Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
\floatsetup

[table]capposition=top

Channel Reciprocity Based Attack Detection for Securing UWB Ranging by Autoencoder

1Wenlong Gou, 1Chuanhang Yu, 1Juntao Ma, 1Gang Wu, 2Vladimir Mordachev {gouwenlong, chuanhangyu, juntaoma}@std.uestc.edu.cn,
wugang99@uestc.edu.cn (corresponding author), mordachev@bsuir.by
1 National Key Laboratory of Wireless Communications,
University of Electronic Science and Technology of China, Chengdu, China
2 Belarusian State University of Informatics and Radioelectronics
Abstract

A variety of ranging threats represented by Ghost Peak attack have raised concerns regarding the security performance of Ultra-Wide Band (UWB) systems with the finalization of the IEEE 802.15.4z standard. Based on channel reciprocity, this paper proposes a low complexity attack detection scheme that compares Channel Impulse Response (CIR) features of both ranging sides utilizing an autoencoder with the capability of data compression and feature extraction. Taking Ghost Peak attack as an example, this paper demonstrates the effectiveness, feasibility and generalizability of the proposed attack detection scheme through simulation and experimental validation. The proposed scheme achieves an attack detection success rate of over 99% and can be implemented in current systems at low cost.

Index Terms:
Ultra-Wideband, channel reciprocity, Channel Impulse Response, autoencoder

I Introduction

Ultra-Wideband (UWB) characterized by high resistance to multipath fading[1] and low power consumption offers centimeter-level ranging precision, which has garnered significant attention in various fields such as keyless car entry and mobile payment[2, 3]. Despite the new release of IEEE 802.15.4z standard in 2020 which has enhanced the accuracy and security of ranging by introducing Scrambled Timestamp Sequence(STS) encrypted by the Advanced Encryption Standard (AES)[4] , ranging security remains a critical consideration. For the IEEE 802.15.4a protocol, Poturalski et al. [5] proposed the Cicada attack that continuously injects UWB pulses into the receiver during the legitimate transmission of the preamble, in addition to the Early Detection/Late Commitment (ED/LC) attack scheme that leverages the predictability of the signal structure within the preamble[6]. Targeting the IEEE 802.15.4z protocol, the Cicada++ attack executes the distance attack by transmitting pseudo-random STS signals to alter the timestamps of received signals, whereas the Adaptive Injection Attack (AIA) can further refine the attack precision by controlling the placement of injected attack signals[7]. Patrick Leu et al. [8] conducted the Ghost Peak attack achieving a success rate of up to 4% on commercially available Apple U1 and Qorvo UWB chips. In [9], Claudio Anliker et al. also proposed and demonstrated the Mix-Down attack, which exploits the clock drift of transceivers.

To defend against these distance attacks, there are some methods that have been proposed, e.g., a ranging scheme combining Time of Flight (TOF) and Received Signal Strength (RSS) is proposed in [10], aiming to effectively mitigate distance fraud. Additionally, Chen H et al. [11] designed the UnSpoof UWB localization system capable of pinpointing the position of both the attacker and the legitimate device, and Kiseok Kim et al. [12] proposed a UWB localization system for vehicles based on Directed-Acyclic Graph (DAG) structure to enhance security. However, how to efficiently detect attacks in the process of UWB secure ranging is also an urgent problem that is often neglected.

It is worth noting that attacks such as Ghost Peak require sniffing in advance of the attack, and attacks like Cicada require constant attempts to succeed. Therefore, effective detection of attacks is crucial for enhancing the security performance of UWB systems. In [13], Mridula Singh presented a novel modulation technique to detect distance enlargement attacks relying on the interleaving of pulses of different phases. Kyungho Joo et al. [14] achieved an attack detection success rate of 96.24% by leveraging the consistency of cross-correlation results between the sub-fields of STS and local templates. Towards the upcoming IEEE 802.15.4ab protocol, Li Sun et al. [15] proposed an integrity protection mechanism based on time-reversal to detect interference, and they also suggested adding a new STS configuration to support integrity protection. Nevertheless, most of the defense schemes against distance attacks modify the established UWB physical layer standards to a large extent, increasing the expenses of practical deployments [16].

The UWB channel provides more possibilities for attack detection. Previously, the security and robustness of secret key generation method using UWB channels have been investigated in [17]. Furthermore, Philipp Peterseil et al. presented a trustworthiness score based on autoencoders trained on Channel Impulse Response (CIR), which could remarkably improve ranging accuracy in [18]. Inspired by the aforementioned work, this paper proposes an attack detection scheme utilizing channel reciprocity and autoencoders, which could enhance the security performance of the existing UWB system effectively. Different from above work, the proposed scheme achieves a low complexity end-to-end attack detection based on existing standards by using only the encoder module of the autoencoder which is trained for CIR feature extraction in the offline training phase. Our main contributions can be summarized as follows:

  • The channel reciprocity in UWB ranging process is analysed, and based on the analysis an attack detection scheme by comparing the CIR of both ranging sides is proposed, which achieves the high reliability of UWB ranging and maintains the current physical layer specification. The feasibility of the proposed scheme is validated through simulation and experiments.

  • Leveraging the designed autoencoder with a high capacity of data compression trained on simulation data only, the proposed attack detection scheme offers a relatively low cost for transmission, and the generalizability of the scheme is validated through practical deployment.

II System Model and problem Formulation

II-A Classic UWB Ranging Model

Classic UWB ranging methods primarily consist of Single Side-Two Way Ranging (SS-TWR) and Double Side-Two Way Ranging (DS-TWR). Compared with the simple SS-TWR, the DS-TWR method where both the transmitter and receiver exchange a total of three ranging messages can effectively alleviate the impacts of clock drift and other factors[19]. The distance can be estimated as:

d=cTprop=Tround1×Tround2T reply1×T reply2T round1+T round2+Treply1+T reply2c,𝑑𝑐subscript𝑇propsubscript𝑇subscriptround1subscript𝑇subscriptround2subscript𝑇subscript reply1subscript𝑇subscript reply2subscript𝑇subscript round1subscript𝑇subscript round2subscript𝑇subscriptreply1subscript𝑇subscript reply2𝑐d=c\cdot T_{\text{prop}}=\frac{T_{\text{{round}}_{\text{1}}}\times T_{\text{{% round}}_{\text{2}}}-T_{\text{{ reply}}_{\text{1}}}\times T_{\text{{ reply}}_{% \text{2}}}}{T_{\text{{ round}}_{\text{1}}}+T_{\text{{ round}}_{\text{2}}}+T_{% \text{{reply}}_{\text{1}}}+T_{\text{{ reply}}_{\text{2}}}}c,italic_d = italic_c ⋅ italic_T start_POSTSUBSCRIPT prop end_POSTSUBSCRIPT = divide start_ARG italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT × italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT - italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT × italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG start_ARG italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT + italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT + italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT + italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG italic_c , (1)

where the time intervals Tround1subscript𝑇subscriptround1T_{\text{{round}}_{\text{1}}}italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT, Tround2subscript𝑇subscriptround2T_{\text{{round}}_{\text{2}}}italic_T start_POSTSUBSCRIPT round start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT, T reply1subscript𝑇subscript reply1T_{\text{{ reply}}_{\text{1}}}italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT, T reply2subscript𝑇subscript reply2T_{\text{{ reply}}_{\text{2}}}italic_T start_POSTSUBSCRIPT reply start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT are shown in Fig. 1, c𝑐citalic_c refers to the speed of light.

The reception timestamps used for calculating the time intervals are obtained through STS cross-correlation:

ti=gLE(𝒔STS,𝒔STS),i𝕄,formulae-sequencesubscript𝑡𝑖subscript𝑔LEsubscript𝒔STSsubscriptsuperscript𝒔bold-′STS𝑖𝕄t_{i}=g_{\text{LE}}(\boldsymbol{s_{\text{STS}}},\boldsymbol{s^{\prime}_{\text{% STS}}}),i\in\mathbb{M},italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_g start_POSTSUBSCRIPT LE end_POSTSUBSCRIPT ( bold_italic_s start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT , bold_italic_s start_POSTSUPERSCRIPT bold_′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ) , italic_i ∈ blackboard_M , (2)

where the optional message set 𝕄𝕄\mathbb{M}blackboard_M is {Poll,Response,Final}PollResponseFinal\{\text{Poll},\text{Response},\text{Final}\}{ Poll , Response , Final }, 𝒔STSsubscript𝒔STS\boldsymbol{s_{\text{STS}}}bold_italic_s start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT and 𝒔STSsubscriptsuperscript𝒔bold-′STS\boldsymbol{s^{\prime}_{\text{STS}}}bold_italic_s start_POSTSUPERSCRIPT bold_′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT denote loacl STS and received STS respectively, gLE(,)subscript𝑔LEg_{\text{LE}}(\cdot,\cdot)italic_g start_POSTSUBSCRIPT LE end_POSTSUBSCRIPT ( ⋅ , ⋅ ) denotes the leading edge detection algorithm based on the Back-Search Time Window (BTW) [7]. This detection algorithm is primarily determined by two thresholds: the Maximum Peak to Early Peak Ratio (MPEP) , indicating the ratio between the main path and the first path, and the Peak to Average Power Ratio (PAPR), representing the ratio between peak and average power. Only when both thresholds are satisfied can it be identified as the first path.

The attack detection scheme proposed in this paper is suitable for a wide range of distance attacks, with the Ghost Peak attack used as an illustrative example. During the reception of the Response or Final message of the legitimate devices, the attacker transmits an attack signal in which the STS segment, whose power is significantly higher than the legitimate signal, is forged by the attacker. These attack signals can alter the timestamps tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT obtained through the leading edge detection algorithm gLEsubscript𝑔LEg_{\text{LE}}italic_g start_POSTSUBSCRIPT LE end_POSTSUBSCRIPT, resulting in a shortened measured distance d𝑑ditalic_d[8]. The primary process of the Ghost Peak attack is depicted in Fig. 1 (taking the attack on the Response as an example).

Refer to caption
Figure 1: The principle of DS-TWR and Ghost Peak attack

II-B Improved Integrity check Ranging Model for security

The absence of a detection step for intentional attacks in existing UWB ranging methods makes both ranging sides continue the ranging process completely all the time even if the measured results are obviously wrong (e.g. excessively drastic changes), which also increases the risk of successful attacks and system power consumption. We improve the existing model to enhance its resistance to attacks by adding two modules, i.e., feature extraction and integrity check.

As shown in Fig. 2, after the Responder receives the first Poll message, it performs CIR estimation using preamble and STS respectively:

𝒉𝒋=gCIR(𝒔𝒋,𝒔𝒋),j𝕊,formulae-sequencesubscript𝒉𝒋subscript𝑔CIRsubscript𝒔𝒋subscriptsuperscript𝒔bold-′𝒋𝑗𝕊\boldsymbol{h_{j}}=g_{\text{CIR}}(\boldsymbol{s_{j}},\boldsymbol{s^{\prime}_{j% }}),j\in\mathbb{S},bold_italic_h start_POSTSUBSCRIPT bold_italic_j end_POSTSUBSCRIPT = italic_g start_POSTSUBSCRIPT CIR end_POSTSUBSCRIPT ( bold_italic_s start_POSTSUBSCRIPT bold_italic_j end_POSTSUBSCRIPT , bold_italic_s start_POSTSUPERSCRIPT bold_′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT bold_italic_j end_POSTSUBSCRIPT ) , italic_j ∈ blackboard_S , (3)

where the optional sequence set 𝕊𝕊\mathbb{S}blackboard_S is {preamble, STS}, gCIR(,)subscript𝑔CIRg_{\text{CIR}}(\cdot,\cdot)italic_g start_POSTSUBSCRIPT CIR end_POSTSUBSCRIPT ( ⋅ , ⋅ ) represents CIR estimation function in transceivers, sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and sjsubscriptsuperscript𝑠𝑗s^{\prime}_{j}italic_s start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT denote local templates and received signals. Here we add the feature extraction step utilizing the precise CIR 𝒉STSsubscript𝒉STS\boldsymbol{h_{\text{STS}}}bold_italic_h start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT generated from STS segments. In addition, the Initiator also captures the channel features after receiving the second ranging message. Furthermore, we design an integrity checking mechanism to determine the state of the system (i.e. Normal or Attacked) at that time as a basis to decide whether the ranging process should continue or not. The system judged to be under attack will sound an alarm and enter the suspended state, in which the Initiator decides whether to continue ranging.

Refer to caption

Figure 2: Improved integrity check ranging model

II-C Problem Formulation

Depending on the application scenario, the implementer of the attack detection can be either the Initiator or Responder during the ranging process. Given an observation 𝒉STS𝒎Γsubscriptsuperscript𝒉𝒎STSΓ\boldsymbol{h^{m}_{\text{STS}}}\in\Gammabold_italic_h start_POSTSUPERSCRIPT bold_italic_m end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ∈ roman_Γ (m{Initiator,Responder})𝑚InitiatorResponder(m\in\{\text{Initiator},\text{Responder}\})( italic_m ∈ { Initiator , Responder } ) over the observation space ΓΓ\Gammaroman_Γ of both ranging sides, attack detection can be regarded as a binary hypothesis testing problem, in which the observations may be derived from two possible hypotheses (Normal or Attacked), denoted by H0subscript𝐻0H_{0}italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT and H1subscript𝐻1H_{1}italic_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT. The decision ψ(𝒉STS𝒎)𝜓subscriptsuperscript𝒉𝒎STS\psi(\boldsymbol{h^{m}_{\text{STS}}})italic_ψ ( bold_italic_h start_POSTSUPERSCRIPT bold_italic_m end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ) is made based on the partition of ΓΓ\Gammaroman_Γ:

ψ(𝒉STS𝒎)={D1,𝒉STS𝒎R0D2,𝒉STS𝒎R1,\psi{(\boldsymbol{h^{m}_{\text{STS}}})}=\left\{\begin{matrix}{D_{1},~{}% \boldsymbol{h^{m}_{\text{STS}}}\in R_{0}~{}}\\ {D_{2},~{}\boldsymbol{h^{m}_{\text{STS}}}\in R_{1}},\end{matrix}\right.italic_ψ ( bold_italic_h start_POSTSUPERSCRIPT bold_italic_m end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ) = { start_ARG start_ROW start_CELL italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_italic_h start_POSTSUPERSCRIPT bold_italic_m end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ∈ italic_R start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL italic_D start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , bold_italic_h start_POSTSUPERSCRIPT bold_italic_m end_POSTSUPERSCRIPT start_POSTSUBSCRIPT STS end_POSTSUBSCRIPT ∈ italic_R start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , end_CELL end_ROW end_ARG (4)

where D1subscript𝐷1D_{1}italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and D2subscript𝐷2D_{2}italic_D start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT denote the decision of attacked and normal respectively, while R0subscript𝑅0R_{0}italic_R start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT and R1subscript𝑅1R_{1}italic_R start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT denote the partition area of ΓΓ\Gammaroman_Γ. The design of the attack detection aims to find an efficient partition of observation space ΓΓ\Gammaroman_Γ.

The evaluation metrics of attack detection scheme are generally the probability of false alarm Pfasubscript𝑃faP_{\text{fa}}italic_P start_POSTSUBSCRIPT fa end_POSTSUBSCRIPT and miss detection Pmsubscript𝑃mP_{\text{m}}italic_P start_POSTSUBSCRIPT m end_POSTSUBSCRIPT, which represent the conditional probabilities p(D1|H0)𝑝conditionalsubscript𝐷1subscript𝐻0p(D_{1}|H_{0})italic_p ( italic_D start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ) and p(D0|H1)𝑝conditionalsubscript𝐷0subscript𝐻1p(D_{0}|H_{1})italic_p ( italic_D start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT | italic_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ), respectively.

III Attack Detection Scheme Design

III-A Attack Detection Procedure Based on Channel Reciprocity

Channel reciprocity refers to the fact that when both communication ends carry out signal transmission, the transmission characteristics of the channel remain consistent within a specified time window, regardless of the direction of transmission. During a complete DS-TWR ranging process, it is assumed that the Poll message from the Initiator and the Response message from the Responder experience the identical channel fading, which also reflects the assumption of ToF invariance.

Input: fφ()subscript𝑓𝜑f_{\varphi}\left(\bullet\right)italic_f start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( ∙ ),Qq()subscript𝑄𝑞Q_{q}\left(\bullet\right)italic_Q start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ( ∙ )
Output: state
1while Receive Poll do
2       Gain 𝒉IR[𝒏]subscript𝒉IRdelimited-[]𝒏\boldsymbol{h_{\text{IR}}[n]}bold_italic_h start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT bold_[ bold_italic_n bold_];
3       Calculate 𝒑IRsubscript𝒑IR\boldsymbol{p}_{\text{IR}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT via (7);
4       Embed 𝒑IRsubscript𝒑IR\boldsymbol{p}_{\text{IR}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT in Payload of Response;
5       Send Response;
6      
7 end while
8while Receive Response do
9       Gain 𝒉RI[𝒏]subscript𝒉RIdelimited-[]𝒏\boldsymbol{h_{\text{RI}}[n]}bold_italic_h start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT bold_[ bold_italic_n bold_],𝒉IR[𝒏]subscript𝒉IRdelimited-[]𝒏\boldsymbol{h_{\text{IR}}[n]}bold_italic_h start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT bold_[ bold_italic_n bold_];
10       Calculate 𝒑RIsubscript𝒑RI\boldsymbol{p}_{\text{RI}}bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT via (8);
11       for k=1,2,…,Kpsubscript𝐾𝑝K_{p}italic_K start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT do
12             Compare pIRksuperscriptsubscript𝑝IR𝑘{{p}_{\text{IR}}^{k}}italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT and pRIksuperscriptsubscript𝑝RI𝑘{{p}_{\text{RI}}^{k}}italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT;
13             if pIRksuperscriptsubscript𝑝IR𝑘{p}_{\emph{IR}}^{k}italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT\neqpRIksuperscriptsubscript𝑝RI𝑘{p}_{\emph{RI}}^{k}italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT then
14                  d=d+1𝑑𝑑1d=d+1italic_d = italic_d + 1
15             end if
16            
17       end for
18      if d(𝐩IR,𝐩RI)T𝑑subscript𝐩IRsubscript𝐩RI𝑇d\left({\boldsymbol{p}_{\emph{IR}},\boldsymbol{p}_{\emph{RI}}}\right)\geq Titalic_d ( bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT , bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT ) ≥ italic_T then
19            state= Attacked
20      else
21            state= Normal
22       end if
23      
24 end while
25
Procedure 1 Attack detection

In the standard ranging process, both the Initiator and Responder have the process of channel estimation, i.e., both sides involve Channel Impulse Response (CIR). Utilize the autoencoder to decrease the data dimension of the CIR on both transmitter and receiver sides, mapping the lengthy data vector into a concise feature vector. The mapping process is:

𝒔=fφ(𝒉[𝒏]),𝒔subscript𝑓𝜑𝒉delimited-[]𝒏\boldsymbol{s}=f_{\varphi}(\boldsymbol{h[n]}),bold_italic_s = italic_f start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( bold_italic_h bold_[ bold_italic_n bold_] ) , (5)

where φ𝜑\varphiitalic_φ denotes the coefficients of the encoder module in the autoencoder and 𝒉[𝒏]𝒉delimited-[]𝒏\boldsymbol{h[n]}bold_italic_h bold_[ bold_italic_n bold_] denotes the input CIR sequence.

Further quantify the extracted low-dimensional feature:

𝒑=Qq(𝒔),𝒑subscript𝑄𝑞𝒔\boldsymbol{p}=Q_{q}\left(\boldsymbol{s}\right),bold_italic_p = italic_Q start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ( bold_italic_s ) , (6)

where Q()𝑄Q(\cdot)italic_Q ( ⋅ ) denotes the quantization process and q𝑞qitalic_q denotes the quantity of quantization bits.

Without loss of generality, it is assumed that the attacker attacks the Response message. In a complete DS-TWR process, the Responder estimates the CIR 𝒉IR[𝒏]subscript𝒉IRdelimited-[]𝒏\boldsymbol{h_{\text{IR}}[n]}bold_italic_h start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT bold_[ bold_italic_n bold_] at this time after receiving the Poll message. Subsequently, the Responder sends 𝒉IR[𝒏]subscript𝒉IRdelimited-[]𝒏\boldsymbol{h_{\text{IR}}[n]}bold_italic_h start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT bold_[ bold_italic_n bold_] to the autoencoder for encoding, followed by quantization to obtain 𝒑IRsubscript𝒑IR\boldsymbol{p}_{\text{IR}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT:

𝒑IR=Qq(fφ(𝒉IR[𝒏])).subscript𝒑IRsubscript𝑄𝑞subscript𝑓𝜑subscript𝒉IRdelimited-[]𝒏\boldsymbol{p}_{\text{IR}}=Q_{q}(f_{\varphi}(\boldsymbol{h_{\text{IR}}\left[n% \right]})).bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT = italic_Q start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( bold_italic_h start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT bold_[ bold_italic_n bold_] ) ) . (7)

The Response message containing 𝒑IRsubscript𝒑IR\boldsymbol{{p}_{\text{IR}}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT is then transmitted by the Responder within the Payload field[4]. Upon receiving the Response message, the Initiator demodulates the Payload field to retrieve 𝒑IRsubscript𝒑IR\boldsymbol{{p}_{\text{IR}}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT as well as performs similar operations as the Responder to acquire 𝒑RIsubscript𝒑RI\boldsymbol{{p}_{\text{RI}}}bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT:

𝒑RI=Qq(fφ(𝒉RI[𝒏])).subscript𝒑RIsubscript𝑄𝑞subscript𝑓𝜑subscript𝒉RIdelimited-[]𝒏\boldsymbol{p}_{\text{RI}}=Q_{q}(f_{\varphi}(\boldsymbol{h_{\text{RI}}\left[n% \right]})).bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT = italic_Q start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ( italic_f start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( bold_italic_h start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT bold_[ bold_italic_n bold_] ) ) . (8)

Then each bit pIRksuperscriptsubscript𝑝IR𝑘{p}_{\text{IR}}^{k}italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT and pRIksuperscriptsubscript𝑝RI𝑘{p}_{\text{RI}}^{k}italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT are individually compared to calculate the Hamming distance between 𝒑IRsubscript𝒑IR\boldsymbol{{p}_{\text{IR}}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT and 𝒑RIsubscript𝒑RI\boldsymbol{{p}_{\text{RI}}}bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT. Ultimately, by comparing this distance with the preset judgment threshold T𝑇{T}italic_T (which can be established through simulation or practical measurement), the attacks can be detected:

{d(𝒑IR,𝒑RI)T,Attacked stated(𝒑IR,𝒑RI)<T,Normal state,\left\{{\begin{matrix}{d({\boldsymbol{p}_{\text{IR}},\boldsymbol{p}_{\text{RI}% }})\geq{T},\text{Attacked state}}\\ {d({\boldsymbol{p}_{\text{IR}},\boldsymbol{p}_{\text{RI}}})\textless{T},\text{% Normal state}},\end{matrix}}\right.{ start_ARG start_ROW start_CELL italic_d ( bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT , bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT ) ≥ italic_T , Attacked state end_CELL end_ROW start_ROW start_CELL italic_d ( bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT , bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT ) < italic_T , Normal state , end_CELL end_ROW end_ARG (9)

where d(,)𝑑d(\cdot,\cdot)italic_d ( ⋅ , ⋅ ) denotes the Hamming distance. The observation space ΓΓ\Gammaroman_Γ is partitioned into two regions through (9). The process of the proposed attack detection scheme is summarized in Procedure 1.

III-B Attack Detection Principles Using Autoencoders

UWB Channel features such as Received Signal Power to First Path Power level ratio, mean excess delay spread, kurtosis, etc., can be directly used to identify the Line of Sight (LOS) and Non-Line of Sight (NLOS) channel[20]. However, in order to prevent attackers from using these obvious features to pass the integrity check and to extract the most representative features of the channel, this paper selects neural networks for feature extraction.

Refer to caption


Figure 3: The structure of designed autoncoder

The autoencoder is one of the most widely used self-supervised neural network structures for data compression and feature extraction, which can extract the most critical features by reproducing the original data[21]. To reduce transmission consumption, We use the autoencoder to encode the CIR to extract its low-dimensional features and the CIRs of both sides exhibit similar characteristics due to the consistency of the channel. Meanwhile, since the attacker’s signal reaches the receiver through a distinct channel, the attack can be detected by contrasting the CIR features of both legitimate sides. Thus, the autoencoder is only fed by the CIRs in the unattacked situation for training.

The structure of the Multilayer Perceptron (MLP) autoencoder designed in this paper is shown in Fig. 3. On the other hand, it is essential to reasonably select the number of encoded feature dimensions and the corresponding quantization bits in order to facilitate transmission.

III-C Complexity Analysis

The complexity of the proposed attack detection scheme is primarily determined by the autoencoder. Therefore, this subsection concentrates on analyzing the complexity of the designed autoencoder, including time complexity and space complexity. Time complexity is quantified by the count of Floating-Point Operations (FLOPs) and space complexity is measured by the aggregate count of model parameters.

The time complexity ctimesubscript𝑐timec_{\text{time}}italic_c start_POSTSUBSCRIPT time end_POSTSUBSCRIPT and space complexity cspacesubscript𝑐spacec_{\text{space}}italic_c start_POSTSUBSCRIPT space end_POSTSUBSCRIPT of the autoencoder can be expressed as:

ctimesubscript𝑐time\displaystyle c_{\text{time}}italic_c start_POSTSUBSCRIPT time end_POSTSUBSCRIPT =d=1D(2Id1)×Jd+d=1D1Jd,absentsuperscriptsubscript𝑑1𝐷2subscript𝐼𝑑1subscript𝐽𝑑superscriptsubscript𝑑1𝐷1subscript𝐽𝑑\displaystyle=\sum_{d=1}^{D}{\left(2I_{d}-1\right)\times\ J_{d}}+\sum_{d=1}^{D% -1}J_{d},= ∑ start_POSTSUBSCRIPT italic_d = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D end_POSTSUPERSCRIPT ( 2 italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT - 1 ) × italic_J start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_d = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D - 1 end_POSTSUPERSCRIPT italic_J start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT , (10a)
cspacesubscript𝑐space\displaystyle c_{\text{space}}italic_c start_POSTSUBSCRIPT space end_POSTSUBSCRIPT =d=1D(Id+1)×Jd,absentsuperscriptsubscript𝑑1𝐷subscript𝐼𝑑1subscript𝐽𝑑\displaystyle=\sum_{d=1}^{D}{\left(I_{d}+1\right)\times\ J_{d}},= ∑ start_POSTSUBSCRIPT italic_d = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D end_POSTSUPERSCRIPT ( italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT + 1 ) × italic_J start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT , (10b)

where D𝐷Ditalic_D denotes the depth of the autoencoder, i.e., the quantity of fully connected layers, Idsubscript𝐼𝑑I_{d}italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT and Jdsubscript𝐽𝑑J_{d}italic_J start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT denote the input and output dimensions of each fully connected layer, respectively.

IV Numerical Simulation Evaluation and Experimental Validation

This section shows the simulation evaluation results of the proposed attack detection scheme, and we also conducted practical validation of its effectiveness using the commercial chip DW3110. The parameter configurations for the legitimate signal and attack signals are detailed in Table I.

TABLE I: Configurations for legitimate and attack signals
Parameter legitimate signals attack signals
mode BPRF BPRF
Preamble spreading factor 4 9
Preamble code index 9 9
SFD number 0 0
modulation BPSK+BPM BPSK+BPM
Payload encoding RS &convolution RS &convolution
samples of per pulse 4 4
Preamble duration 64 64
STS segment length 64 64
Refer to caption
(a) Different input dimensions
Refer to caption
(b) Different output dimensions
Refer to caption
(c) Different quantization bits
Refer to caption
(d) Different threshold coefficients
Figure 4: Performance comparison for different parameters of autoencoder
Refer to caption
(a) Success probability of attack
Refer to caption
(b) Probability distribution curve of ranging error
Refer to caption
(c) False alarm probability Pfasubscript𝑃𝑓𝑎P_{fa}italic_P start_POSTSUBSCRIPT italic_f italic_a end_POSTSUBSCRIPT
Figure 5: Performance of attack detection scheme proposed

The receiver structure is not explicitly specified in the IEEE 802.15.4z standard. In this paper, after shaping filtering and sampling on the received signal, the local SHR and STS fields are employed to correlate with the processed signal to search for the first path using the leading-edge detection algorithm described in Section II. The length of BTW is fixed at 400 samples (with a sampling rate of 2 GHz), MPEP is set to 0.5 and PAPR is set to 2. The RAKE receiver architecture is employed for receiving the PHR and Payload fields. What’s more, all simulations in this paper are performed with a distance of 10 m between the devices and an attack is considered successful if the ranging result is below 5 m.

IV-A Numerical Simulation Evaluation

Let αtsubscript𝛼t\alpha_{\text{t}}italic_α start_POSTSUBSCRIPT t end_POSTSUBSCRIPT denote the threshold coefficient (0<αt<10subscript𝛼t10<\alpha_{\text{t}}<10 < italic_α start_POSTSUBSCRIPT t end_POSTSUBSCRIPT < 1) and THsubscript𝑇HT_{\text{H}}italic_T start_POSTSUBSCRIPT H end_POSTSUBSCRIPT denote the Hamming distance between the quantified CIR features of both sides without attacks, then they are related to the preset judgment threshold T𝑇Titalic_T as follows:

T=αtTH𝑇subscript𝛼tsubscript𝑇HT=\alpha_{\text{t}}\cdot T_{\text{H}}italic_T = italic_α start_POSTSUBSCRIPT t end_POSTSUBSCRIPT ⋅ italic_T start_POSTSUBSCRIPT H end_POSTSUBSCRIPT (11)

Adopting the indoor LOS channel model specified in the IEEE 802.15.4 standard, the CIRs of both sides in the normal ranging process (a total of 20,000 pairs) are divided into a training set and a test set at a ratio of 9:1. Through simulation analysis, the input dimension, output dimension, number of quantization bits and threshold coefficient in the attack detection scheme finalized in this paper are 700, 32, 4 and 0.5, respectively.

Fig. 4 illustrates the impact of various parameters on the performance of attack detection. It shows that the input dimension has a minor effect on the false alarm probability, whereas the miss detection probability decreases significantly as the input dimension increases. There is a positive correlation between the output dimension and performance, aligning with the anticipated outcome that a higher number of output features facilitates differentiation between CIRs of normal and attacked state. Nevertheless, larger output dimensions imply higher costs and an elevated risk of overfitting, which requires a trade-off between performance and complexity.

As shown in Fig. 4(c), a gradual rise in false alarm probability and a decline in miss detection probability are observed with the increase of quantization bits. A higher number of quantization bits lead to more total bits of extracted feature data, which results in the Hamming distance between 𝒑IRsubscript𝒑IR\boldsymbol{p}_{\text{IR}}bold_italic_p start_POSTSUBSCRIPT IR end_POSTSUBSCRIPT and 𝒑RIsubscript𝒑RI\boldsymbol{p}_{\text{RI}}bold_italic_p start_POSTSUBSCRIPT RI end_POSTSUBSCRIPT is more likely to be larger than the preset threshold. Fig. 4(d) illustrates how the threshold impacts detection performance, aligning with the general knowledge that raising the threshold decreases false alarm probability but increases miss detection probability.

Furthermore, the time and space complexity of the designed scheme are 1,670,692 FLOPs and 838,180 parameters, as calculated from (10a) (10b), respectively.

Adopting the proposed attack detection scheme, we simulated 10,000 DS-TWR ranging processes under Ghost Peak attack with various parameter configurations. We conducted statistical calculations for the success probability of attack Pssubscript𝑃sP_{\text{s}}italic_P start_POSTSUBSCRIPT s end_POSTSUBSCRIPT, the probability distribution of ranging error Prsubscript𝑃rP_{\text{r}}italic_P start_POSTSUBSCRIPT r end_POSTSUBSCRIPT and false alarm probability Pfasubscript𝑃faP_{\text{fa}}italic_P start_POSTSUBSCRIPT fa end_POSTSUBSCRIPT. The obtained results are shown in Fig. 5. The SIR in Fig. 5 represents the ratio of STS power of the legitimate signal to the attack signal, while SNR denotes the signal-to-noise ratio in the environment. The results indicate that the proposed scheme can effectively detect attacks. Fig. 5(a) shows that the success probability of attack detection can exceed 99% with 4 quantization bits and surpass 95% with 2 quantization bits. Fig. 5(b) illustrates the probability distribution curve of ranging error, showing that the proposed scheme can effectively reduce ranging error in a large extent, and the result when using 4-bit quantization is slightly better than 1-bit quantization. Fig. 5(c) depicts the curve of false alarm probability with respect to SNR. Whereas the false alarm probability with SNR has little difference, it tends to increase to some extent as the power of the attack signal decreases. This may be attributed to the insufficient power of the attack signal, resulting in an insufficient distinction in the CIR between both sides, thereby increasing the false alarm probability.

IV-B Experimental Validation

Refer to caption

Figure 6: Practical test environment

We utilized the commercial ranging device equipped with the DW3110 chip to build a Ghost Peak attack scenario. The attack detection model, obtained by offline training using simulation data, was practically deployed to validate the proposed scheme in an indoor 10m test environment, as shown in Fig. 6. The STS mode of the chip was switched to the SDC mode which is more likely to be attacked successfully[22], with the statistically measured results shown in Table II.

TABLE II: The result of practical validation
Befor detection After detection
Pssubscript𝑃sP_{\text{s}}italic_P start_POSTSUBSCRIPT s end_POSTSUBSCRIPT Pfasubscript𝑃faP_{\text{fa}}italic_P start_POSTSUBSCRIPT fa end_POSTSUBSCRIPT Pmsubscript𝑃mP_{\text{m}}italic_P start_POSTSUBSCRIPT m end_POSTSUBSCRIPT Pssubscript𝑃sP_{\text{s}}italic_P start_POSTSUBSCRIPT s end_POSTSUBSCRIPT
60.067% 2.4% 0.075% 0.045%

In terms of listed results, it is evident that the proposed attack detection scheme performs satisfactorily in the practical scenario. The proposed scheme is able to detect attacks with a successful probability of nearly 99% while maintaining a low false alarm probability, which further validates the feasibility and generalizability of the designed model.

V Conclusion

Leveraging the principle of channel reciprocity and an autoencoder with capability of data compression and feature extraction, this paper proposes an attack detection scheme that compares the CIR characteristics of both sides. The transmission consumption is greatly reduced by incorporating the quantization process. In the meanwhile, the scheme is able to be relatively compatible with existing UWB systems by means of offline training and online deployment. We also evaluated and validated the effectiveness of the scheme through simulation and practical experiments. Furthermore, other factors (e.g. channel variation and threshold update) can be jointly considered to optimise the performance of the proposed scheme in future work.

References

  • [1] M. Z. Win, R. A. Scholtz, and M. A. Barnes. “Ultra-wide bandwidth signal propagation for indoor wireless communications,” in Proc. Int. Conf. Commun. (ICC), Vol. 1, Jun. 1997, pp: 56-60.
  • [2] Car Connectivity Consortium, “CCC digital key release 3.0 whitepaper,” 2022. [Online]. Available: https://carconnectivity.org/whitepapers/
  • [3] D. Coppens, A. Shahid, S. Lemey, B. V. Herbruggen, C. Marshall, and E. D. Poorter, “An overview of UWB standards and organizations(IEEE 802.15.4, FiRa, Apple): Interoperability aspects and future research directions,” IEEE Access, Vol. 10, pp. 70 219–70 241, Jun 2022.
  • [4] IEEE 802.15.4z part 15.4z low-Rate wireless networks, IEEE Std 802.15.4–2020 (Revision of IEEE Std 802.15.4–2015), New York, 2020.
  • [5] M. Poturalski, M. Flury, P. Papadimitratos et al., “Distance bounding with ieee 802.15.4a: Attacks and countermeasures,” IEEE Trans. Wireless Commun. vol. 10, no. 4, pp. 1334–1344, Feb. 2011.
  • [6] M. Flury, M. Poturalski, P. Papadimitratos et al., “Effectiveness of distance-decreasing attacks against impulse radio ranging,” in Proc. 3rd ACM Conf. Wireless Netw. Secur., Mar. 2010, pp. 117–128.
  • [7] M. Singh, M. Roeschlin, E. Zalzala et al., “Security analysis of IEEE 802.15. 4z/HRP UWB time-of-flight distance measurement,” in Proc. 14th ACM Conf. Secur. Privacy Wireless Mobile Netw., June. 2021, pp. 227-237.
  • [8] P. Leu, G. Camurati, A. Heinrich et al., “Ghost peak: Practical distance reduction attacks against HRP UWB ranging,” in 31st USENIX Secur. Symp., BOSTON, MA, USA, Aug. 2022, pp. 1343-1359.
  • [9] C. Anliker, G. Camurati, S. Capkun, “Time for change: How clocks break UWB secure ranging,” in Proc. 32nd USENIX Secur. Symp., Aug. 2023, pp. 19-36.
  • [10] L. Botler, K. Diwold and K. Römer, “A UWB-based solution to the distance enlargement fraud using hybrid ToF and RSS measurements,” in Proc. 2021 IEEE 18th Int. Conf. Mobile Ad Hoc Smart Syst. (MASS), Denver, CO, USA, 2021, pp. 324-334.
  • [11] H. Chen and A. Dhekne, “Spoofing evident and spoofing deterrent localization using Ultrawideband (UWB) active–passive ranging,” in IEEE J. Indoor Seamless Positioning Navig., vol. 2, pp. 12-24, 2024.
  • [12] K. Kim, S. Lee, T. Yoo and H. Kim, “Vehicular localization framework with UWB and DAG-based distributed ledger for ensuring positioning accuracy and security,” in Electronics, vol. 12, no. 23, pp. 4756, 2023.
  • [13] M. Singh, “Securing distance measurement against physical layer attacks,” M.S. thesis, ETH Zurich., Zurich, Switzerland, 2021.
  • [14] K. Joo, D. H. Lee, Y. Jeong and W. Choi, “Protecting HRP UWB ranging system against distance reduction attacks,” in Proc. 2023 ACM SIGSAC Conf. Comput. Commun. Sec. (CCS), New York, NY, USA, 2023, pp. 622-635.
  • [15] Li Sun, “Integrity protection to support secure ranging in IR-UWB,” TG4ab (NG-UWB) 15-22-0072-02-04ab, Huawei Technologies Co., Ltd., Mar. 2022, https://mentor.ieee.org/802.15/dcn/22/15-22-0072-02-04ab-integrity-protection-to-support-secure-ranging-in-ir-uwb.pptx
  • [16] C. Wang, D. Wang, G. Xu and D. He, “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0,” Sci. China Inf. Sci., vol. 65, no. 1, pp. 192-206, 2022.
  • [17] S. T. -B. Hamida, J. -B. Pierrot, B. Denis, C. Castelluccia and B. Uguen, “On the security of UWB secret key generation methods against deterministic channel prediction attacks,” in Proc. 2012 IEEE Veh. Technol. Conf. (VTC Fall), Quebec City, QC, Canada, 2012, pp. 1-5.
  • [18] P. Peterseil, B. Etzlinger, R. Khanzadeh and A. Springer, “Trustworthiness score for UWB indoor localization,” in Proc. 2023 IEEE Global Commun. Conf. (GLOBECOM), Kuala Lumpur, Malaysia, 2023, pp. 189-194.
  • [19] Z. Xiao, Y. Zeng, “An overview on integrated localization and communication towards 6G,” Sci. China Inf. Sci., vol. 65, no. 3, pp. 5-50, 2022.
  • [20] M. Kolakowski, J. Modelski, “Detection of direct path component absence in NLOS UWB channel,” in 2018 22nd Int. Microw. Radar Conf. (MIKON), Poznan, Poland, May. 2018, pp. 247-250.
  • [21] D.Bank, N. Koenigstein, R. Giryes, “Autoencoders,” in Machine Learning for Data Science Handbook: Data Mining and Knowledge Discovery Handbook, 2023, pp.353-374.
  • [22] DecaWave. DW3000 USER MANUAL. (2019). [Online]. Available: https://www.qorvo.com/products/d/da008154