Protocol-agnostic and Data-free Backdoor Attacks on Pre-trained Models in RF Fingerprinting

📅 2025-05-01
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Unsupervised pre-trained models (PTMs) for radio-frequency (RF) fingerprinting face emerging threats from data-free backdoor attacks, yet existing methods require access to training data, labels, or downstream tasks. Method: This paper proposes the first protocol-agnostic PTM backdoor attack under strictly data-free, label-free, and downstream-task-inaccessible conditions. Its core innovation lies in establishing a mapping between learnable triggers and predefined output representations (PORs), integrated with feature-space trigger synthesis, POR-guided implicit backdoor training, and cross-protocol signal representation alignment—enabling end-to-end, data-free backdoor injection. Contribution/Results: Extensive experiments demonstrate attack success rates exceeding 92% across diverse RF protocols (Wi-Fi, LoRa, BLE), multiple PTMs, and downstream tasks, while evading state-of-the-art detection methods. This work breaks the conventional paradigm reliant on data access or fine-tuning, establishing a new benchmark for security evaluation of PTMs in RF systems.

Technology Category

Application Category

📝 Abstract
While supervised deep neural networks (DNNs) have proven effective for device authentication via radio frequency (RF) fingerprinting, they are hindered by domain shift issues and the scarcity of labeled data. The success of large language models has led to increased interest in unsupervised pre-trained models (PTMs), which offer better generalization and do not require labeled datasets, potentially addressing the issues mentioned above. However, the inherent vulnerabilities of PTMs in RF fingerprinting remain insufficiently explored. In this paper, we thoroughly investigate data-free backdoor attacks on such PTMs in RF fingerprinting, focusing on a practical scenario where attackers lack access to downstream data, label information, and training processes. To realize the backdoor attack, we carefully design a set of triggers and predefined output representations (PORs) for the PTMs. By mapping triggers and PORs through backdoor training, we can implant backdoor behaviors into the PTMs, thereby introducing vulnerabilities across different downstream RF fingerprinting tasks without requiring prior knowledge. Extensive experiments demonstrate the wide applicability of our proposed attack to various input domains, protocols, and PTMs. Furthermore, we explore potential detection and defense methods, demonstrating the difficulty of fully safeguarding against our proposed backdoor attack.
Problem

Research questions and friction points this paper is trying to address.

Investigates data-free backdoor attacks on pre-trained RF fingerprinting models
Explores vulnerabilities in PTMs without downstream data or label access
Demonstrates wide attack applicability across domains and protocols
Innovation

Methods, ideas, or system contributions that make the work stand out.

Protocol-agnostic backdoor attacks on PTMs
Data-free triggers and predefined output representations
No prior knowledge needed for attack implementation
T
Tianya Zhao
Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL 33199, US
N
Ningning Wang
Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL 33199, US
J
Junqing Zhang
Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, L69 3GJ, United Kingdom
Xuyu Wang
Xuyu Wang
Assistant Professor of Computer Science, Florida International University
Wireless Sensing6GTrustworthy AIAI for HealthIoT Security