Channel Reciprocity Based Attack Detection for Securing UWB Ranging by Autoencoder

Wenlong Gou,Chuanhang Yu,Juntao Ma,Gang Wu,Vladimir Mordachev
2024-06-10
Abstract:A variety of ranging threats represented by Ghost Peak attack have raised concerns regarding the security performance of Ultra-Wide Band (UWB) systems with the finalization of the IEEE 802.15.4z standard. Based on channel reciprocity, this paper proposes a low complexity attack detection scheme that compares Channel Impulse Response (CIR) features of both ranging sides utilizing an autoencoder with the capability of data compression and feature extraction. Taking Ghost Peak attack as an example, this paper demonstrates the effectiveness, feasibility and generalizability of the proposed attack detection scheme through simulation and experimental validation. The proposed scheme achieves an attack detection success rate of over 99% and can be implemented in current systems at low cost.
Cryptography and Security,Social and Information Networks,Signal Processing
What problem does this paper attempt to address?
The paper mainly targets various threats faced by Ultra-Wide Band (UWB) systems during ranging, especially distance fraud attacks represented by the Ghost Peak attack, and proposes a low-complexity attack detection scheme based on channel reciprocity. Specifically, the paper utilizes the data compression and feature extraction capabilities of autoencoders to compare the Channel Impulse Response (CIR) characteristics of both parties involved in ranging to detect attack behaviors. The proposed scheme in the paper is implemented through the following steps: 1. **Analyze Channel Reciprocity**: During the UWB ranging process, the signal transmission characteristics between the Initiator and the Responder remain consistent over a certain period, regardless of the direction of signal transmission. This means that in a complete Double Side-Two Way Ranging (DS-TWR) process, the Poll message sent by the Initiator and the Response message from the Responder will experience the same channel fading, reflecting the assumption of Time of Flight (TOF) invariance. 2. **CIR Feature Extraction and Comparison**: Both parties estimate the CIR during the ranging process and use an autoencoder to perform dimensionality reduction on the CIR data, generating simplified feature vectors. These feature vectors are then quantized and used for comparison to detect any discrepancies caused by attacks. 3. **Design Attack Detection Process**: By comparing the quantized feature vectors (i.e., pIR and pRI) and contrasting them with a preset judgment threshold T, it can be determined whether the system is under attack. If the Hamming distance between the two is greater than or equal to the threshold T, it is judged to be under attack; otherwise, it is considered normal. 4. **Evaluation and Verification**: The paper verifies the effectiveness and feasibility of the proposed scheme through numerical simulations and actual tests. Experimental results show that the scheme can detect attacks with a success rate of over 99% while maintaining a low false positive rate, and it can be relatively easily compatible with existing UWB systems. The main contribution of the paper is the proposal of an end-to-end attack detection scheme based on existing standards, using only the encoding module of the autoencoder for CIR feature extraction, thereby enhancing the security of the system without significantly modifying the UWB physical layer standards. In addition, the scheme also demonstrates good versatility, being adaptable to different types of attacks, and has proven its effectiveness and practicality in actual deployment.