System and Method for Identifying a Remote Device
20230101247 · 2023-03-30
Inventors
- Francesco Restuccia (Boston, MA, US)
- Francesca Meneghello (Arcole VR, IT)
- Michele Rossi (Ferrara FE, IT)
Cpc classification
H04L63/0876
ELECTRICITY
International classification
Abstract
A system and corresponding method identify a remote device. The system comprises a transceiver and a classifier. The transceiver captures a channel state information (CSI) packet that is sent from a receiver device in response to receiving a calibration packet. The calibration packet is sent by the remote device via transmitter hardware. The classifier extracts a feature set from the CSI packet captured. The feature set is affected by characteristics of the transmitter hardware. The classifier produces a classified feature set by classifying the feature set extracted. The classifier further determines an identifier based on the classified feature set. The identifier corresponds to the remote device. The system enables the remote device to be fingerprinted via the identifier and without the need for software-defined radio (SDR) capabilities. As such, the system can be any low-cost Wi-Fi device, such as a laptop.
Claims
1. A method for identifying a remote device, the method comprising: capturing a channel state information (CSI) packet, sent from a receiver device in response to receiving a calibration packet, the calibration packet sent by the remote device via transmitter hardware; extracting a feature set from the CSI packet captured, the feature set affected by characteristics of the transmitter hardware; producing a classified feature set by classifying the feature set extracted; and determining an identifier based on the classified feature set, the identifier corresponding to the remote device.
2. The method of claim 1, wherein the CSI packet is a non-encrypted packet and wherein the CSI packet is a multi-user multi-input, multi-output (MU-MIMO) CSI packet.
3. The method of claim 1, wherein the characteristics represent at least one imperfection of the transmitter hardware of the remote device.
4. The method of claim 1, wherein the remote device is among a plurality of remote devices and wherein the identifier determined includes a) a unique device identifier, the unique device identifier distinguishing the remote device from the plurality of remote devices and b) a probability that the remote device sent the CSI packet.
5. The method of claim 1, wherein the calibration packet is sent from a beamformer to a beamformee, wherein the CSI packet represents beamforming feedback information, and wherein the method further comprises capturing the CSI packet by monitoring a wireless channel between the beamformer and the beamformee.
6. The method of claim 5, wherein the feature set extracted includes beamforming feedback matrices computed by the beamformee, wherein the classifying is based on beamforming feedback angles, and wherein the beamforming feedback angles are derived from the beamforming feedback matrices.
7. The method of claim 1, wherein the classifying includes employing a machine learning model to produce the classified feature set.
8. The method of claim 1, wherein the CSI packet includes physical layer (PHY) level information and wherein the classifying includes demodulating the PHY-level information and processing, via the machine learning model, the PHY-level information demodulated.
9. The method of claim 1, wherein the remote device is wireless device and wherein the wireless device is Wi-Fi compliant.
10. The method of claim 1, further comprising employing the identifier to authenticate the remote device or outputting the identifier to a system, the system configured to authenticate the remote device based on the identifier output.
11. A system for identifying a remote device, the system comprising: a transceiver configured to capture a channel state information (CSI) packet, sent from a receiver device in response to receiving a calibration packet, the calibration packet sent by the remote device via transmitter hardware; and a classifier configured to (i) extract a feature set from the CSI packet captured, the feature set affected by characteristics of the transmitter hardware and (ii) produce a classified feature set by classifying the feature set extracted, the classifier further configured to determine an identifier based on the classified feature set, the identifier corresponding to the remote device.
12. The system of claim 10, wherein the CSI packet is a non-encrypted packet and wherein the CSI packet is a multi-user multi-input, multi-output (MU-MIMO) CSI packet.
13. The system of claim 10, wherein the characteristics include at least one imperfection of the transmitter hardware of the remote device.
14. The system of claim 10, wherein the remote device is among a plurality of remote devices and wherein the identifier determined includes a) a unique device identifier, the unique device identifier distinguishing the remote device from the plurality of remote devices and b) a probability that the remote device sent the CSI packet.
15. The system of claim 10, wherein the calibration packet is sent from a beamformer to a beamformee, wherein the CSI packet represents beamforming feedback information, and wherein the transceiver is further configured to capture the CSI packet by monitoring a wireless channel between the beamformer and the beamformee.
16. The system of claim 15, wherein the feature set extracted includes beamforming feedback matrices computed by the beamformee, wherein the classifying is based on beamforming feedback angles, and wherein the beamforming feedback angles are derived from the beamforming feedback matrices.
17. The system of claim 10, wherein the classifier is further configured to employ a machine learning model to produce the classified feature set, wherein the CSI packet includes physical layer (PHY) level information, and wherein the classifier is further configured to demodulate the PHY-level information and process, via the machine learning model, the PHY-level information demodulated
18. The system of claim 10, wherein the remote device is a wireless device and wherein the wireless device is Wi-Fi compliant.
19. The system of claim 10, further comprising a controller and wherein the controller is configured to employ the identifier to authenticate the remote device or output the identifier to an other system, the other system configured to authenticate the remote device based on the identifier output.
20. A non-transitory computer-readable medium for identifying a remote device, the non-transitory computer-readable medium having encoded thereon a sequence of instructions which, when loaded and executed by at least one processor, causes the at least one processor to: capture a channel state information (CSI) packet, sent from a receiver device in response to receiving a calibration packet, the calibration packet sent by the remote device via transmitter hardware; extract a feature set from the CSI packet captured, the feature set affected by characteristics of the transmitter hardware; produce a classified feature set by classifying the feature set extracted; and determine an identifier based on the classified feature set, the identifier corresponding to the remote device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
[0023] The foregoing will be apparent from the following more particular description of example embodiments, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments.
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
DETAILED DESCRIPTION
[0050] A description of example embodiments follows.
[0051] While an example embodiment disclosed herein may be described with reference to Wi-Fi (WiFi), it should be understood that such embodiment is not limited to Wi-Fi as a wireless technology. Further, it should be understood that a wireless transmitter and wireless receiver disclosed herein is not limited to functioning as a wireless transmitter and wireless receiver, respectively, as such wireless devices may be wireless transceivers.
I. Overview and Example Embodiments
[0052] The sheer expansion of Internet of Things (IoT) is rapidly saturating unlicensed spectrum bands (Federal Communications Commission (FCC), “Spectrum Crunch,” https://www.nist.gov/advanced-communications/spectrum-crunch). With the global mobile data traffic projected to reach 164 exabytes per month in 2025 (Ericsson Incorporated, “Ericsson Interim Mobility Report, June 2020,” https://www.ericsson.com/49da93/assets/local/mobility-report/documents/2020/june2020-ericsson-mobility-report.pdf, 2020), spectrum congestion will soon decrease data throughput to intolerable levels. To alleviate the issue, the Federal Communication Commission (FCC) released 150 MHz additional bandwidth in the 3.5 GHz spectrum band (Jamie Davies, Telecoms.com, “FCC finally opens up 3.5 GHz for US telcos,” https://telecoms.com/502070/fcc-finally-opens-up-3-5-ghz-for-us-telcos/, 2020), as well as 1.2 GHz in the 6 GHz band (5.925-7.125), the latter providing opportunities to use up to 320 MHz channels to expand capacity and increase network performance Federal Communications Commission (FCC), “FCC Opens 6 GHz Band to Wi-Fi and Other Unlicensed Uses,” https://www.fcc.gov/document/fcc-opens-6-ghz-band-wi-fi-and-other-unlicensed-uses, 2020).
[0053] The release of these spectrum bands for unlicensed use implies that previously licensed users (also known as incumbents), unlicensed Wi-Fi devices (Wi-Fi Alliance, “Wi-Fi 6E expands Wi-Fi into 6 GHz,” https://www.wi-fi.org/file/wi-fi-6e-highlights, 2021) and 5G cellular networks (GSMA.com, “Capacity to Power Innovation: 5G in the 6 GHz Band,” https://tinyurl.com/5G-6GHz-Bands, 2021) will need to coexist in the same spectrum bands. This will necessarily require the enactment of strict, fine-grained dynamic spectrum access (DSA) rules (J. Horwitz, V. Beat, “Wi-Fi 6E and 5G Will Share 6 GHz Spectrum to Supercharge Wireless Data,” https://tinyurl.com/wyvmn5c, 2020), which will require spectrum administrators to continuously monitor which unlicensed Wi-Fi device is using the spectrum, and when the device is using it. To this end, cryptography-based techniques are substantially unfeasible in this context, since a spectrum observer should possess the private keys exchanged among all the nodes in the network, which is unrealistic.
[0054] On the other hand, radio fingerprinting (RFP) has attracted significant attention as reliable and effective spectrum-level authentication technique (T. Zheng, Z. Sun, and K. Ren, “FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification,” in Proc. of IEEE INFOCOM, 2019, L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, “Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 349-360, 2019, F. Xie, H. Wen, Y. Li, S. Chen, L. Hu, Y. Chen, and H. Song, “Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3967-3977, 2018, Y. Xing, A. Hu, J. Zhang, L. Peng, and G. Li, “On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios,” IEEE Communications Letters, vol. 22, no. 11, pp. 2326-2329, 2018, K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, “ORACLE: Optimized Radio classification through Convolutional neural networks,” in Proc. of IEEE INFOCOM, 2019, T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting Wi-Fi Devices Using Software Defined Radios,” in Proc. of ACM WiSec, 2016, A. Al-Shawabka, F. Restuccia, S. D'Oro, T. Jian, B. C. Rendon, N. Soltani, J. Dy, S. Ioannidis, K. Chowdhury, and T. Melodia, “Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting,” in Proc. of IEEE INFOCOM, 2020). RFP leverages naturally-occurring circuitry imperfections to compute a unique “fingerprint” of the device directly at the waveform level (E. Johnson, “Physical Limitations on Frequency and Power Parameters of Transistors,” in Proc. of IRE International Convention Record, 1966). Although RFP for physical layer (PHY) Wi-Fi authentication has been explored, existing approaches require software-defined radio (SDR) devices to extract RFP features. This may ultimately prevent widespread adoption, since SDRs require expert knowledge and are usually more expensive than off-the-shelf devices.
[0055] Moreover, existing work has tackled Wi-Fi fingerprinting up to the legacy 802.11a/g/b standards, which do not support multi-input, multi-output (MIMO) techniques. Newer Wi-Fi releases, such as 802.11ac/ax and the upcoming 802.11be, will heavily rely on multi-user MIMO (MU-MIMO) techniques to deliver significantly higher throughput than previous standards (E. H. Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, and T. Nihtild, “IEEE 802.11ac: Enhancements for very high throughput WLANs,” in Proc. of IEEE PIMRC, 2011, E. Khorov, A. Kiryanov, A. Lyakhov, and G. Bianchi, “A tutorial on IEEE 802.11ax high efficiency WLANs, IEEE Communications Surveys & Tutorials,” vol. 21, no. 1, pp. 197-216, 2018, C. Deng, X. Fang, X. Han, X. Wang, L. Yan, R. He, Y. Long, and Y. Guo, “IEEE 802.11be Wi-Fi 7: New challenges and opportunities,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2136-2166, 2020). Thus, it is still unknown whether existing RFP strategies can be applied in the significantly more complex MU-MIMO scenario, where inter-user interference (IUI) and inter-stream interference (ISI) can significant decrease the quality of the fingerprint itself.
[0056] To fill such research gap, an example embodiment employs DeepCSI, a brand-new technique for RFP of Wi-Fi devices, summarized with regard to
[0057] In an example embodiment of DeepCSI disclosed herein, the first approach is to perform RFP of MU-MIMO Wi-Fi devices. DeepCSI uses deep learning of the standard-compliant beamforming matrices to learn the device-unique imperfections located in the CSI and authenticate MU-MIMO Wi-Fi devices directly at the PHY layer. The core intuition is that imperfections in the transmitter's radio circuitry are also present in the beamforming feedback matrix that is transmitted in clear text. Thus, conversely from prior work, explicit CSI computation through SDR technologies are not needed and DeepCSI can be run on any low-cost Wi-Fi device. Through DeepCSI, an observer can leverage the beamforming feedback matrix from any beamformee—one at a time—associated with the beamformer to be authenticated. Given the small memory footprint, the trained learning method can be run to perform the online inference on low-cost Wi-Fi devices, e.g., laptops, without the need for powerful facilities.
[0058] The performance of DeepCSI is evaluated, as disclosed further below, through a massive data collection campaign performed in the wild with off-the-shelf equipment, where 10 Wi-Fi radios emit MU-MIMO signals to multiple receivers located at different positions (and thus, with different beam patterns). Experimental results indicate that DeepCSI is able to correctly identify the transmitter with an accuracy above 98%, which shows that RFP of MU-MIMO devices can be performed leveraging the CSI beamforming feedback matrices. The impact of the feedback quantization error is evaluated on the performance—where quantization is applied for transmission efficiency reasons as per the Wi-Fi standards (IEEE, “IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz,” IEEE Std 802.11ac-2013 (Amendment to IEEE Std 802.11-2012), 2013, “IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN,” IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11-2020), 2021)—observing an accuracy increase of up to 63% when changing the feedback PHY parameters. As disclosed herein, DeepCSI achieves at least 17% more accuracy than methods based on CSI phase cleaning, since the latter partially remove the imperfections due to the hardware circuitry. Further, the beamformer identification accuracy is evaluated “on the move,” where DeepCSI achieves an accuracy above 82%. A system that employs an example embodiment of DeepCSI is disclosed below with regard to
[0059]
[0060] Such actions performed by the transceiver 106 and classifier 108 of the system 102 may represent an example embodiment of DeepCSI disclosed herein. The remote device 120 may be a wireless device that is Wi-Fi compliant. In the example embodiment of the
[0061] The remote device 120 may be among a plurality of remote devices (not shown). The identifier 118 determined may include a unique device identifier (not shown). The unique device identifier may distinguish the remote device 120 from the plurality of remote devices. The unique device identifier may further include a probability (not shown) that it was the remote device 120 that sent the CSI packet 110. The identifier 118 may be referred to as a radio fingerprint or, simply, a fingerprint.
[0062] The remote device 120 may be a beamformer and the receiver device 104 may be a beamformee. As such, the calibration packet 112 may be sent from a beamformer to a beamformee for sounding a channel in order to direct a beam 111 toward the beamformee as is known in the art. The CSI packet 110 may represent beamforming feedback information disclosed herein. The transceiver 106 may be further configured to capture the CSI packet 110 by monitoring a wireless channel (not shown) between the beamformer and the beamformee, namely the remote device 120 and receiving device 104, respectively, in the example embodiment.
[0063] As disclosed above, the classifier 108 is configured to extract a feature set 114 from the CSI packet 110 captured and may be affected by characteristics of the transmitter hardware. Such characteristics may include at least one imperfection of the transmitter hardware of the remote device 120. The feature set 114 extracted may include beamforming feedback matrices (not shown) computed by the beamformee, namely the receiving device 104, and values of such feedback matrices may be affected by the at least one imperfection. Such beamforming feedback matrices are disclosed further below. The classifying performed by the classifier 108 may be based on beamforming feedback angles (not shown), as disclosed further below. The beamforming feedback angles may be derived from the beamforming feedback matrices.
[0064] The classifier 108 may be further configured to employ a machine learning model (not shown) to produce the classified feature set. The CSI packet 110 may include physical layer (PHY) level information (not shown). The classifier 108 may be further configured to demodulate the PHY-level information and process, via the machine learning model, the PHY-level information demodulated, as disclosed further below.
[0065] According to an example embodiment, the system 102 may further comprise a controller (not shown). The controller may be configured to employ the identifier 118 to authenticate the remote device 120 or output the identifier 118 to an other system (not shown). The other system may be configured to authenticate the remote device 120 based on the identifier 118 output. According to an example embodiment, the identifier 118 may be employed for spectral management to exclude or find a device that is not obeying bandwidth rules, to block an unauthorized device, or to give an authorized device allowance for traffic for non-limiting examples. An example embodiment of a method that may determine the identifier 118 is disclosed below with regard to
[0066]
[0067]
II. Further Overview and Challenges
[0068] Thanks to their capability of identifying transmitters without the need of computation-hungry cryptography techniques, RFP techniques have received a significant amount of attention from the research community (L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, “Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 349-360, 2019, F. Xie, H. Wen, Y. Li, S. Chen, L. Hu, Y. Chen, and H. Song, “Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3967-3977, 2018, Y. Xing, A. Hu, J. Zhang, L. Peng, and G. Li, “On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios,” IEEE Communications Letters, vol. 22, no. 11, pp. 2326-2329, 2018, T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting Wi-Fi Devices Using Software Defined Radios,” in Proc. of ACM WiSec, 2016, Q. Xu, R. Zheng, W. Saad, and Z. Han, “Device Fingerprinting in Wire-less Networks: Challenges and Opportunities,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 94-104, 2016). While early work has demonstrated the feasibility of RFP, it has focused on the extraction of complex hand-tailored features, which do not scale well with the device population, or work in ad hoc propagation settings only. Among the first works on Wi-Fi-specific RFP, Vo et al. (T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting Wi-Fi Devices Using Software Defined Radios,” in Proc. of ACM WiSec, 2016) propose RFP techniques that extract features from the scrambling seed, the level of frequency offset and transients between symbols. However, the models achieve accuracy up to 50% on 100 devices. The authors in (L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, “Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 349-360, 2019), instead, demonstrated that up to 54 ZigBee devices can be fingerprinted with about 95% accuracy through PSK transients. More recently, Zheng et al. (T. Zheng, Z. Sun, and K. Ren, “FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification,” in Proc. of IEEE INFOCOM, 2019) studied and evaluated in a testbed of 33 devices a model-based approach to summarize imperfections in the modulation, timing, frequency and power amplifier noise. It is not clear, however, whether the approach in (T. Zheng, Z. Sun, and K. Ren, “FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification,” in Proc. of IEEE INFOCOM, 2019) generalizes to different channel environments.
[0069] In stark contrast with early work, recent RFP papers have leveraged deep learning techniques to fingerprint wireless devices (K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, “ORACLE: Optimized Radio classification through Convolutional neural networks,” in Proc. of IEEE INFOCOM, 2019, Restuccia, S. D'Oro, A. Al-Shawabka, M. Belgiovine, L. Angioloni, S. Ioannidis, K. Chowdhury, and T. Melodia, “DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms,” in Proc. of ACM MobiHoc, 2019, S. Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, “Deep Learning Convolutional Neural Networks for Radio Identification,” IEEE Communications Magazine, vol. 56, no. 9, pp. 146-152, 2018, K. Merchant, S. Revay, G. Stantchev, and B. Nousain, “Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 160-167, 2018, R. Das, A. Gadre, S. Zhang, S. Kumar, and J. M. Moura, “A Deep Learning Approach to IoT Authentication,” in Proc. of IEEE ICC, 2018). An advantage of deep learning techniques is that they are able to perform feature extraction and classification at the same time, thus avoiding manual extraction of device-distinguishing features. For example, Das et al. (R. Das, A. Gadre, S. Zhang, S. Kumar, and J. M. Moura, “A Deep Learning Approach to IoT Authentication,” in Proc. of IEEE ICC, 2018) and Merchant et al. (K. Merchant, S. Revay, G. Stantchev, and B. Nousain, “Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 160-167, 2018) deep neural networks (DNNs) achieve more than 90% accuracy with a population of 7 ZigBee devices and 30 LoRa devices. To further increase accuracy, (K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, “ORACLE: Optimized Radio classification through Convolutional neural networks,” in Proc. of IEEE INFOCOM, 2019, Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, “Deep Learning Convolutional Neural Networks for Radio Identification,” IEEE Communications Magazine, vol. 56, no. 9, pp. 146-152, 2018) proposed the introduction of artificial impairments at the transmitter's side. However, without compensation, this approach inevitably increases the bit error rate (BER). The usage of complex-valued convolutional neural networks (CNNs) has been explored by Gopalakrishnan et al. (S. Gopalakrishnan, M. Cekic, and U. Madhow, “Robust Wireless Fingerprinting via Complex-Valued Neural Networks,” in Proc. of IEEE GLOBECOM, 2019), while in (F. Restuccia, S. D'Oro, A. Al-Shawabka, M. Belgiovine, L. Angioloni, S. Ioannidis, K. Chowdhury, and T. Melodia, “DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms,” in Proc. of ACM MobiHoc, 2019) and (S. D'Oro, F. Restuccia, and T. Melodia, “Can You Fix My Neural Network? Real-Time Adaptive Waveform Synthesis for Resilient Wireless Signal Classification,” in Proc. of IEEE INFOCOM, 2021) the authors propose the usage of finite impulse response (FIR) filters to compensate for the adverse action of the wireless channel on the fingerprinting accuracy. The key limitation of existing work is that it is entirely based on SDRs, which is very specialized, expensive equipment that is not widely available in common Wi-Fi networks. Moreover, as understood, no prior work has tackled the issue of assessing whether RFP is feasible in MU-MIMO Wi-Fi networks. As disclosed herein, both issues are addressed at once by presenting DeepCSI, a framework that (i) can be run on any off-the-shelf Wi-Fi-compliant device, and (ii) can accurately fingerprint MU-MIMO devices. The performance of DeepCSI is evaluated in static and—for the first time—dynamic conditions, assessing the robustness of the learned fingerprint to changing transmission channel characteristics.
Challenges of MU-MIMO Fingerprinting
[0070] Performing RFP of devices operating in downlink (DL) MU-MIMO mode is significantly more challenging than RFP of devices operating with omnidirectional antennas. First, transmissions are inevitably impaired by imperfect beamforming weights that do not accurately compensate the wireless channel. Secondly, (i) inter-stream interference (ISI) occurs between streams transmitted to the same receiver, and (ii) inter-user interference (IUI) affects streams directed to different receivers. The time-varying behavior of both ISI and IUI complicates the identification of the device-specific imperfections. Moreover, it has been shown in prior work that the RFP process may be adversely impacted by the presence of the wireless channel (K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, “ORACLE: Optimized Radio classification through Convolutional neural networks,” in Proc. of IEEE INFOCOM, 2019, A. Al-Shawabka, F. Restuccia, S. D'Oro, T. Jian, B. C. Rendon, N. Soltani, J. Dy, S. Ioannidis, K. Chowdhury, and T. Melodia, “Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting,” in Proc. of IEEE INFOCOM, 2020). As such, a different approach for extracting effective radio fingerprints is disclosed herein.
[0071] Specifically, an example embodiment may employ the beamforming feedback matrix described in Section III-B. The matrix {tilde over (V)} is estimated based on the very high throughput (VHT)-long training fields (LTFs) of the null data packet (NDP) that is sent in broadcast mode without being beamformed. Moreover, the VHT-LTFs are sent over the different antennas in subsequent time slots of 4 μs each. Therefore, the NDP and, in turn, {tilde over (V)}, are not affected by IUI nor by ISI. However, since the feedback matrix is quantized before transmission, quantization errors are inevitable. In Section V, disclosed further below, the effect of the quantization error is analyzed and the generalization capability of an example embodiment of a RFP approach to multiple channels and beamformee positions, and to beamformer's mobility, is investigated.
[0072] Henceforth, the following notation for mathematical expressions is adopted. The superscripts T and † respectively denote the transpose and the Hermitian of a matrix, i.e., the complex conjugate transpose. By ∠C, the reference is to the matrix whose elements are the phases of the corresponding elements in the complex-valued matrix C. diag(c.sub.1, . . . , c.sub.j) indicates the diagonal matrix with elements (c.sub.1, . . . , c.sub.j) on the main diagonal. The (c.sub.1, c.sub.2) entry of matrix C is denoted by [C]c.sub.1,c.sub.2. Finally, I.sub.c refers to a c×c identity matrix while I.sub.c×d is a c×d matrix with ones on the main diagonal and zeros elsewhere.
A. Preliminaries on MU-MIMO in Wi-Fi
[0073] In the following, Wi-Fi devices operating with the IEEE 802.11ac (Wi-Fi 5) standard and 802.11ax (WiFi 6 and 6E) (IEEE, “IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz,” IEEE Std 802.11ac-2013 (Amendment to IEEE Std 802.11-2012), 2013, “IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN,” IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11-2020), 2021) are considered. These devices operate on the 2.4 GHz, 5 GHz and 6 GHz frequency bands with channels having up to 160 MHz of bandwidth. In Wi-Fi, data is transmitted via orthogonal frequency-division multiplexing (OFDM) by dividing the selected channel into K partially overlapping and orthogonal sub-channels, spaced apart by 1/T. The input bits are grouped into OFDM samples, a.sub.k, and symbols, a=[a−K/2, . . . , a.sub.K/2−1], collecting K samples each. After being digitally modulated, the K samples of one OFDM symbol are simultaneously transmitted though the K OFDM sub-channels, occupying the channel for T seconds. Up-converted to the carrier f.sub.c, the transmitted signal is
[0074] To improve the signal-to-noise ratio (SNR), the transmitter can use beamforming to focus the power toward the intended receiver. The beamforming may also compensate the effect of the wireless channel from the transmitter (beamformer) to the receiver (beamformee). When both devices in the communication link are equipped with antenna arrays (MIMO system), each pair of transmitter and receiver antennas forms a physical channel that can be exploited for wireless communication. This spatial diversity allows shaping multiple beams, referred to as spatial streams, to transmit different signals to the beamformee, in a parallel fashion. To this end, the signals are combined at each transmitter antenna through steering weights, W, derived from the channel frequency response (CFR) matrix H. The CFR needs to be estimated for every OFDM sub-channel over each pair of transmitter (TX) and receiver (RX) antennas, thus obtaining a K×M×N matrix, where M and N are respectively the number of TX and RX antennas. In
[0075]
[0076] At the beamformee side, the original signals are retrieved from their combination exploiting the fact that, ideally, [H[W
=0 when
≠
or ī≠i.
[0077] A meaningful model for the CFR H in indoor spaces is obtained by considering the proprieties of the wireless propagation. After being irradiated by the transmitter antenna m∈{0, . . . M−1}, the signal is reflected by objects in the environment and, in turn, P different copies of s.sub.tx(t) are collected at the receiver antenna n∈{0, . . . , N−1}. Each received signal is characterized by an attenuation A.sub.p and a delay τ.sub.p that depends on the length of the path followed by the transmitted wave. Thus, the (k, m, n) element of H is
[0078] By knowing H, the beamformer can generate the steering matrix W to maximize the power sent toward the beamformee 404 or simultaneously send parallel data streams to multiple beamformees. These communication modes are respectively referred to as single-user MIMO (SU-MIMO) and MU-MIMO. While IEEE 802.11n only supports SU-MIMO mode, in 802.11ac and above MU-MIMO can be enabled in the DL direction, i.e., at the access point (AP) side (IEEE, “IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Network-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz,” IEEE Std 802.11ac-2013 (Amendment to IEEE Std 802.11-2012), 2013). In 802.11ax MU-MIMO can be also enabled in the uplink (UL) (IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 1: Enhancements for High-Efficiency WLAN,” IEEE Std 802.11ax- 2021 (Amendment to IEEE Std 802.11- 2020), 2021).
B. Compressed Beamforming Feedback
[0079] In IEEE 802.11ac/ax, DL MU-MIMO is enabled by the pre-coding and the channel sounding procedures (IEEE, “IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz,”IEEE Std 802.11ac- 2013 (Amendment to IEEE Std 802.11- 2012), 2013). Pre-coding linearly combines the signals to be simultaneously transmitted to the different beamformees. This procedure shapes the beams focusing the power in the correct directions. The combination weights are antenna-specific and are computed based on channel sounding performed through a NDP, transmitted without beamforming. After receiving the NDP, each beamformee estimates H based on a VHT-LTF for each spatial stream. Next, the beamformee feeds back the matrix to the beamformer in the form of a compressed beamforming feedback, which is computed for each sub-channel k as follows.
[0080] Let H.sub.k be the M×N sub-matrix of H containing the CFR samples (see Eq. (2)) related to sub-channel k. H.sub.k is first decomposed via singular value decomposition (SVD):
H.sub.k.sup.T=U.sub.kS.sub.kZ.sub.k.sup.† (3)
where U.sub.k and Z.sub.k are, respectively, N×N and M×M unitary matrices, while S.sub.k is an N×M diagonal matrix collecting the singular values. Next, the first N.sub.SS≤N columns of Z.sub.k are extracted to form the complex-valued beamforming matrix V.sub.k that is used by the beamformer to compute the pre-coding weights for the N.sub.SS spatial streams directed to the beamformee. Note that the beamformee can be served with at maximum N.sub.SS=N spatial streams (see Chapter 13 of (E. Perahia and R. Stacey, Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n. Cambridge Univ. Press, 2008). Thus, the beamformee is required to send back V.sub.k to the beamformer. To do that efficiently, instead of sending the complete matrix, the beamformee derives and transmits its compressed representation. Specifically, the feedback is a number of angles obtained by converting V.sub.k into polar coordinates. The transformation is based on the procedure in Method 1, where D.sub.k,i and G.sub.k,l,i are defined as
The obtained matrices allows rewriting V.sub.k as
where the products represent matrix multiplications. Note that, by construction, the last row of the complex-valued V.sub.k matrix, i.e., the feedback for the M-th transmitter antenna, consists of non-negative real numbers. Next, the K×M×N.sub.SS beam-forming matrix {tilde over (V)} is obtained by stacking the {tilde over (V)}.sub.k matrices for k∈{−K/2, . . . , K/2−1}. Thanks to this transformation, the beamformee is only required to transmit the φ and angles from which the {tilde over (V)}.sub.k matrices can be reconstructed. The beamforming performance is equivalent at the beamformee when using V.sub.k or {tilde over (V)}.sub.k to construct the steering matrix W and, in turn, the feedback for {tilde over (D)}.sub.k is not sent (E. Perahia and R. Stacey, “Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n,” Cambridge Univ. Press, 2008). An example embodiment of Method 1 is included in
[0081]
[0082] The angles are quantized for transmission using b.sub.ϕ∈{7, 9} bits for ϕ and b.sub.ψ−2 bits for ψ. Next, the quantized values are packed into the VHT compressed beamforming frame and transmitted without encryption, thus allowing any device that can access the wireless channel to capture the information sent by the beamformee to the beamformer. The b.sub.ϕ and b.sub.ψ values can be read in the VHT MIMO control field of the frame, together with other information including the number of columns (N.sub.SS) and rows (M) in the beamforming matrix and the channel bandwidth. At the beamformer, the φ and ψ angles are retrieved from their quantized versions
C. DeepCSI Workflow and Learning architecture
[0083]
[0084] The DeepCSI workflow 600 summarizes how DeepCSI leverages the sounding protocol mechanism described in Section III-B to obtain a fingerprint of the IEEE 802.11ac/ax AP (beamformer) 620. The sounding is triggered by the beamformer 620 before sending data in the DL MU-MIMO mode to the beamformees 604 via the MIMO channel 613, and concludes with the transmission of the feedback angles computed as part of the computations 617 performed in response to receipt of the NDP 312. DeepCSI exploits the fact that the angles can be easily collected by any Wi-Fi compliant device by setting the Wi-Fi interface in monitor mode and using a network analyzer toolkit, e.g., Wireshark (A. Orebaugh, G. Ramirez, and J. Beale, “Wireshark & Ethereal network protocol analyzer toolkit,” Elsevier, 2006) for non-limiting example, to capture the packet containing the feedback. Notice that DeepCSI does not require the monitor device 602 to be authenticated with the target AP 620. Once the feedback angles are contained, DeepCSI reconstructs {tilde over (V)} through Eq. (7). Next, the beamforming feedback matrix is used as input for the DNN classifier 708 depicted in
[0085]
[0086] The elements of the feedback matrix are fed to the DNN 708 as follows. The I/Q components 732 of the beamforming feedback are stacked into an N.sub.row×N.sub.col×N.sub.ch matrix, where N.sub.col≤K identifies the number of selected OFDM subchannels, N.sub.row≤N.sub.SS and N.sub.ch<2M refer to the columns and rows of {tilde over (V)} used for fingerprinting and the 2-factor is for the I/Q components 732. Note that the feedback for the last transmitting antenna consists of the sole I information as, by construction, the last row of each {tilde over (V)}.sub.k (Eq. (7)) is composed of non-negative real values ([IEEE, “IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz,” IEEE Std 802.11ac-2013 (Amendment to IEEE Std 802.11- 2012), 2013). The learning architecture is inspired from (T. J. O'Shea, T. Roy, and T. C. Clancy, “Over-the-Air Deep Learning Based Radio Signal Classification,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 168- 179, February 2018) and consists of a series of N.sub.conv convolutional layers followed by selu activation function (G. Klambauer, T. Unterthiner, A. Mayr, and S. Hochreiter, “Self-Normalizing Neural Networks,” in Proc. of ACM NIPS, 2017), and by a max-pooling layer. The output of the previous block (convolutional layer 734 and max-pooling layer 736) is forwarded through an attention block 738 and—after being flattened—is processed by N.sub.dense dense layers 740 with selu activation function. A final dense layer with softmax activation is used for classification. Alpha-dropout layers are interposed between the dense layers. The attention block 738 is inspired by the spatial attention module in (S. Woo, J. Park, J.-Y. Lee, and I. S. Kweon, “CBAM: Convolutional Block Attention Module,” in Proc. of ECCV, 2018). First, the maximum and the average feature maps are obtained by computing respectively the maximum and the mean of the input feature maps over the channel dimension. Next, the two maps are concatenated and forwarded through a convolutional layer with sigmoid activation function that outputs the weights to attend the input feature maps. Specifically, the attention operation consists in multiplying the input by the computed weights. A skip connection is also implemented by summing the output of the attention block with its input before passing the result to the subsequent dense layers. Thanks to the attention block 738, the method 700 learns where the most relevant information is located within the feature maps. This allows the network to focus on the relevant regions obtaining a more effective fingerprint.
[0087] A hyper-parameter evaluation was performed as described in Section V, and it was established through experiments that a good set of hyper parameters is N.sub.conv=5 with 128 filters each, and N.sub.dense=2 dense layers with 128 and 64 neurons each. This architecture yields a DNN containing 489,301 trainable parameters, which is relatively small compared to state-of-the-art DNNs. The DeepCSI learning method 700 is trained in an offline fashion by back propagating the cross-entropy loss between the module identifier (ID) 718 predicted by the classifier and the actual one.
IV. Experimental Setup
[0088] The effectiveness of DeepCSI was evaluated using off-the-shelf devices and through extensive experimental evaluation. To this end, an experimental setup included setting up a Wi-Fi network including one AP (beamformer) and two stations (STAs) (beamformees). The AP was implemented through a Gateworks GW6200 single board computer (SBC) equipped with a Compex WLE 1216v 5-23 IEEE 802.11ac module, as shown in
[0089]
[0090] In the experimental setup, two Netgear Nighthawk X4S AC2600 routers, with N∈{1, 2} out of 4 antennas enabled, acted as STAs (beamformees). At the AP, M=3 antennas were used to sound the channel for DL MU-MIMO transmission mode and the STAs were served with N.sub.SS∈{1, 2} spatial streams each. Note that implementation specific constraints prevent the use of M=4 for DL MU-MIMO. For the data transmission between the AP and the STAs, channel 42 was used, i.e., f.sub.c=5.21 GHz with 80 MHz bandwidth. The number of OFDM sub-channels sounded was K=234 as the mechanism does not consider the 14 control sub-channels and the 8 pilot ones. The AP used the quantization parameters b.sub.φ=9 and b.sub.ψ=7 for φ and ψ feedback angles, respectively. UDP traffic was generated in the DL direction to induce the AP to trigger the channel sounding mechanism, and the angles (φ, ψ) collected were sent back by the beamformees using the Wireshark network analyzed toolkit (A. Orebaugh, G. Ramirez, and J. Beale, “Wireshark & Ethereal network protocol analyzer toolkit,” Elsevier, 2006) running on an off-the-shelf laptop equipped with an IEEE 802.11ac Wi-Fi card. This allowed retrieving the {tilde over (V)} matrices associated with each sounding operation, and computing of the beamformer fingerprint (see Section III-C).
[0091] Two datasets—namely D1 and D2—were collected. As for the former, the STAs were deployed at different positions as depicted in
[0092]
[0093] The number of enabled antennas was N=2 for each beamformee (904a, 904b) and each of them was served with N.sub.SS=2 spatial streams. Dataset D1 allowed evaluation of the performance of DeepCSI in different static conditions. The purpose of dataset D2 was to evaluate the impact of mobility in the beamformer identification. The data were collected while the AP was manually moved following the path described in
[0094] The datasets are shared with the community for reproducibility and benchmarking purposes (F. Meneghello, M. Rossi, and F. Restuccia, “DeepCSI—code and datasets,” https://github.com/signetlabdei/DeepCSI, 2022).
A. Datasets Structure
[0095] The datasets include the beamforming feedback angles associated with N.sub.modules=10 different Compex Wi-Fi modules, which are the target of the proposed fingerprinting mechanism. They were collected in two indoor environments where the three entities constituting the experimental Wi-Fi network were placed as shown in
[0096] With reference to
[0097] As for the dynamic dataset D2, 11 measurements were collected for each Compex module. Four measurements were collected with the AP 920 fixed in position A. The remaining seven traces are collected while moving the AP 920 following the path described above, i.e., first, the AP 920 is moved 80 cm from position A toward the beamformees reaching position B, next the AP 920 was shifted 80 cm to the left and subsequently 160 cm to the right—up to positions C and D respectively—and finally the AP 920 was brought back in position A passing from B. The beamformees (904a, 904b) were kept fixed in position 3. This dataset allowed evaluation of the performance of DeepCSI in the presence of beamformer mobility. Overall, it included 11 traces for each of the 10 Compex Wi-Fi modules for a total of 110 traces.
[0098] Each trace contained the feedback angles sent by the two beamformees during two minutes of transmission. Such feedbacks could be promptly grouped based on the beamformee identifier by applying a filter on the packets' source address.
B. DeepCSI Training and Testing Procedure
[0099] The DeepCSI classifier (see
[0100]
[0101]
[0102] Note that the mobility traces encode variations associated with the manual movement of the AP. This implies that the positions taken by the AP during the acquisition of the traces are approximately the same due to slight variations in the movements. Moreover, a person is always present in the proximity of the AP to perform the operation, introducing additional variability.
[0103] For each configuration, DeepCSI was independently trained on the feedbacks from the two beamformees, obtaining one model for each of them. In this way, a realistic usage scenario was evaluated where each beamformee authenticated the beamformer based on local information, without relying on some other, possibly malicious, entities. The results considering both the beamformees are also reported for completeness.
V. Experimental Results
[0104] DeepCSI was experimentally evaluated on the Wi-Fi network setups of table 1000-A and table 1000-B of
[0105] DeepCSI hyper parameters selection
[0106]
[0107]
[0108]
[0109] DeepCSI performance using different beamformees configurations.
[0110]
[0111]
[0112]
[0113]
[0114]
[0115]
[0116]
[0117]
[0118]
[0119]
DeepCSI performance when varying the beamformer transmission parameters.
[0120]
[0121]
[0122]
DeepCSI performance when changing the reference beamformee spatial stream.
[0123] To evaluate the effect of changing the DNN input spatial stream on the beamformer fingerprinting accuracy, we consider the impact of the beamforming feedback angles quantization on the columns of {tilde over (V)}, representing the spatial streams dimensions. From Method 1 disclosed in the table 500 of
[0124]
[0125]
[0126]
DeepCSI performance compared with learning from a processed input.
[0127] DeepCSI learns beamformer-specific features directly from the I/Q samples of matrix {tilde over (V)}. As an alternative approach, the effect of pre-processing such I/Q data before using it as input for the DNN was evaluated. Specifically, the beamforming feedback matrices was applied to the data cleaning method presented in (F. Meneghello, D. Garlisi, N. Dal Fabbro, I. Tinnirello, and M. Rossi, “Environment and Person Independent Activity Recognition with a Commodity IEEE 802.11ac Access Point,” arXiv preprint arXiv: 2103.09924, 2021). The CFR estimated at the beamformee on the NDP—and from which {tilde over (V)} is derived—slightly deviates from the theoretical model in Eq. (2) due to hardware imperfections causing undesired phase offsets (H. Zhu, Y. Zhuo, Q. Liu, and S. Chang, “π-Splicer: Perceiving Accurate CSI Phases with Commodity WiFi Devices,” IEEE Transactions on Mobile Computing, vol. 17, no. 9, pp. 2155-2165, 2018). Among these imperfections, the most significant are: (i) the carrier frequency offset (CFO), which originates from the difference between the carrier frequency at transmitter and receiver sides; (ii) the sampling frequency offset (SFO), which is due to clocks synchronization error; (iii) the packet detection delay (PDD), i.e., the receiver decoding time; (iv) the phase-locked loop offset (PPO), which is associated with the random generation of the initial signal phase by the phase-locked loop module; and (v) the phase ambiguity (PA), which accounts for the phase difference (multiples of a) among the signals at the transmitter antennas. By considering these contributions, the overall phase offset, θ.sub.offs,k,m,n, can be formulated as
θ.sub.offs,k,m,n=θ.sub.CFO−2πk(τ.sub.SFO+τ.sub.PDD)/T+θ.sub.PPO+θ.sub.PA , (9)
and, in turn, the CFR estimated at the beamformee during the channel sounding procedure becomes
Ĥ.sub.k,m,n=H.sub.k,m,ne.sup.jθ.sup.
[0128] Besides the PDD, all the other contributions to Eq. (9) are associated with imperfections at the transmitter device, which is the target of the fingerprinting technique, i.e., the AP. An intuition is that the beamforming feedback matrix {tilde over (V)}—derived from H as discussed in Section III-B—would be affected by the phase offsets (i)-(v). Thus, the offsets cleaning method of (F. Meneghello, D. Garlisi, N. Dal Fabbro, I. Tinnirello, and M. Rossi, “Environment and Person Independent Activity Recognition with a Commodity IEEE 802.11ac Access Point,” arXiv preprint arXiv: 2103.09924, 2021) may be used to improve its quality. Along this line of reasoning,
[0129]
DeepCSI performance in the presence of beamformer mobility.
[0130]
[0131] The robustness of DeepCSI on beamformer's mobility is evaluated through dataset D2. In
[0132] Disclosed herein are example embodiments of a novel approach to Wi-Fi radio fingerprinting (RFP) which leverages IEEE 802.11-compliant steering matrices to authenticate Wi-Fi devices. Such disclosure enables the following key advances:
[0133] For the first time, the feasibility of RFP for MU-MIMO Wi-Fi is demonstrated. To this end, DeepCSI leverages the beamforming feedback matrices computed by any of the beamformees and transmitted in clear (non-encrypted) to the beamformer. Results disclosed herein verify that the matrices are affected by the beamformer hardware imperfections and, in turn, can be used to identify the device. Moreover, the feedback is not affected by inter-stream and inter-user interference, thus, increasing robustness. DeepCSI is independent of the number of beamformees associated with the target beamformer: different beamformer's fingerprints can be computed, one from each beamformee. Conversely from prior work, DeepCSI does not require direct CSI computation and, in turn, can be run on any Wi-Fi device without requiring SDRs.
[0134] A massive data collection campaign was performed with off-the-shelf Wi-Fi equipment, where 10 Wi-Fi radios emit MU-MIMO signals in different positions. Experimental results indicate that DeepCSI is able to correctly identify the transmitter with accuracy above 98%. We have evaluated DeepCSI fingerprinting accuracy by differentiating the set of positions for the devices at training and testing times. An example embodiment of a technique disclosed herein achieves accuracy of 73% when training is performed on a more balanced set of spatial points, which allows the classifier to interpolate the training patterns for the missing points, using those from adjacent training positions.
[0135] For the first time, the proposed RFP technique is evaluated with moving Wi-Fi devices. DeepCSI reaches an accuracy above 82%, showing the robustness of the learned fingerprint to changing radio channel conditions. Results disclosed herein show that the higher the variability in the traffic traces used for the training phase, the higher is the accuracy when the method is used at run-time to identify the devices. This indicates the need for extensive datasets to train effective RFP methods. In this vision, the datasets are shared (F. Meneghello, M. Rossi, and F. Restuccia, “DeepCSI—code and datasets,” https://github.com/signetlabdei/DeepCSI, 2022).
[0136]
[0137] Further example embodiments disclosed herein may be configured using a computer program product; for example, controls may be programmed in software for implementing example embodiments. Further example embodiments may include a non-transitory computer-readable-medium that contains instructions that may be executed by a processor, and, when loaded and executed, cause the processor to complete methods and techniques described herein. It should be understood that elements of the block and flow diagrams may be implemented in software or hardware, such as via one or more arrangements of the circuitry of
[0138] In addition, the elements of the block and flow diagrams described herein may be combined or divided in any manner in software, hardware, or firmware. If implemented in software, the software may be written in any language that can support the example embodiments disclosed herein. The software may be stored in any form of computer-readable medium, such as random-access memory (RAM), read only memory (ROM), compact disk read-only only memory (CD-ROM), and so forth. In operation, a general purpose or application-specific processor or processing core loads and executes software in a manner well understood in the art. It should be understood further that the block and flow diagrams may include more or fewer elements, be arranged or oriented differently, or be represented differently. It should be understood that implementation may dictate the block, flow, and/or network diagrams and the number of block and flow diagrams illustrating the execution of embodiments disclosed herein.
[0139] The teachings of all patents, published applications and references cited herein are incorporated by reference in their entirety.
[0140] While example embodiments have been particularly shown and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the embodiments encompassed by the appended claims.