Application of Wavelet Denoising To Improve OFDM-based Signal Detection and Classification
Application of Wavelet Denoising To Improve OFDM-based Signal Detection and Classification
Application of Wavelet Denoising To Improve OFDM-based Signal Detection and Classification
Summary
The developmental emphasis on improving wireless access security through various OSI PHY layer mechanisms
continues. This work investigates the exploitation of RF waveform features that are inherently unique to specific
devices and that may be used for reliable device classification (manufacturer, model, or serial number). Emission
classification is addressed here through detection, location, extraction, and exploitation of RF ‘fingerprints’ to
provide device-specific identification. The most critical step in this process is burst detection which occurs prior
to fingerprint extraction and classification. Previous variance trajectory (VT) work provided sensitivity analysis for
burst detection capability and highlighted the need for more robust processing at lower signal-to-noise ratio (SNR).
The work presented here introduces a dual-tree complex wavelet transform (DT-CWT) denoising process to augment
and improve VT detection capability. The new method’s performance is evaluated using the instantaneous amplitude
responses of experimentally collected 802.11a OFDM signals at various SNRs. The impact of detection error on
signal classification performance is then illustrated using extracted RF fingerprints and multiple discriminant analysis
(MDA) with maximum likelihood (ML) classification. Relative to previous approaches, the DT-CWT augmented
process emerges as a better alternative at lower SNR and yields performance that is 34% closer (on average) to
‘perfect’ burst location estimation performance. Published in 2009 by John Wiley & Sons, Ltd.
KEY WORDS: RF fingerprints; wavelet denoising; OFDM; 802.11a; dual tree wavelet transform
∗
Correspondence to: Michael A. Temple, AFIT/ENG Air Force Institute of Technology, Wright-Patterson AFB, OH 45433,
U.S.A.
†
E-mail: michael.temple@afit.edu
‡
The views expressed in this paper are those of the author(s) and do not reflect official policy of the United States Air Force,
Department of Defense or the U.S. Government.
§
This article is a U.S. Government work and is in the public domain in the USA.
Published in 2009 by John Wiley & Sons, Ltd.
72 R. W. KLEIN, M. A. TEMPLE AND M. J. MENDENHALL
RF fingerprinting is one alternative PHY layer was driven by two factors, including (1) consistency
approach that is readily dismissed in Reference [2] for with previous related 802.11a work that has been
‘scale’ reasons. For applications where size constraints extensively published [3,4,14--17], and (2) the
are less restrictive, RF fingerprinting remains a viable continued emergence of OFDM-based signals as
alternative and is considered here as in previous works envisioned for 3G/4G (IMT/IMT-Advanced) radio
[3,4]. Collectively, related works in RF fingerprinting, communications. While the transient detection and
electromagnetic signatures, intra-pulse modulation, classification techniques used in this work are
and unintentional modulation [5--13] form a solid basis likely applicable to other signal types, and may
for developing techniques that may be applicable to actually perform better with some of them, the
commercial communication devices. If the inherent RF challenges posed by OFDM-based signals must be
fingerprints are repeatedly extractable and sufficiently addressed.
unique, they are potentially useful for determining the The impact of burst detection error on signal
specific make, model, and/or serial number of a given classification performance is addressed here using
device. RF fingerprints and multiple discriminant analysis
Previous work highlighted signal structure unique- (MDA) with maximum likelihood (ML) classification.
ness and attributed inter-device differences to various While VT burst detection and MDA-ML classification
manufacturing, aging, and environmental factors performance in earlier work [14] was shown to be
[5]. While several processing steps are required to consistent with ‘perfect’ burst estimation performance
effectively exploit the unique RF fingerprints, burst at higher SNRs in the range of 10 ≤ SNR ≤ 30 dB,
location is arguably the most important [8,10]. In this performance diverged at SNRs in the range of −3 ≤
context, burst location includes determining both the SNR ≤ 10 dB. These previous results demonstrated
burst start time and the subsequent signal region(s) a margin for improvement only at the lower SNRs
from which fingerprints are extracted. Both of these and highlighted the need for a more robust technique,
factors are important given that improper selection providing the impetus for the work presented in this
of either can unduly bias the processing to favor paper. More specifically, a dual-tree complex wavelet
channel noise effects or steady-state signal effects [5]. transform (DT-CWT) is introduced to denoise the
With the exception of more recent work in References signal prior to VT calculation to improve performance
[3,4,14], these previous efforts lack a detailed at lower SNRs (−3 ≤ SNR ≤ 10 dB). It is envisioned
sensitivity analysis of burst detection and fingerprint that this technique would be activated only at the
classification performance under varying channel noise operator’s discretion, since there is no gain at higher
conditions. SNRs.
Noise sensitivity analysis is imperative for deter-
mining the minimum acceptable signal-to-noise ratio
(SNR) that provides consistent and reliable classifi- 2. Background
cation results. This minimum acceptable SNR also
allows determination of maximum transmitter–receiver 2.1. Signal Characteristics
separation distances which can aide in establishing
Device emissions can be exploited using various signal
the geometric layout of physical hardware to improve
characteristics. However, instantaneous amplitude and
overall network security. Noise sensitivity performance
instantaneous phase characteristics are perhaps the
also provides a good discriminant for comparing
most extensively investigated [5,8--10]. More recently,
various detection and classification techniques. For the
these two characteristics have been augmented with
work presented here, burst location performance is
instantaneous frequency and successfully exploited
conducted for a combined channel noise and burst-to-
for device classification [3,4,14]. The instantaneous
burst variability effect using multiple 802.11a bursts
amplitude, a(k), instantaneous phase, θ(k), and
and multiple independent noise realizations for each
instantaneous frequency, f (k), responses of a complex
burst.
sampled signal s(k) are given by [18]
Related burst detection work in Reference [14]
provides preliminary results using variance trajectory
s(k) = i(k) + jq(k) (1)
(VT) of 802.11a instantaneous amplitude response.
The choice of using OFDM-based signals for
demonstration, and in particular the 802.11a signal, a (k) = i2 (k) + q2 (k) (2)
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
APPLICATION OF WAVELET DENOISING 73
−1 q (k) (a) 8
θ (k) = tan (3)
i (k) 6
Amplitude
4
1 φ(k) − φ(k − 1)
f (k) = (4) 2
2π k
0
−0.5 0 0.5 1 1.5 2 2.5 3
where i(k) and q(k) are the instantaneous in-phase and Time (Secs * 10−5)
quadrature-phase components of s(k). 1
VT
0.5
2.2. Variance Trajectory (VT)
The work in Reference [8] analyzed Bluetooth
0
signals using the VT process with instantaneous −0.5 0 0.5 1 1.5 2 2.5 3
phase. The process windows an input signal and Time (Secs * 10−5)
(b)
calculates the signal variance for each window, 8
creating a variance vector. The difference between
Amplitude
6
consecutive variance values is calculated to form 4
the VT. The work presented here generates VT
2
sequence {VTa (i)} using instantaneous amplitude
0
sequence {a(k)}, k = 1, 2, . . . , Na , to estimate the burst −0.5 0 0.5 1 1.5 2 2.5 3
Time (Secs * 10−5)
start. The ith element of sequence {VTa (i)} is given
3
by [3]
2
1
i = 1, 2, . . . , Lw − 1 (5)
0
−0.5 0 0.5 1 1.5 2 2.5 3
1 s +Nw
1+(m−1)N Time (Secs * 10−5)
Wa (m) = [a(k) − µw ]2
Nw Fig. 1. Instantaneous signal amplitude and corresponding VT
k=1+(m−1)Ns response for (a) SNR = 6 dB and (b) SNR = 0 dB.
m = 1, 2, . . . , Lw (6)
where Nw is the window extent, and Ns is the non-uniformly distributed in the wavelet domain and
number of samples the window advances between significant signal information manifests in the large
calculations. The µw factor in Equation (6) is the magnitude wavelet coefficients. It is common to
sample mean of {aw (k)} which is the subsequence threshold the magnitude of the wavelet coefficients
of consecutive elements from {a(k)} contained in the in wavelet denoising applications where coefficients
window. Figure 1 shows a representative amplitude larger than the threshold contain significant signal
response and corresponding VT response for two contribution [19--28]. Those wavelet coefficients with
different analysis SNRs. As shown, there is a magnitude less than the threshold are understood to be
distinct VT peak response corresponding to the noise. Due to the compaction property of the wavelet
burst start which becomes less discernable as SNR transform, there are relatively few large magnitude
decreases. coefficients.
One distinct disadvantage of the DWT is the
lack of shift invariance. i.e., if the signal is shifted
2.3. Discrete Wavelet Transform Denoising
in time by some amount, the transformation of
Signal denoising is accomplished using a discrete that signal yields a different set of coefficients. In
Wavelet transform (DWT) by exploiting differences the application addressed here, this problem has
in the distribution of signal burst energy and the the consequence of complicating the computation
additive white gaussian noise (AWGN) in which it is of reasonable thresholds for signal denoising. This
embedded. The noise channel is uniformly distributed problem is mitigated by using the DT-CWT
in the wavelet domain. Signal bursts, however, are [29,30].
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
74 R. W. KLEIN, M. A. TEMPLE AND M. J. MENDENHALL
h0 (n) ↓2 where
h0 (n) ↓2
h0 (n) ↓2 h1 (n) ↓2
√
h0(1) (n) ↓2 h1 (n) ↓2
φ (t) = 2 h0 (n)φ (2t − n) (10)
Tree1 h1 (n) ↓2
(1)
h ( n)
1
↓2 n
h0′ (n) ↓2
h0′ (n) ↓2
where
√
φ(t) = 2 h0 (n)φ(2t − n) (8)
n
0.5
(1) Step 1---burst detection: The first step represents
0 coarse burst detection. This step monitors the RF
−0.5 0 0.5 1 1.5 2 2.5 3
Time (Secs * 10 −5 )
environment to detect the presence of RF bursts.
The received signal is segmented into a consecutive
(b) 8
series of subsections using relatively wide, non-
6
overlapping windows, Ns = Nw from Equation
Amplitude
The segment of windowed data passed from As a result of this process, the RF fingerprint
Step 1 is further sub-segmented using much (feature vector) used for device classification
narrower and highly overlapped windows. The consists of 27 features per burst (3 preamble re-
overlapping windows allow for better location gions × 3 waveform characteristics × 3 statistics).
accuracy at the expense of increased processing After RF fingerprints have been extracted from
time. For this work, a window size of Nw = 20 each detected burst, the feature vectors are passed
samples (0.84 s) is used with a shift of Ns = 2 to Step 4.
samples (84.2 ns) between consecutive windows. (4) Step 4---device classification: The impact of detec-
A different a priori detection threshold tlocate tion error on signal classification performance is
(compared to Step 1) is used to automatically illustrated using the extracted RF fingerprints from
estimate the burst start location based on a Step 3 and MDA with ML classification. MDA
significant peak response occurring in VTa (i) of is an extension of Fisher’s Linear Discriminant
Equation (5). (FLD) process for more than two classes [32].
If a significant peak is located, the signal is Classification is demonstrated here using an MDA-
passed to Step 3. It is possible that no significant ML process [33]. For the 3-class problem, the
peak is found and the algorithm therefore does not MDA process projects higher-dimensional data
converge to a solution. This could be the case if onto a two-dimensional ‘Fisher plane’ that max-
Step 1 passed along a false alarm and no signal imizes inter-class distances while simultaneously
burst is present or if the threshold is just too minimizing intra-class distances. In principle, this
high for that particular burst. When this happens, method cannot improve classification potential.
there are two options available: the signal can However, it provides good class separation and
be discarded or a default start location can be visualization of data having dimensionality greater
assigned. In an operational environment, where than 3. Using this lower-dimensional data, ML
the algorithm has exposure to numerous bursts, decision boundaries are determined assuming
discarding signals may be a good choice. However, normally distributed input data, equal costs or risk,
for this work, the probability of detect in Step 1 is and uniform prior probabilities. To discriminate c
100%, since the data is manually extracted from classes using d-dimensional input data, the input
the RF environment. With that assumption and vector x is linearly projected onto a (c − 1)-
the limited amount of data to process, a default dimensional space using
location is assigned to those signals which had no
significant peak. As per Section 3.2, these bursts y = Wt x (12)
are denoted as ‘non-convergent’ bursts. The default
location is chosen to be the last sample number where y is the vector of projected values and W
of the window. Only those bursts that converge is a d × (c − 1) projection matrix. Classification
to a solution are used in remaining steps and are is performed using unknown data and the two-
denoted as ‘convergent’ bursts. A performance dimensional trained decision boundaries. The
comparison for this step between the two methods process classifies each unknown input data
is documented in Section 4.2. set by projecting it onto the trained ‘Fisher
(3) Step 3---RF fingerprint extraction: After locating plane’ using Equation (12). Projected points
the burst start, statistical waveform feature data falling within the correct region are correctly
is extracted from the next 16.0 s of the burst to classified while those falling outside the correct
represent the RF Fingerprint. This 16.0 s region of region are misclassified. The percentage of
the burst corresponds to the 802.11a preamble [31]. correct classification is determined based on the
More specifically, statistics are calculated for the total number of unknown trials. A performance
three instantaneous waveform characteristics given comparison for this step between the two methods
by Equations (2), (3), and (4) across three distinct is documented in Section 4.3.
regions within the 16.0 s preamble, including
the short symbol region, the long symbol region,
and the combined short-long symbol region (entire
3.3. Data Collection and Noise Simulation
preamble). The three statistical features considered
for this work include the variance, skewness, and The process for collecting 802.11a signals is shown
kurtosis. in Figure 5. The Agilent-based RF Signal Intercept
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
APPLICATION OF WAVELET DENOISING 77
Amplitude
5
Traditional VT and Denoised VT techniques for −3 ≤
SNR ≤ 10 dB.
0
−0.5 0 0.5 1 1.5 2 2.5 3
Time (Secs * 10 −5 )
5
Figure 7 show that at both SNR = 6 dB and SNR =
0
0 dB, the Denoised VT technique provides a higher
−0.5 0 0.5 1 1.5 2 2.5 3
Time (Secs * 10 −5 )
probability of detection (Pd ) for a given probability of
false alarm (Pfa ). With a higher Pd for a given Pfa , the
Fig. 6. Instantaneous amplitude: (Top) collected signal, Denoised VT technique passes more bursts to the next
(Middle) filtered signal-plus-AWGN at SNR = 10 dB, and
(Bottom) filtered signal-plus-AWGN at SNR = 0 dB.
step when compared with Traditional VT. With more
bursts passing, it is possible to correctly classify the
device in less time and have a higher confidence in the
Section 3.1 is established using random realizations of classification.
noise that are generated, filtered, scaled (for appropriate
SNR), DT-CWT transformed and coefficients retained
for threshold determination. The remaining burst (a) 1
0.65
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Pfa
4. Results
Fig. 7. Probability of false alarm (Pfa ) versus probability of
Burst detection, burst start location, and device detection (Pd ) ROC curves for Traditional VT and Denoised
classification results are presented for both the VT techniques at (a) SNR = 6 dB and (b) SNR = 0 dB.
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
APPLICATION OF WAVELET DENOISING 79
0.08
Results in Figure 10 shows average MDA-ML
0.06 classification performance including burst detection
error effects for Perfect, Traditional VT, and Denoised
0.04
VT burst detection methods. In this case, ‘Perfect’
0.02 results were obtained using a manual burst detection
and location process based on visual inspection of
0
−5 0 5 10 15 20 instantaneous amplitude responses from each burst.
Error (Secs * )10−6 As shown, the Perfect results provide an upper
Fig. 9. Burst location error probability for distribution for bound on achievable performance. Results for the VT
‘dual convergent’ bursts: (a) SNR = 6 dB and (b) SNR = and Denoised VT methods are similar for SNR >
0 dB. 6 dB and SNR < −2 dB. For −1 < SNR < 5 dB, the
the parameters for the likelihoods used for the ML Fig. 10. Average MDA-ML classification accuracy for ‘dual
classifier; (5) transforming the remaining 20% ‘dual convergent’ bursts including burst detection error effects for
convergent’ bursts from each device as ‘unknown’ various burst detection methods.
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
APPLICATION OF WAVELET DENOISING 81
Table I. MDA/ML classification confusion matrix for various burst were used to demonstrate performance of the Denoised
detection methods at SNR = 3 dB.
VT technique at varying SNR. As implemented with
DT-CWT processing, the Denoised VT technique
Class estimate outperforms the Traditional VT technique in all areas,
Input class A B C including burst detection, burst start location, and
device classification. For burst detection, the denoising
Perfect technique provides more positive detections for a
A 68% 21% 11% given false alarm rate. For burst start location, the
B 31% 44% 25% denoising technique is 74.7% more precise in finding
C 14% 17% 69%
burst start locations and experiences 30.2% fewer
Traditional VT non-convergent solutions. Finally, device classification
A 67% 22% 11% performance was demonstrated using extracted RF
B 31% 42% 27%
C 22% 21% 57%
fingerprints and MDA with ML classification. Relative
to the Traditional VT technique, the Denoised VT
Denoised VT
process emerges as a better alternative at lower
A 67% 21% 12% SNRs and yields a classification performance increase
B 30% 43% 27%
C 18% 19% 63% of 1.75% (on average) or a 34% improvement
towards achieving ‘perfect’ burst location estimation
performance.
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec
82 R. W. KLEIN, M. A. TEMPLE AND M. J. MENDENHALL
9. Ureten O, Serinken N. Detection of radio transmitter turn-on 22. Frisch M, Messer H. Detection of a known transient signal of
transients. IEE Electronics Letters 1999; 35(23): 1996–1997. unknown scaling and arrival time. IEEE Transactions on Signal
10. Ureten O, Serinken N. Bayesian detection of WiFi transmitter Processing 1994; 42(7): 1859–1863.
RF fingerprints. IEE Electronics Letters 2005; 41(6): 373–374. 23. Del Marco SP, Weiss JE. M-band wavepacket-based transient
11. Serinken N, Ureten O. Generalised dimension characterization signal detector using a translation-invariant wavelet transform.
of radio transmitter turn-on transients. IEE Electronics Letters Optical Engineering 1994; 33: 2175–2182.
2000; 36(12): 1064–1064. 24. Fernandes Da Rocha Pitta J, Hippenstiel R, Fargues M. Transient
12. Dudczyk J, Matuszewski J, Wnuk M. Applying the radiated detection using wavelets. Master’s Thesis, Naval Post Graduate
emission to specific emitter identification. International Con- School, Monterey, CA, March 1995.
ference on Microwaves, Radar and Wireless Communications, 25. Del Marco SP, Weiss JE. Improved transient signal detection
May 2004; 431–434. using a wavepacket-based detector with an extended translation-
13. Kawalec A, Rapacki T, Wnuczek S, Dudczyk J, Owczarek R. invariant wavelet transform. IEEE Transactions on Signal
Mixed method based on intrapulse data and radiated emission Processing 1997; 45(4): 841–850.
to emitter sources recognition. 15th International Confer- 26. Thiruvengadam SJ, Chinnadurai P, Thirumalai Kumar N,
ence on Microwaves, Radar and Wireless Communications, Abhaikumar V. Wavelet based signal processing algorithms
May 2004. for early target detection. 2003 Conference on Convergent
14. Klein RW, Temple MA, Mendenhall MJ, Reising DR. Sensitivity Technologies for Asia-Pacific Region, Vol. 3, October 2003;
analysis of burst detection and rf fingerprinting classification 1175–1179.
performance. In Proceedings of the 2009 IEEE International 27. Dutta A, Anand GV. Detection of transient signals by wavelet
Conference on Communications, June 2009. packet transform and stochastic resonance. 2004 IEEE Region
15. Ureten O, Serinken N. Improved coarse timing for burst 10 Conference, Vol. 1, November 2004; 251–254.
mode ofdm. Global Telecommunications Conference, 2007. 28. Fabbroni L, Vannucci M, Cuoco E, Losurdo G, Mazzoni M,
GLOBECOM ’07. IEEE, November 2007; 2841–2846. Stanga R. Wavelet tests for the detection of transients in the virgo
16. Ureten O, Pacheco RA, Serinken N, Hatzinakos D. Bayesian interferometric gravitational wave detector. IEEE Transactions
frame synchronization for 802.11a wlans: experimental results. on Instrumentation and Measurement 2005; 54(1): 151–
Canadian Conference on Electrical and Computer Engineering, 162.
2005, May 2005; 884–887. 29. Selesnick IW, Baraniuk RG, Kingsbury NC. The dual-tree
17. Pacheco RA, Ureten O, Hatzinakos D, Serinken N. Bayesian complex wavelet transform. IEEE Signal Processing Magazine
frame synchronization using periodic preamble for ofdm-based 2005; 22(6): 123–151.
wlans. IEEE Signal Processing Letters 2005; 12(7): 524–527. 30. Bayram I, Selesnick IW. On the dual-tree complex wavelet
18. Azzouz E, Nandi A. Automatic Modulation Recognition of packet and m-band transforms. IEEE Transactions on Signal
Communication Signals. Kluwer Academic: Boston, 1996. Processing 2008; 56(6): 2298–2310.
19. Carmona RA. Wavelet identification of transients in noisy time 31. IEEE Computer Society. IEEE Std 802.11-2007, June 2007.
series. In Proceedings of SPIE: Wavelet Applications in Signal 32. Fisher RA. The use of multiple measurements in taxonomic
and Image Processing, Vol. 2034, November 1993; 392–400. problems. Annals of Eugenics 1936; 7: 179–188.
20. Frisch M, Messer H. Detection of a transient signal of unknown 33. Duda RO, Hart PE, Stork DG. Pattern Classification (2nd edn).
scaling and arrival time using the discrete wavelet transform. John Wiley & Sons, Inc.: New York, 2001.
1991 International Conference on Acoustics, Speech, and Signal 34. Agilent Technologies Inc., USA. Agilent E3238 Signal Intercept
Processing (ICASSP-91), Vol. 2, April 1991; 1313–1316. and Collection Solutions: Family Overview, Publication 5989-
21. Frisch M, Messer H. The use of the wavelet transform in the 1274EN, July 2004.
detection of an unknown transient signal. IEEE Transactions on 35. Hastie T, Tibshirani R, Friedman J. Data Mining, Inference, and
Information Theory 1992; 38(2): 892–897. Prediction. Springer: New York, USA, 2001.
Published in 2009 by John Wiley & Sons, Ltd. Security Comm. Networks. 2010; 3:71–82
DOI: 10.1002/sec