skip to main content
10.1145/3460120.3485344acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation

Published:13 November 2021Publication History

ABSTRACT

Despite being primarily developed for spectrum management, sharing, and enforcement in civilian and military applications, modulation classification can be exploited by an adversary to threaten user privacy (e.g., via traffic analysis), or launch jamming and spoofing attacks. Several existing works study how an adversary can still classify the user traffic despite obfuscation techniques at upper layers, but little work has been done on how an adversary can classify the "modulation scheme'' when it is obfuscated at the physical layer. In this respect, we aim to study how to break the state-of-the-art modulation obfuscation schemes by applying various machine learning (ML) methods. Our preliminary results show that common ML techniques perform poorly in correctly classifying an obfuscated modulation scheme except for the random forest method (with a score as much as twice the other techniques we consider), providing insights on why other techniques, e.g., deep learning, might be more promising for finding underlying correlations.

References

  1. Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted!. In Proc. of the ACM Conference on Security and Privacy in Wireless and Mobile Netw. (WiSec '20). Linz, Austria, 207--218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Inkyu Bang and Taehoon Kim. 2020. Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems. IEEE Access, Vol. 8 (2020), 197644--197653.Google ScholarGoogle ScholarCross RefCross Ref
  3. Kelly Hill. 2021. CTIA: Wireless investment hit 5-year high in 2020. (July 2021). Retrieved August 11, 2021 from https://www.rcrwireless.com/20210728/5g/ctia-wireless-investment-hit-5-year-high-in-2020Google ScholarGoogle Scholar
  4. Erma Perenda, Sreeraj Rajendran, Gerome Bovet, Sofie Pollin, and Mariya Zheleva. 2021. Learning the Unknown: Improving Modulation Classification Performance in Unseen Scenarios. In Proc. of the IEEE Conference on Comput. Commun. (INFOCOM '21). Virtual Conference.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hanif Rahbari and Marwan Krunz. 2016. Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier. IEEE Trans. on Inf. Forensics and Security, Vol. 11, 12 (2016), 2732--2747.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Tasnuva Tithi, Bhaswati Deka, Ryan M. Gerdes, Chris Winstead, Ming Li, and Kevin Heaslip. 2018. Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways. IEEE Trans. on Veh. Technol., Vol. 67, 8 (2018), 7437--7449.Google ScholarGoogle ScholarCross RefCross Ref
  7. Triet D. Vo-Huu and Guevara Noubir. 2015. Mitigating Rate Attacks through Crypto-Coded Modulation. In Proc. of the ACM International Symposium on Mobile Ad Hoc Netw. and Comput. (MobiHoc '15). Hangzhou, China, 237--246.Google ScholarGoogle Scholar
  8. Wei Xiong, Petko Bogdanov, and Mariya Zheleva. 2021. MODELESS: MODulation rEcognition with LimitEd SuperviSion. In Proc. of the IEEE Int. Conference on Sensing, Commun., and Netw. (SECON '21). Virtual Conference.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wei Xiong, Karyn Doke, Petko Bogdanov, and Mariya Zheleva. 2020. LinksIQ: Robust and Efficient Modulation Recognition with Imperfect Spectrum Scans. ArXiv, Vol. abs/2005.04149 (2020).Google ScholarGoogle Scholar
  10. Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, and Xue Liu. 2014. Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Trans. on Wireless Commun., Vol. 13, 1 (2014), 86--98.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
      November 2021
      3558 pages
      ISBN:9781450384544
      DOI:10.1145/3460120

      Copyright © 2021 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2021

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader