|
|
Wireless Power Terminal Identification Method Based on Multiscale Windowed Deep Residual Network |
Zhao Hongshan1, Sun Jingjie1, Peng Yihao2, Zhao Shice1, Xu Junyang1, Wang Yufeng1 |
1. Department of Electrical Engineering North China Electric Power University Baoding 071000 China; 2. State Grid Nanchang Power Supply Company Nanchang 330000 China |
|
|
Abstract The technique of wireless terminal identification based on the differential characteristics of wireless signals is currently an important physical layer security mechanism. However, traditional wireless signal identification methods generally require signal-signal domain conversion. Therefore, the dimensionality of the data and the arithmetic power requirements are enhanced. This can increase the application cost of this security mechanism. To solve this problem, a residual network-based wireless power terminal identification method is proposed. With the designed multiscale window module and area attention module, it can directly process the signal raw data to accurately identify the legal device identity and illegal device detection. First, the proposed multiscale window module completes the information interaction of the signal precursor code at each cycle scale, enabling the network to directly process and identify the raw wireless communication signal data. Then, the regional attention module is designed to reallocate channel resources with the mean value of significant feature regions as the evaluation index, which improves the network's ability to learn local features of signals. Finally, a pooling classifier is used to replace the fully connected layer, and the Adam optimizer is used for gradient update to complete the training process. In this model, the multiscale window module makes use of the leading code subframe feature, which can directly process the original signal data and greatly improve the learning performance recognition effect. The experimental results on the actual collected wireless terminal signal data show that the multiscale module improves the recognition accuracy by 31% compared with the traditional residual network due to the comprehensive consideration of the information of each subframe of the leading code signal. The recognition accuracy and learning performance of the network are significantly improved, which verifies the effectiveness of the module on network performance improvement. The addition of the regional attention mechanism further improves the recognition accuracy while improving the training performance. It is verified that the region attention mechanism can effectively improve the performance of the network in recognizing signal distortion features. The recognition accuracy is up to 97.316% for 30 identical models of commercial devices. Also, the maximum value of the output probability corresponding to the label is selected as the identification result of the identity, and the threshold of the output probability is defined as the confidence level, which can also detect the illegal devices while further scientific evaluation. Five experiments of uninvolved training devices are selected for illegal detection, and the results show that when the confidence level is 99%, the detection rate of illegal devices reaches 82.8%. The following conclusions can be drawn from the analysis of the experimental results: ① The constructed multiscale module avoids the loss of local difference features caused by the analysis of the signal as a whole because it considers the information of each subframe of the leading code signal, which significantly improves the training performance and recognition accuracy. ② The proposed regional attention mechanism further enhances the learning of regional difference features by dividing the channel into regions, which achieves a significant improvement in the training performance and This achieves further improvement of training performance and recognition accuracy. ③ The proposed identification method based on multi-scale windowed regional attention residual network achieves self-learning of the difference features of the original I/Q data of wireless signals. The recognition accuracy of the same model device can reach 97.316%, and the recognition rate of illegal devices reaches 82.8%.
|
Received: 14 June 2022
|
|
|
|
|
[1] 黄彦钦, 余浩, 尹钧毅, 等. 电力物联网数据传输方案:现状与基于5G技术的展望[J]. 电工技术学报, 2021, 36(17): 3581-3593. Huang Yanqin, Yu Hao, Yin Junyi, et al. Data transmission schemes of power Internet of Things: present and outlook based on 5G technology[J]. Transactions of China Electrotechnical Society, 2021, 36(17): 3581-3593. [2] 王红霞, 王波, 董旭柱, 等. 面向多源电力感知终端的异构多参量特征级融合:融合模式、融合框架与场景验证[J]. 电工技术学报, 2021, 36(7): 1314-1323. Wang Hongxia, Wang Bo, Dong Xuzhu, et al. Heterogeneous multi-parameter feature-level fusion for multi-source power sensing terminals: fusion mode, fusion framework and application scenarios[J]. Transactions of China Electrotechnical Society, 2021, 36(7): 1314-1323. [3] 刘云鹏, 李欢, 田源, 等. 基于分布式光纤传感的绕组变形程度检测[J]. 电工技术学报, 2021, 36(7): 1347-1355. Liu Yunpeng, Li Huan, Tian Yuan, et al. Winding deformation detection based on distributed optical fiber sensing[J]. Transactions of China Electrotechnical Society, 2021, 36(7): 1347-1355. [4] 陈伟根, 张知先, 李剑, 等. 电气设备状态参量智能传感技术[J]. 中国电机工程学报, 2020, 40(增刊1): 323-342. Chen Weigen, Zhang Zhixian, Li Jian, et al. Intelligent sensing technology for power equipment state parameters[J]. Proceedings of the CSEE, 2020, 40(S1): 323-342. [5] 赵仕策, 赵洪山, 寿佩瑶. 智能电力设备关键技术及运维探讨[J]. 电力系统自动化, 2020, 44(20): 1-10. Zhao Shice, Zhao Hongshan, Shou Peiyao. Discussion on key technology and operation & maintenance of intelligent power equipment[J]. Automation of Electric Power Systems, 2020, 44(20): 1-10. [6] 肖勇, 钱斌, 蔡梓文, 等. 电力物联网终端非法无线通信链路检测方法[J]. 电工技术学报, 2020, 35(11): 2319-2327. Xiao Yong, Qian Bin, Cai Ziwen, et al. Malicious wireless communication link detection of power Internet of thing devices[J]. Transactions of China Electrotechnical Society, 2020, 35(11): 2319-2327. [7] 苏盛, 汪干, 刘亮, 等. 电力物联网终端安全防护研究综述[J]. 高电压技术, 2022, 48(2): 513-525. Su Sheng, Wang Gan, Liu Liang, et al. Review on security of power Internet of Things terminals[J]. High Voltage Engineering, 2022, 48(2): 513-525. [8] 徐争光. 无线通信中物理层认证关键技术的研究综述[J]. 华南理工大学学报(自然科学版), 2018, 46(5): 47-52. Xu Zhengguang. Review of physical-layer authentication key technology in wireless communication[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 47-52. [9] 刘铭, 刘念, 韩晓艺, 等. 一种基于射频指纹的电力物联网设备身份识别方法[J]. 中国电力, 2021, 54(3): 80-88. Liu Ming, Liu Nian, Han Xiaoyi, et al. A RF fingerprint based EIoT device identification method[J]. Electric Power, 2021, 54(3): 80-88. [10] 陈子骁, 周小明, 李钊, 等. 一种基于射频指纹的电网无线设备入侵检测算法[J]. 无线电工程, 2021, 51(5): 352-359. Chen Zixiao, Zhou Xiaoming, Li Zhao, et al. An intrusion detection algorithm for power grid wireless equipment based on radio frequency fingerprint[J]. Radio Engineering, 2021, 51(5): 352-359. [11] 袁红林, 胡爱群. 射频指纹的产生机理与惟一性[J]. 东南大学学报(自然科学版), 2009, 39(2): 230-233. Yuan Honglin, Hu Aiqun. Fountainhead and uniqueness of RF fingerprint[J]. Journal of Southeast University (Natural Science Edition), 2009, 39(2): 230-233. [12] Bihl T J, Bauer K W, Temple M A. Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(8): 1862-1874. [13] Uzundurukan E, Ali A M, Dalveren Y, et al. Performance analysis of modular RF front end for RF fingerprinting of bluetooth devices[J].Wireless Personal Communications, 2020, 112(4): 2519-2531. [14] 王欢欢, 张涛. 结合时域分析和改进双谱的通信信号特征提取算法[J]. 信号处理, 2017, 33(6): 864-871. Wang Huanhuan, Zhang Tao. Extraction algorithm of communication signal characteristics based on improved bispectra and time-domain analysis[J]. Journal of Signal Processing, 2017, 33(6): 864-871. [15] Suski W C, Temple M, Mendenhall M, et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security[J]. International Journal of Electronic Security and Digital Forensics, 2008, 1(3): 301-322. [16] Yang K, Kang J, Jang J, et al. Multimodal sparse representation-based classification scheme for RF fingerprinting[J]. IEEE Communications Letters, 2019, 23(5): 867-870. [17] 赵洪山, 彭轶灏, 刘秉聪, 等. 基于边缘注意力生成对抗网络的电力设备热成像超分辨率重建[J]. 中国电机工程学报, 2022, 42(10): 3564-3572. Zhao Hongshan, Peng Yihao, Liu Bingcong, et al. Super-resolution reconstruction of electric equipment's thermal imaging based on generative adversarial network with edge-attention[J]. Proceedings of the CSEE, 2022, 42(10): 3564-3572. [18] 曲岳晗, 赵洪山, 马利波, 等. 多深度神经网络综合的电力变压器故障识别方法[J]. 中国电机工程学报, 2021, 41(23): 8223-8230. Qu Yuehan, Zhao Hongshan, Ma Libo, et al. Multi-depth neural network synthesis method for power transformer fault identification[J]. Proceedings of the CSEE, 2021, 41(23): 8223-8230. [19] O’Shea T J, Corgan J, Clancy T C. Convolutional radio modulation recognition networks[C]//International Conference on Engineering Applications of Neural Networks, Cham, Springer, 2016: 213-226. [20] O’Shea T J, Roy T, Clancy T C. Over-the-air deep learning based radio signal classification[J]. IEEE Journal of Selected Topics in Signal Processing, 2018, 12(1): 168-179. [21] West N E, O'Shea T. Deep architectures for modulation recognition[C]//2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD, USA, 2017: 1-6. [22] Shen Guanxiong, Zhang Junqing, Marshall A, et al. Radio frequency fingerprint identification for LoRa using deep learning[J]. IEEE Journal on Selected Areas in Communications, 2021, 39(8): 2604-2616. [23] Peng Linning, Zhang Junqing, Liu Ming, et al. Deep learning based RF fingerprint identification using differential constellation trace figure[J]. IEEE Transactions on Vehicular Technology, 2020, 69(1): 1091-1095. [24] 秦鑫, 黄洁, 查雄, 等. 基于扩张残差网络的雷达辐射源信号识别[J]. 电子学报, 2020, 48(3): 456-462. Qin Xin, Huang Jie, Zha Xiong, et al. Radar emitter signal recognition based on dilated residual network[J]. Acta Electronica Sinica, 2020, 48(3): 456-462. [25] Wang Wenhao, Sun Zhi, Piao Sixu, et al. Wireless physical-layer identification: modeling and validation[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9): 2091-2106. [26] Shi Yan, Jensen M A. Improved radiometric identification of wireless devices using MIMO transmission[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(4): 1346-1354. [27] Shen Guanxiong, Zhang Junqing, Marshall A, et al. Towards scalable and channel-robust radio frequency fingerprint identification for LoRa[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 774-787. |
|
|
|