilbert–Huang Transform |
HW | Hardware |
IoT | Internet of Things |
I/Q | In-Phase /Quadrature |
LDA | Linear Discriminat Analysis |
LPA | Low Power Amplifier |
LO | Local Oscilator |
LRT | Likelihood Ratio Test |
LTE | Long-Term Evoloution |
MDA | Multiple Discriminant Analysis |
MSACN | Message Structure Aided Attentional Convolution Network |
OXCO | Oven Controlled Crystal Oscillator |
PA | Power Amplifier |
PCA | Principal Component Analysis |
PE | Permutation Entropy |
PN | Phase Noise |
PNN | Probabilistic Neural Networks |
PSD | Power Spectral Density |
QPSK | Quadrature Phase Shift Keying (modulation) |
RF | Radio Frequency |
RFF | Radio Frequency Fingerprinting |
SDR | Software Defined Radio |
SNR | Signal-to-Noise Ratio |
SVM | Support Vector Machines |
SW | Software |
TCXO | Temperature Controlled Crystal Oscillator |
TDMA | Time Division Multiple Access |
TKEO | Teager–Kaiser Energy Operator |
UAV | Unmanned Aerial Vehicles |
USRP | Universal Software Radio Peripheral |
UWB | Ultra Wide-Band |
References
- Rehman, S.; Sowerby, K.; Alam, S.; Ardekani, I. Radio frequency fingerprinting and its challenges. In Proceedings of the 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, USA, 29–31 October 2014; pp. 496–497. [Google Scholar] [CrossRef] [Green Version]
- Deng, S.; Huang, Z.; Wang, X.; Huang, G. Radio Frequency Fingerprint Extraction Based on Multidimension Permutation Entropy. Int. J. Antennas Propag. 2017, 2017, 1538728. [Google Scholar] [CrossRef] [Green Version]
- Morales-Ferre, R.; Wang, W.; Sanz-Abia, A.; Lohan, E.S. Identifying GNSS Signals Based on Their Radio Frequency (RF) Features—A Dataset with GNSS Raw Signals Based on Roof Antennas and Spectracom Generator. Data 2020, 5, 18. [Google Scholar] [CrossRef] [Green Version]
- Bassey, J.; Li, X.; Qian, L. Device Authentication Codes based on RF Fingerprinting using Deep Learning. arXiv 2020, arXiv:2004.08742. [Google Scholar]
- Wozmca, P.; Kulas, L. Influence of a radio frequency on RF fingerprinting accuracy based on ray tracing simulation. Eurocon 2013, 2013, 202–206. [Google Scholar] [CrossRef]
- Greenberg, E.; Levy, P. Propagation aspects for RF fingerprinting at open areas over irregular terrain. In Proceedings of the 2017 11th European Conference on Antennas and Propagation (EUCAP), Paris, France, 19–24 March 2017; pp. 3529–3533. [Google Scholar] [CrossRef]
- Kalayci, A.O.; Akdemİr, E. RF fingerprinting based indoor localization for uncooperative emitters. In Proceedings of the 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey, 2–5 May 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Khandker, S.; Torres-Sospedra, J.; Ristaniemi, T. Improving RF Fingerprinting Methods by Means of D2D Communication Protocol. Electronics 2019, 8, 97. [Google Scholar] [CrossRef] [Green Version]
- Rehman, S.U.; Sowerby, K.W.; Coghill, C. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. J. Comput. Syst. Sci. 2014, 80, 591–601. [Google Scholar] [CrossRef]
- Thoelert, S.; Steigenberger, P.; Montenbruck, O.; Meurer, M. GPS III Arrived–An Initial Analysis of Signal Payload and Achieved User Performance. In Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation, Miami, FL, USA, 16–19 September 2019; pp. 1059–1075. [Google Scholar] [CrossRef]
- Morales-Ferre, R.; Richter, P.; Falletti, E.; de la Fuente, A.; Lohan, E.S. A Survey on Coping With Intentional Interference in Satellite Navigation for Manned and Unmanned Aircraft. IEEE Commun. Surv. Tutor. 2020, 22, 249–291. [Google Scholar] [CrossRef]
- Rustamov, A.; Gogoi, N.; Minetto, A.; Dovis, F. Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices. In Proceedings of the 2020 International Conference on Localization and GNSS (ICL-GNSS), Tampere, Finland, 2–4 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Honkala, S.; Thombre, S.; Kirkko-Jaakkola, M.; Zelle, H.; Veerman, H.; Wallin, A.E.; Dierikx, E.F.; Kaasalainen, S.; Söderholm, S.; Kuusniemi, H. Performance of EGNSS-Based Timing in Various Threat Conditions. IEEE Trans. Instrum. Meas. 2020, 69, 2287–2299. [Google Scholar] [CrossRef]
- Issam, S.M.; Adnane, A.; Madiabdessalam, A. Anti-Jamming techniques for aviation GNSS-based navigation systems: Survey. In Proceedings of the 2020 IEEE 2nd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Kenitra, Morocco, 2–3 December 2020; pp. 1–4. [Google Scholar] [CrossRef]
- Nicola, M.; Falco, G.; Ferre, R.M.; Lohan, E.S.; de la Fuente, A.; Falletti, E. Collaborative Solutions for Interference Management in GNSS-Based Aircraft Navigation. Sensors 2020, 20, 4085. [Google Scholar] [CrossRef]
- Caparra, G. Authentication and Integrity Protection at Data and Physical Layer for Critical Infrastructures. 2017. Available online: paduaresearch.cab.unipd.it/9797/1/tesi_Gianluca_Caparra.pdf (accessed on 24 April 2021).
- Caparra, G.; Ceccato, S.; Laurenti, N.; Cramer, J. Feasibility and Limitations of Self-Spoofing Attacks on GNSS Signals with Message Authentication. In Proceedings of the 30th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+), Portland, OR, USA, 25–29 September 2017; pp. 3968–3984. [Google Scholar]
- Wu, Z.; Zhang, Y.; Yang, Y.; Liang, C.; Liu, R. Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey. IEEE Access 2020, 8, 165444–165496. [Google Scholar] [CrossRef]
- Psiaki, M.L.; Humphreys, T.E. GNSS Spoofing and Detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
- Schmidt, D.; Radke, K.; Camtepe, S.; Foo, E.; Ren, M. A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. ACM Comput. Surv. 2016, 48, 1–31. [Google Scholar] [CrossRef]
- Borio, D.; Gioia, C.; Canopons, E.; Baldini, G. Feature selection for GNSS receiver fingerprinting. InsideGNSS 2017, 17, 2120. [Google Scholar]
- Kuciapinski, K.S.; Temple, M.A.; Klein, R.W. ANOVA-based RF DNA analysis: Identifying significant parameters for device classification. In Proceedings of the 2010 International Conference on Wireless Information Networks and Systems (WINSYS), Athens, Greece, 26–28 July 2010; pp. 1–6. [Google Scholar]
- Danev, B.; Zanetti, D.; Capkun, S. On Physical-Layer Identification of Wireless Devices. ACM Comput. Surv. 2012, 45, 1–29. [Google Scholar] [CrossRef] [Green Version]
- Baldini, G.; Giuliani, R.; Steri, G.; Neisse, R. Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Baldini, G.; Gentile, C.; Giuliani, R.; Steri, G. Comparison of techniques for radiometric identification based on deep convolutional neural networks. Electron. Lett. 2019, 55, 90–92. [Google Scholar] [CrossRef]
- Fadul, M.K.M.; Reising, D.R.; Sartipi, M. Identification of OFDM-Based Radios Under Rayleigh Fading Using RF-DNA and Deep Learning. IEEE Access 2021, 9, 17100–17113. [Google Scholar] [CrossRef]
- Broumandan, A.; Lachapelle, G. Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation. Sensors 2018, 18, 1305. [Google Scholar] [CrossRef] [Green Version]
- Lo, S.; Chen, Y.H.; Jain, H.; Enge, P. Robust GNSS Spoof Detection using Direction of Arrival: Methods and Practice. In Proceedings of the 31st International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2018), Miami, FL, USA, 24–28 September 2018; pp. 2891–2906. [Google Scholar] [CrossRef]
- Nguyen, V.H.; Falco, G.; Falletti, E.; Nicola, M. A Dual Antenna GNSS Spoofing Detector Based on the Dispersion of Double Difference Measurements. In Proceedings of the 2018 9th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), Noordwijk, The Netherlands, 5–7 December 2018. [Google Scholar]
- Gao, Y.; Li, H.; Lu, M.; Feng, Z. Intermediate spoofing strategies and countermeasures. Tsinghua Sci. Technol. 2013, 18, 599–605. [Google Scholar] [CrossRef]
- Li, J.; Zhang, J.; Chang, S.; Zhou, M. Performance Evaluation of Multimodal Detection Method for GNSS Intermediate Spoofing. IEEE Access 2016, 4, 9459–9468. [Google Scholar] [CrossRef]
- Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M. Assessing the spoofing threat. GPS World 2018, 20, 28–38. [Google Scholar]
- Schmidt, E.; Gatsis, N.; Akopian, D. A GPS Spoofing Detection and Classification Correlator-Based Technique Using the LASSO. IEEE Trans. Aerosp. Electron. Syst. 2020, 56, 4224–4237. [Google Scholar] [CrossRef]
- Falletti, E.; Motella, B.; Gamba, M.T. Post-correlation signal analysis to detect spoofing attacks in GNSS receivers. In Proceedings of the 2016 24th European Signal Processing Conference (EUSIPCO), Budapest, Hungary, 29 August–2 September 2016; pp. 1048–1052. [Google Scholar] [CrossRef]
- Thombre, S.; Raasakka, J.; Hurskainen, H.; Nurmi, J.; Valkama, M.; Lohan, S. Local oscillator phase noise effects on phase angle component of GNSS code correlation. In Proceedings of the 2011 International Conference on Localization and GNSS (ICL-GNSS), Tampere, Finland, 29–30 June 2011; pp. 110–115. [Google Scholar] [CrossRef]
- Psiaki, M.L.; Powell, S.P.; O’hanlon, B.W. GNSS Spoofing Detection using High-Frequency Antenna Motion and Carrier-Phase Data. In Proceedings of the 26th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2013), Nashville, TN, USA, 16–20 September 2013; p. 29492991. [Google Scholar]
- Calero, D.; Fernandez, E. Characterization of Chip-Scale Atomic Clock for GNSS navigation solutions. In Proceedings of the 2015 International Association of Institutes of Navigation World Congress (IAIN), Prague, Czech Republic, 20–23 October 2015; pp. 1–8. [Google Scholar] [CrossRef]
- Fernandez, E.; Calero, D.; Pares, M.E. CSAC Characterization and Its Impact on GNSS Clock Augmentation Performance. Sensors 2017, 17, 370. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Giofre, R.; Colantonio, P.; González, L.; De Arriba, F.; Cabría, L.; Molina, D.L.; Garrido, E.C.; Vitobello, F. Design Realization and Tests of a Space-Borne GaN Solid State Power Amplifier for Second Generation Galileo Navigation System. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2383–2396. [Google Scholar] [CrossRef]
- Broumandan, A.; Jafarnia-Jahromi, A.; Lachapelle, G. Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solut. 2015, 19, 475–487. [Google Scholar] [CrossRef]
- Valkama, M.; Renfors, M.; Koivunen, V. Advanced methods for I/Q imbalance compensation in communication receivers. IEEE Trans. Signal Process. 2001, 49, 2335–2344. [Google Scholar] [CrossRef]
- Handel, P.; Zetterberg, P. Receiver I/Q Imbalance: Tone Test, Sensitivity Analysis, and the Universal Software Radio Peripheral. IEEE Trans. Instrum. Meas. 2010, 59, 704–714. [Google Scholar] [CrossRef]
- D’Apuzzo, M.; D’Arco, M.; Liccardo, A.; Vadursi, M. Modeling DAC Output Waveforms. IEEE Trans. Instrum. Meas. 2010, 59, 2854–2862. [Google Scholar] [CrossRef]
- Lei, Y.; Tan, J.; Guo, W.; Cui, J.; Liu, J. Time-Domain Evaluation Method for Clock Frequency Stability Based on Precise Point Positioning. IEEE Access 2019, 7, 132413–132422. [Google Scholar] [CrossRef]
- Chen, X.; Peng, C.; Huan, H.; Nian, F.; Yang, B. Measuring the Power Law Phase Noise of an RF Oscillator with a Novel Indirect Quantitative Scheme. Electronics 2019, 8, 767. [Google Scholar] [CrossRef] [Green Version]
- Gomez-Casco, D.; Lopez-Salcedo, J.A.; Seco-Granados, G. Generalized integration techniques for high-sensitivity GNSS receivers affected by oscillator phase noise. In Proceedings of the 2016 IEEE Statistical Signal Processing Workshop (SSP), Palma de Mallorca, Spain, 26–29 June 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Zhang, S.; Wang, X.; Wang, H.; Yang, J. From Allan variance to phase noise: A new conversion approach. In Proceedings of the EFTF-2010 24th European Frequency and Time Forum, Noordwijk, The Netherlands, 13–16 April 2010; pp. 1–8. [Google Scholar] [CrossRef]
- Majidi, M.; Mohammadi, A.; Abdipour, A. Analysis of the Power Amplifier Nonlinearity on the Power Allocation in Cognitive Radio Networks. IEEE Trans. Commun. 2014, 62, 467–477. [Google Scholar] [CrossRef]
- Schreurs, D.; O’Droma, M.; Goacher, A.A.; Gadringer, M. RF Power Amplifier Behavioral Modeling; Cambridge University Press: New York, NY, USA, 2008. [Google Scholar]
- Kim, J.; Konstantinou, K. Digital predistortion of wideband signals based on power amplifier model with memory. Electron. Lett. 2001, 37, 1417–1418. [Google Scholar] [CrossRef]
- OHB System AG- Galileo -European Satellite Navigation System (Space Segment). OHB Brochure. 2021. Available online: https://www.ohb-system.de/files/images/mediathek/downloads/190603_OHB-System_Galileo_FOC-Satellites_2019-05.pdf (accessed on 20 February 2021).
- National Instruments Corp. Global Synchronization and Clock Disciplining with NI USRP-293x Software Defined Radio. 2020. Available online: https://www.ni.com/fi-fi/innovations/white-papers/20/global-synchronization-and-clock-disciplining-with-ni-usrp-293x-.html (accessed on 24 April 2021).
- Rehman, S.U.; Sowerby, K.W.; Alam, S.; Ardekani, I.T.; Komosny, D. Effect of channel impairments on radiometric fingerprinting. In Proceedings of the 2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Abu Dhabi, United Arab Emirates, 7–10 December 2015; pp. 415–420. [Google Scholar] [CrossRef] [Green Version]
- Kennedy, I.O.; Kuzminskiy, A.M. RF Fingerprint detection in a wireless multipath channel. In Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, York, UK, 19–22 September 2010; pp. 820–823. [Google Scholar] [CrossRef]
- Zheng, T.; Sun, Z.; Ren, K. FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 199–207. [Google Scholar] [CrossRef] [Green Version]
- Tascioglu, S.; Kose, M.; Telatar, Z. Effect of sampling rate on transient based RF fingerprinting. In Proceedings of the 2017 10th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey, 30 November–2 December 2017; pp. 1156–1160. [Google Scholar]
- Ur Rehman, S.; Sowerby, K.; Coghill, C. RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In Proceedings of the 2012 Australian Communications Theory Workshop (AusCTW), Wellington, New Zealand, 30 January–2 February 2012; pp. 90–95. [Google Scholar] [CrossRef]
- Hamila, R.; Lohan, E.S.; Renfors, M. Subchip multipath delay estimation for downlink WCDMA system based on Teager-Kaiser operator. IEEE Commun. Lett. 2003, 7, 1–3. [Google Scholar] [CrossRef]
- Brihuega, A.; Anttila, L.; Abdelaziz, M.; Eriksson, T.; Tufvesson, F.; Valkama, M. Digital predistortion for multiuser hybrid MIMO at mmWaves. IEEE Trans. Signal Process. 2020, 68, 3603–3618. [Google Scholar] [CrossRef]
- Rasmussen, K.B.; Capkun, S. Implications of Radio Fingerprinting on the Security of Sensor Networks. In Proceedings of the 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops—SecureComm 2007, Nice, France, 17–21 September 2007. [Google Scholar]
- Gahlawat, S. Investigation of RF Fingerprinting Approaches in GNSS. Ph.D. Thesis, Tampere University, Tampere, Finland, 2020. [Google Scholar] [CrossRef]
- Hall, J.; Barbeau, M.; Kranakis, E. Detection Of Transient In Radio Frequency Fingerprinting Using Signal Phase. In Proceedings of the IASTED International Conference on Wireless and Optical Communications, Banff, AL, Canada, 14–16 July 2003. [Google Scholar]
- Gerdes, R.M.; Daniels, T.E.; Mina, M.; Russell, S.F. Device identification via analog signal fingerprinting: A matched filter approach. In Proceedings of the Network and Distributed System Security Symposium NDSS, San Diego, CA, USA, 23–26 February 2006; p. 78. [Google Scholar]
- Brik, V.; Banerjee, S.; Gruteser, M. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on mobile computing and networking, ser. MobiCom ’08, San Francisco, CA, USA, 8–12 September 2008; pp. 116–127. [Google Scholar]
- Candore, A.; Kocabas, O.; Koushanfar, F. Robust stable radiometric fingerprinting for wireless devices. In Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009; pp. 43–49. [Google Scholar] [CrossRef]
- Huang, Y.; Zheng, H. Radio frequency fingerprinting based on the constellation errors. In Proceedings of the 2012 18th Asia-Pacific Conference on Communications (APCC), Jeju, Korea, 15–17 October 2012; pp. 900–905. [Google Scholar] [CrossRef]
- Lukacs, M.; Collins, P.; Temple, M. Classification performance using ‘RF-DNA’ fingerprinting of ultra-wideband noise waveforms. Electron. Lett. 2015, 51, 787–789. [Google Scholar] [CrossRef]
- Borio, D.; Gioia, C.; Baldini, G.; Fortuny, J. GNSS Receiver Fingerprinting for Security-Enhanced Applications. In Proceedings of the 29th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+), Portland, OR, USA, 12–16 September 2016; pp. 2960–2970. [Google Scholar]
- Jia, Y.; Zhu, S.; Gan, L. Specific Emitter Identification Based on the Natural Measure. Entropy 2017, 19, 117. [Google Scholar] [CrossRef] [Green Version]
- De Wilde, W.; Sleewaegen, J.M.; Bougard, B.; Cuypers, G.; Popugaev, A.; Landmann, M.; Schirmer, C.; Roca, D.E.; López-Salcedo, J.A.; Granados, G.S. Authentication by Polarization: A Powerful Anti-Spoofing Method. In Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+), Miami, FL, USA, 24–28 September 2018; pp. 3643–3658. [Google Scholar] [CrossRef]
- Ali, A.; Fischer, G. Symbol Based Statistical RF Fingerprinting for Fake Base Station Identification. In Proceedings of the 2019 29th International Conference Radioelektronika (RADIOELEKTRONIKA), Pardubice, Czech Republic, 16–18 April 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Ali, A.; Fischer, G. The Phase Noise and Clock Synchronous Carrier Frequency Offset based RF Fingerprinting for the Fake Base Station Detection. In Proceedings of the 2019 IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, USA, 8–9 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Chen, X.; Hao, X. Feature Reduction Method for Cognition and Classification of IoT Devices Based on Artificial Intelligence. IEEE Access 2019, 7, 103291–103298. [Google Scholar] [CrossRef]
- Hanna, S.S.; Cabric, D. Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; pp. 674–680. [Google Scholar] [CrossRef] [Green Version]
- Pan, Y.; Yang, S.; Peng, H.; Li, T.; Wang, W. Specific Emitter Identification Based on Deep Residual Networks. IEEE Access 2019, 7, 54425–54434. [Google Scholar] [CrossRef]
- Zha, H.; Tian, Q.; Lin, Y. Real-World ADS-B signal recognition based on Radio Frequency Fingerprinting. In Proceedings of the 2020 IEEE 28th International Conference on Network Protocols (ICNP), Madrid, Spain, 13–16 October 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Nicolussi, A.; Tanner, S.; Wattenhofer, R. Aircraft Fingerprinting Using Deep Learning. In Proceedings of the 2020 28th European Signal Processing Conference (EUSIPCO), Amsterdam, The Netherlands, 18–21 January 2021; pp. 740–744. [Google Scholar] [CrossRef]
- Ezuma, M.; Erden, F.; Kumar Anjinappa, C.; Ozdemir, O.; Guvenc, I. Detection and Classification of UAVs Using RF Fingerprints in the Presence of Wi-Fi and Bluetooth Interference. IEEE Open J. Commun. Soc. 2020, 1, 60–76. [Google Scholar] [CrossRef]
- Weng, L.; Peng, J.; Li, J.; Zhu, Y. Message Structure Aided Attentional Convolution Network for RF Device Fingerprinting. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020; pp. 495–500. [Google Scholar] [CrossRef]
- Reising, D.; Cancelleri, J.; Loveless, T.D.; Kandah, F.; Skjellum, A. Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM. IEEE Internet Things J. 2020, 1. [Google Scholar] [CrossRef]
- Soltani, N.; Reus-Muns, G.; Salehihikouei, B.; Dy, J.; Ioannidis, S.; Chowdhury, K. RF Fingerprinting Unmanned Aerial Vehicles with Non-standard Transmitter Waveforms. IEEE Trans. Veh. Technol. 2020, 69. [Google Scholar] [CrossRef]
- Zhou, X.; Hu, A.; Li, G.; Peng, L.; Xing, Y.; Yu, J. A Robust Radio Frequency Fingerprint Extraction Scheme for Practical Device Recognition. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
- Frisch, M.; Messer, H. Transient signal detection using prior information in the likelihood ratio test. IEEE Trans. Signal Process. 1993, 41, 2177–2192. [Google Scholar] [CrossRef]
- Kelly, E.J. An Adaptive Detection Algorithm. IEEE Trans. Aerosp. Electron. Syst. 1986, AES-22, 115–127. [Google Scholar] [CrossRef] [Green Version]
- Karunaratne, S.; Krijestorac, E.; Cabric, D. Penetrating RF Fingerprinting-Based Authentication with a Generative Adversarial Attack. arXiv 2020, arXiv:2011.01538. [Google Scholar]
- Riyaz, S.; Sankhe, K.; Ioannidis, S.; Chowdhury, K. Deep learning convolutional neural networks for radio identification. IEEE Commun. Mag. 2018, 56, 146–152. [Google Scholar] [CrossRef]
- Morin, C.; Cardoso, L.; Hoydis, J.; Gorce, J.M. Deep Learning-Based Transmitter Identification on the Physical Layer. INRIA Report. 2021. Available online: https://hal.inria.fr/hal-03117090 (accessed on 24 April 2021).
- Ibrahim, Y.; Mu’Azu, M.B.; Adedokun, A.E.; Sha’Aban, Y.A. A performance analysis of logistic regression and support vector machine classifiers for spoof fingerprint detection. In Proceedings of the 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), Owerri, Nigeria, 7–10 November 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Patel, H. Introduction of Random Forest Classifier to ZigBee Device Network Authentication Using RF-DNA Fingerprinting. J. Inf. Warf. 2014, 13, 33–45. [Google Scholar]
- Rebeyrol, E.; Macabiau, C.; Ries, L.; Issler, J.L.; Bousquet, M.; Boucheret, M.L. Phase noise in GNSS transmission/reception system. In Proceedings of the 2006 National Technical Meeting of the Institute of Navigation, Monterey, CA, USA, 18–20 January 2006; pp. 698–708. [Google Scholar]
Ref., Year | Studied Signal Types | Studied Algorithms | Detection Performance Metrics Given? | Using I/Q (or Pre-Correlation Data)? | Domain |
---|---|---|---|---|---|
[62], 2003 | Bluetooth and WiFi | Bayesian step detector of transients | No | Yes | IoT |
[63], 2006 | Ethernet devices | Matched filtering | No | No | Cable networks |
[60], 2007 | Chipcon sensors at 433 MHz carrier | DWT | No | Yes | IoT |
[64], 2008 | WiFi | Support vector machines (SVM) and CNN | No | Yes | IoT |
[65], 2009 | QPSK and DQPSK modulated narrowband signals | Maximum likelihood classification | No | Yes | IoT |
[22], 2010 | WiFi and 4G/LTE | Analysis of variance (ANOVA) classification | No | Yes | Cellular |
[66], 2012 | TDMA satellites with QPSK modulation | SDA | No | Yes | Satcomm |
[48], 2014 | 16-APSK modulated narrowband signal | Analytical study | No | No | IoT |
[67], 2015 | UWB noise radar | MDA | Yes | No | Radar |
[68], 2003 | GNSS | Allan deviation and time interval error | Yes | No | GNSS |
[24], 2017 | nRF24LU1+ IoT devices at 2.4 GHz | Permutation entropy (PE) and dispersion entropy (DE) with SVM | Yes | Yes | IoT |
[69], 2017 | GMSK-modulated narrowband signals | Normalized PE | No | Yes | IoT |
[21], 2017 | GNSS | Allan deviation and time interval error | Yes | No | GNSS |
[56], 2017 | WiFi | Probabilistic neural network (PNN) classifier | No | Yes | IoT |
[70], 2018 | GNSS | Polarization vector with dual antennas | No | No | GNSS |
[71,72], 2019 | Cellular signals | Kurtosis | No | Yes | Cellular |
[25], 2019 | GSM | Continuous wavelet transform (CWT) and CNN | Yes | Yes | Cellular |
[73], 2019 | IoT amplifiers | Linear discriminant analysis (LDA) | Yes | Yes | IoT |
[74], 2019 | AM-modulated signal | CNN | Yes | Yes | IoT |
[75], 2019 | QPSK-modulated narrowband signals | Hilbert–Huang Transform (HHT) and CNN | Yes | Yes | IoT |
[76,77], 2020 | ADS-B signals | CNN | Yes | Yes | Aviation (surveillance) |
[78], 2020 | UAV controller | SVM, random forest, neural networks | Yes | Yes | Aviation (UAVs) |
[79], 2020 | ADS-B signals | CNN, message structure aided attentional convolution network (MSACN) | Yes | Yes | Aviation (surveillance) |
[80], 2020 | Wimax transmitters | SVM | Yes | Yes | IoT |
[81], 2020 | UAV transmitters | Neural networks | Yes | Yes | Aviation (UAVs) |
[82], 2021 | ZigBee signals | Gaussian probabilistic LDA | Yes | Yes | IoT |
Parameters | Value | |
---|---|---|
Observation interval (ms) | 2 | |
Galileo band | E1 | |
Intermediate frequency (MHz) | ||
Maximum Doppler shift (kHz) | 5 | |
TX filter bandwidth (MHz) | 100 | |
Parameters Used in Genuine GNSS Simulator | ||
DAC phase noise | Frequency offset (Hz) | Level (dBc/Hz) |
1 | ||
DAC non-linearity | ||
Clock unit phase noise | Frequency offset (Hz) | Level (dBc/Hz) |
1 | ||
10 | ||
100 | ||
Clock unit non-linearity | Ignored | |
Up-conversion unit phase noise | Frequency offset (Hz) | Level (dBc/Hz) |
1 | ||
10 | ||
100 | ||
Up-conversion unit I/Q imbalance | Amplitude (dB) | Degree |
1 | 3 | |
Band-pass filter | See Figure 6a | |
Parameters Used in Spoofer Simulator | ||
DAC phase noise | Frequency offset (Hz) | Level (dBc/Hz) |
10 | ||
100 | ||
500 | ||
DAC non-linearity | ||
LO phase noise | Frequency offset (Hz) | Level (dBc/Hz) |
1 | ||
10 | ||
100 | ||
Mixer I/Q imbalance | Amplitude (dB) | Degree |
3 | 5 | |
Band-pass filter | See Figure 6b |
Classifier Type | Feature Extraction Transform | |||||
---|---|---|---|---|---|---|
EVM | Kurtosis | TKEO | Spectrogram | CWT | DWT | |
Classification via kNN | + | + | + | + | + | + |
Classification via SVM | + | ++ | + | +++ | + | ++ |
Classification via CNN | + | + | + | +++ | + | + |
Classification via Thresholding | + | +++ | + | + | + | + |
Transmitter Features | |||||
---|---|---|---|---|---|
Phase Noise | I/Q Imbalance | DAC Non-Linearity | PA Non-Linearity | BPF | |
Impact | 0 | + | 0 | + | + |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, W.; Aguilar Sanchez, I.; Caparra, G.; McKeown, A.; Whitworth, T.; Lohan, E.S. A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data. Sensors 2021, 21, 3012. https://doi.org/10.3390/s21093012
Wang W, Aguilar Sanchez I, Caparra G, McKeown A, Whitworth T, Lohan ES. A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data. Sensors. 2021; 21(9):3012. https://doi.org/10.3390/s21093012
Chicago/Turabian StyleWang, Wenbo, Ignacio Aguilar Sanchez, Gianluca Caparra, Andy McKeown, Tim Whitworth, and Elena Simona Lohan. 2021. "A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data" Sensors 21, no. 9: 3012. https://doi.org/10.3390/s21093012
APA StyleWang, W., Aguilar Sanchez, I., Caparra, G., McKeown, A., Whitworth, T., & Lohan, E. S. (2021). A Survey of Spoofer Detection Techniques via Radio Frequency Fingerprinting with Focus on the GNSS Pre-Correlation Sampled Data. Sensors, 21(9), 3012. https://doi.org/10.3390/s21093012