Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation

Z Lu, W Xu, M Tu, X Xie, C Hua, N Cheng�- arXiv preprint arXiv�…, 2024 - arxiv.org
Z Lu, W Xu, M Tu, X Xie, C Hua, N Cheng
arXiv preprint arXiv:2406.07349, 2024arxiv.org
Radio Frequency (RF) fingerprinting is to identify a wireless device from its uniqueness of
the analog circuitry or hardware imperfections. However, unlike the MAC address which can
be modified, such hardware feature is inevitable for the signal emitted to air, which can
possibly reveal device whereabouts, eg, a sniffer can use a pre-trained model to identify a
nearby device when receiving its signal. Such fingerprint may expose critical private
information, eg, the associated upper-layer applications or the end-user. In this paper, we�…
Radio Frequency (RF) fingerprinting is to identify a wireless device from its uniqueness of the analog circuitry or hardware imperfections. However, unlike the MAC address which can be modified, such hardware feature is inevitable for the signal emitted to air, which can possibly reveal device whereabouts, e.g., a sniffer can use a pre-trained model to identify a nearby device when receiving its signal. Such fingerprint may expose critical private information, e.g., the associated upper-layer applications or the end-user. In this paper, we propose to erase such RF feature for wireless devices, which can prevent fingerprinting by actively perturbation from the signal perspective. Specifically, we consider a common RF fingerprinting scenario, where machine learning models are trained from pilot signal data for identification. A novel adversarial attack solution is designed to generate proper perturbations, whereby the perturbed pilot signal can hide the hardware feature and misclassify the model. We theoretically show that the perturbation would not affect the communication function within a tolerable perturbation threshold. We also implement the pilot signal fingerprinting and the proposed perturbation process in a practical LTE system. Extensive experiment results demonstrate that the RF fingerprints can be effectively erased to protect the user privacy.
arxiv.org