In a spoofing attack, an attacker impersonates a legitimate user to access or tamper with data intended for or produced by the legitimate user. In wireless communication systems, these attacks may be detected by relying on features of the channel and transmitter radios. In this context, a popular approach is to exploit the dependence of the received signal strength (RSS) at multiple receivers or access points with respect to the spatial location of the transmitter. Existing schemes rely on long-term estimates, which makes it difficult to distinguish spoofing from movement of a legitimate user. This limitation is here addressed by means of a deep neural network that implicitly learns the distribution of pairs of short-term RSS vector estimates. The adopted network architecture imposes the invariance to permutations of the input (commutativity) that the decision problem exhibits. The merits of the proposed algorithm are corroborated on a data set that we collected.
翻译:在无线通信系统中,这些攻击可以通过依赖频道和发射机无线电的特征来探测。在这方面,流行的做法是利用接收信号强度(RSS)在多个接收器或接入点对发射机空间位置的依赖性。现有办法依赖长期估计,因此难以区分假冒和合法用户的移动性。这里采用的是深层神经网络,暗中了解短期RSS矢量估计数的配对分布。所采用的网络结构规定,决定问题所显示的输入(对等性)的变异性。我们收集的数据集证实了拟议算法的优点。