{"title":"射频指纹增强的多智能体强化学习方法","authors":"Joseph M. Carmack, Steve Schmidt, Scott Kuzdeba","doi":"10.1145/3468218.3469037","DOIUrl":null,"url":null,"abstract":"Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM Reconstruction Model (RRM) is used to learn a latent Wi-Fi signal representation and how to reconstruct from that latent representation at the transmitter such that the reconstruction uniquely excites parts of the front-end to enhance the fingerprint. Deep reinforcement learning is then employed to learn the RRM control policy. Details on the design of the control interface, state representation, and rewards structure are presented for four different policy approaches. The resulting computational and security characteristics are discussed.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement\",\"authors\":\"Joseph M. Carmack, Steve Schmidt, Scott Kuzdeba\",\"doi\":\"10.1145/3468218.3469037\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM Reconstruction Model (RRM) is used to learn a latent Wi-Fi signal representation and how to reconstruct from that latent representation at the transmitter such that the reconstruction uniquely excites parts of the front-end to enhance the fingerprint. Deep reinforcement learning is then employed to learn the RRM control policy. Details on the design of the control interface, state representation, and rewards structure are presented for four different policy approaches. The resulting computational and security characteristics are discussed.\",\"PeriodicalId\":318719,\"journal\":{\"name\":\"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3468218.3469037\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3468218.3469037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement
Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM Reconstruction Model (RRM) is used to learn a latent Wi-Fi signal representation and how to reconstruct from that latent representation at the transmitter such that the reconstruction uniquely excites parts of the front-end to enhance the fingerprint. Deep reinforcement learning is then employed to learn the RRM control policy. Details on the design of the control interface, state representation, and rewards structure are presented for four different policy approaches. The resulting computational and security characteristics are discussed.