Attention is Needed for RF Fingerprinting

被引:5
|
作者
Gu, Hanqing [1 ]
Su, Lisheng [1 ,2 ]
Zhang, Weifeng [3 ]
Ran, Chuan [4 ]
机构
[1] Zhejiang JEC Elect Co Ltd, Jiaxing 314036, Zhejiang, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Elect Sci & Engn, Chengdu 610056, Peoples R China
[3] Jiaxing Univ, Coll Informat Sci & Engn, Jiaxing 314041, Peoples R China
[4] IBM Corp, Durham, NC 27703 USA
关键词
Radio frequency; Feature extraction; Wireless communication; Convolutional neural networks; Communication system security; Task analysis; Fingerprint recognition; Spatial resolution; Deep learning; Neural networks; RF fingerprinting; channel attention; spatial attention; deep neural networks; WIRELESS SECURITY; FUSION;
D O I
10.1109/ACCESS.2023.3305533
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency (RF) fingerprinting is a novel solution for identifying a unique radio from a large pool of devices by analyzing the subtle characteristics that are inherent in the radio waveform. Deep convolutional neural networks have been widely used to handle the RF fingerprinting task because of their exceptional capacity for representation learning. However, there are still challenges in employing deep convolutional neural networks, such as how to enable the model learn more robust and discriminative RF fingerprints. This paper aims to explore new model architectures to learn robust RF fingerprints. Hence we proposes a novel Dual Attention Convolution module that simultaneously learns channel attention and spatial attention to tune the RF fingerprints, enhancing the convolutional layers' potential for representation learning. Our proposed module is lightweight and plug-and-play. A number of convolutional neural networks can be equipped with our module, which enables them to extract robust and discriminative RF fingerprints. Our approach has been extensively tested through experimental trials, and the results have demonstrated its effectiveness. It is shown that the performance of convolutional neural networks on RF fingerprinting can be improved 1.5% on average, and DAConv-ResNet50 which combined ResNet50 and our Dual Attention Convolution module can achieve 95.6% recognition accuracy on 10 USRP X310.
引用
收藏
页码:87316 / 87329
页数:14
相关论文
共 50 条
  • [31] NEEDED - MORE ATTENTION PAID TO OPERATORS
    CARMICHAEL, GM
    WATER & WASTES ENGINEERING, 1978, 15 (09): : 67 - 72
  • [32] Not All Attention Is Needed: Gated Attention Network for Sequence Data
    Xue, Lanqing
    Li, Xiaopeng
    Zhang, Nevin L.
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 6550 - 6557
  • [33] Noise pollution: more attention is needed
    不详
    LANCET REGIONAL HEALTH-EUROPE, 2023, 24
  • [34] ATTENTION NEEDED ON MEDIUM LEVEL WASTE
    BARTLETT, DT
    HILL, MD
    NUCLEAR ENGINEERING INTERNATIONAL, 1980, 25 (303): : 45 - 45
  • [35] More attention needed for small pets
    Haneveld, Johan Klein
    TIJDSCHRIFT VOOR DIERGENEESKUNDE, 2012, 137 (09) : 601 - 603
  • [36] Needed: Serious attention to sterile products
    Myers, CE
    AMERICAN JOURNAL OF HEALTH-SYSTEM PHARMACY, 1996, 53 (21) : 2582 - 2582
  • [37] SCIENTIFIC EXPERTS - MORE ATTENTION NEEDED
    FENN, P
    SPECK, C
    OSHEA, M
    NATURE, 1995, 378 (6558) : 754 - 754
  • [38] A Low Complexity Feature Extraction for the RF Fingerprinting Process
    Li, Yushan
    Chen, Liufei
    Chen, Jie
    Xie, Feiyi
    Chen, Songlin
    Wen, Hong
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [39] Deep Learning for RF Fingerprinting: A Massive Experimental Study
    Jian, Tong
    Rendon, Bruno Costa
    Ojuba, Emmanuel
    Soltani, Nasim
    Wang, Zifeng
    Sankhe, Kunal
    Gritsenko, Andrey
    Dy, Jennifer
    Chowdhury, Kaushik
    Ioannidis, Stratis
    IEEE Internet of Things Magazine, 2020, 3 (01): : 50 - 57
  • [40] A novel RF fingerprinting approach for hardware integrated security
    Kheir, Mohamed
    Kreft, Heinz
    Knoechel, Reinhard
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (02) : 143 - 148