Watermarking and Anomaly Detection in Machine Learning Models for LORA RF Fingerprinting

📅 2025-09-18
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses security vulnerabilities in radio-frequency fingerprint identification (RFFI), where deep learning models are susceptible to model copying, tampering, and evasion attacks. To this end, we propose a verifiable and tamper-resistant LoRa device authentication system. Methodologically, it integrates triple ownership watermarking—comprising adversarial training–based embedding, gradient-weight signature, and VAE latent-space watermarking—with out-of-distribution anomaly detection enabled by a convolutional variational autoencoder (with KL annealing and free-bits regularization). Feature extraction employs ResNet-34 on log-Mel spectrograms. Evaluated on a LoRa dataset, the system achieves 94.6% classification accuracy, 98% watermark success rate, and an AUROC of 0.94 for anomaly detection. These results demonstrate significant improvements in both model copyright protection and input robustness, thereby enhancing the security and practicality of RFFI systems.

Technology Category

Application Category

📝 Abstract
Radio frequency fingerprint identification (RFFI) distinguishes wireless devices by the small variations in their analog circuits, avoiding heavy cryptographic authentication. While deep learning on spectrograms improves accuracy, models remain vulnerable to copying, tampering, and evasion. We present a stronger RFFI system combining watermarking for ownership proof and anomaly detection for spotting suspicious inputs. Using a ResNet-34 on log-Mel spectrograms, we embed three watermarks: a simple trigger, an adversarially trained trigger robust to noise and filtering, and a hidden gradient/weight signature. A convolutional Variational Autoencoders (VAE) with Kullback-Leibler (KL) warm-up and free-bits flags off-distribution queries. On the LoRa dataset, our system achieves 94.6% accuracy, 98% watermark success, and 0.94 AUROC, offering verifiable, tamper-resistant authentication.
Problem

Research questions and friction points this paper is trying to address.

Protecting machine learning models from copying and tampering
Detecting anomalous inputs to prevent evasion attacks
Ensuring verifiable ownership and robust RF authentication
Innovation

Methods, ideas, or system contributions that make the work stand out.

ResNet-34 for LoRa spectrogram analysis
Three watermark types for ownership protection
Convolutional VAE with KL warm-up detection
🔎 Similar Papers
No similar papers found.