Next Article in Journal / Special Issue
Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline
Previous Article in Journal
Research on Torque Characteristics of Vehicle Motor under Multisource Excitation
Previous Article in Special Issue
HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Effects of RF Signal Eventization Encoding on Device Classification Performance

Department of Electrical and Computer Engineering, US Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH 45433, USA
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(11), 2020; https://doi.org/10.3390/electronics13112020
Submission received: 8 April 2024 / Revised: 16 May 2024 / Accepted: 17 May 2024 / Published: 22 May 2024
(This article belongs to the Special Issue Machine Learning for Cybersecurity: Threat Detection and Mitigation)

Abstract

:
The results of first-step research activity are presented for realizing an envisioned “event radio” capability that mimics neuromorphic event-based camera processing. The energy efficiency of neuromorphic processing is orders of magnitude higher than traditional von Neumann-based processing and is realized through synergistic design of brain-inspired software and hardware computing elements. Relative to event-based cameras, the development of event-based hardware devices supporting Radio Frequency (RF) applications is severely lagging and considerable interest remains in obtaining neuromorphic efficiency through event-based RF signal processing. In the Operational Technology (OT) protection arena, this includes efficient software computing capability to provide reliable device classification. A Random Forest (RndF) classifier is considered here as a reliable precursor to obtaining Spiking Neural Network (SNN) benefits. Both 1D and 2D eventized RF fingerprints are generated for bursts from NDev = 8 WirelessHART devices. Average correct classification (%C) results show that 2D fingerprinting is best overall using detected events in burst Gabor transform responses. This includes %C ≥ 90% under multiple access interference conditions using an average of NEPB ≥ 400 detected events per burst. This is sufficiently promising to motivate next-step activity aimed at (1) reducing fingerprint dimensionality and minimizing the required computational resources, and (2) transitioning to a neuromorphic-friendly SNN classifier—two significant steps toward developing the necessary computing elements to achieve the full benefits of neuromorphic processing in the envisioned RF event radio.

1. Introduction

As the use of wireless Operational Technology (OT) expands to support nearly all Critical Infrastructure (CI) sectors, so does the need for increased communication network reliability, security, and resiliency [1,2,3]. A majority of today’s OT technology evolved from information technology applications, with cost reduction and performance benefits of information technology adaptation leading to the development and deployment of various smart technologies throughout numerous CI sectors. This includes the complementary use of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices to produce an integrated mesh of physical systems supporting (1) healthcare, transportation, energy, and industrial control system sectors [4], and (2) other OT-dominated sectors that include critical manufacturing, defense industrial base, emergency service, and water/wastewater treatment sectors [5]. Enabling OT is vital to cross-sector critical infrastructure operations and the communications interconnectivity has driven the need for ensuring resilience, safety, and security.
Various Radio Frequency (RF) fingerprinting methods have been considered over the past decade to improve the security of communication systems supporting OT networks. Among these methods are those identified in [6] where the authors have aptly summarized different RF fingerprint generation, extraction, and discrimination methods that can be considered to boost physical layer protection. A majority of the methods noted in [6] can be categorized as passive methods where the fingerprint features are extracted from collected RF emissions of operationally installed devices performing their by-design function. This differs from active fingerprinting methods, whereby the features are extracted from externally stimulated RF emissions collected from uninstalled devices that may or may not be functionally operating.
Fingerprinting methods based on Distinct Native Attribute (DNA) features are duly noted in [6] and have demonstrated potential for enhancing physical layer security in wireless OT networks [7,8,9]. This includes demonstrations using WirelessHART communication devices, which (1) have rapidly proliferated throughout OT application spaces, (2) are among the two most widely used industrial international standards, and (3) have fielded numbers approaching tens of millions [10]. The statistical DNA-based fingerprinting methods have employed both passive [11,12,13] and active [8,14] approaches for exploiting WirelessHART DNA features. These works have predominantly employed Multiple Discriminant Analysis (MDA) and ensemble-based Random Forest (RndF) classifiers to perform device discrimination.

1.1. Research Motivation

Advances in neuromorphic computing [15] and the use of Spiking Neural Network (SNN) classification architectures [16] have enabled near-equivalent classification performance as obtained with traditional von Neumann-based artificial neural network architectures at a fraction of the energy consumption. While neuromorphic computing has shown energy reduction approaching 1000× in selected applications [17,18,19], its impact on radio-frequency (RF) applications remains largely uninvestigated.
RF sensing systems stand to gain considerable benefit from new energy-efficient neuromorphic processing. This includes upgrades to RF receiver processing that historically requires analog-to-digital conversion of continuous signals and sample decimation to reduce the amount of data presented to downstream processing elements. RF signal “eventization” holds promise for decreasing the overall required power by reducing the amount of data required by downstream processes. For RF fingerprinting applications [14], this includes reducing the amount of data required for fingerprint generation and device discrimination by using features extracted from information-bearing event data.
Neuromorphic event-based camera processing is orders of magnitude more energy efficient than traditional frame-based camera processing [20]. The envisioned “event radio” concept seeks to bring these advantages into the RF processing arena. The belief that similar benefits may be realized for an RF event radio is motivated by (1) the existence of hardware such as the Intel Loihi neuromorphic chip [21] that provides an energy-efficient speed improvement when processing RF signals [22], and (2) the use of computationally efficient deep machine learning algorithms in RF electronic warfare applications [23].
Potential benefits of neuromorphic computing are considered here in light of previously demonstrated DNA fingerprinting methods. This includes comparing non-eventized and eventized RF fingerprinting performance using features from experimentally collected signals for eight WirelessHART devices—some of the same devices that are proliferating throughout various OT application spaces. The WirelessHART signals are adopted from [14] and are representative of communications using Frequency-Hopped, Time Division Multiple Access (FH-TDMA) to provide multi-user, multi-channel operation. The WirelessHART FH-TDMA demonstration signals include the effects of multi-device, multi-channel interference, which significantly increases the fingerprint discrimination challenge when compared with single-device, single-channel operation.
The RF eventization work here represents the first step toward transitioning to a neuromorphic-friendly, low power-consuming, SNN classification capability of enhancing edge device operational protection. This includes consideration for implementing SNN-based neuromorphic processing in Field Programmable Gate Array (FPGA) hardware being hosted on Software-Defined Radio (SDR) platforms. Several RF eventization encoding methods are considered here using WirelessHART one-dimensional Time Domain (1D-TD) signals and their corresponding two-dimensional Gabor transform (2D-GTX) responses. Classification results are generated for NDev = 8 devices using fingerprints from selected eventization methods to highlight the potential for realizing event radio capability—this is envisioned as being an SDR-based solution hosting FPGA hardware to achieve low-power SNN-based neuromorphic processing objectives.

1.2. Relationship to Prior Research

The concept of an “event” occurring within time-series data has been studied in multiple applications and includes events at the signal waveform level as well as the machine-processing level [24,25,26]. A key issue with time-series processing is dealing with vast amounts of data generated by continuously sampled univariate or multivariate processes. For the purpose of RF eventization, as defined in this work, a large sequence of real-valued numbers (raw signal samples) is transformed into a shorter length sequence of binary-valued “spikes”, which are either positive or negative, for use in neuromorphic processing. Various methods have been devised to implement this type of eventization encoding and are broadly categorized as rate coding and temporal coding methods [27]. For a given application, a preferred encoding method may be empirically selected based on information loss of the original signal [28], classifier accuracy [29], or some other metric. As achieved in the event camera arena [20], key eventization advantages include very high temporal resolution, low latency, very high dynamic range, and low power consumption [20]. It is desired to achieve similar advantages in neuromorphic RF systems.
For the purpose of this work, we used a threshold-based temporal coding method given its successful application in the event-based classification of Free-Spoken Digit (FSD) audio datasets in [30]. Audio is perhaps the most similar signal type to the WirelessHART data used here. This earlier work addresses pre-processing encoding techniques for lower-frequency, narrowband (100 < f < 1000 Hz), and time-varying audio signals. The pre-processing of raw input signal samples includes multi-channel Butterworth filtering followed by temporal spike encoding prior to feature extraction and classification. Of the various temporal encoding methods considered in [30], it was concluded that Temporal Contrast encoding was best overall and yielded the highest average classification accuracy with minimum accuracy variance. Temporal Contrast encoding generates spikes by comparing absolute signal variation with a fixed detection threshold and assigning resultant positive (+1) and negative (−1) spikes to the encoded sequence.
Given its success in [30] with audio signals, threshold-based contrast encoding was adopted here for initial RF eventization demonstration using the higher-frequency/higher-bandwidth WirelessHART signals detailed in Section 2.1. Contributions of the work here include (1) the first application of Temporal Contrast encoding to one-dimensional Time Domain (1D-TD) WirelessHART signals as detailed in Section 2.2.1, and (2) the introduction and demonstration of a Temporal–Spectral Contrast encoding approach using two-dimensional Gabor Transform (2D-GTX) responses of WirelessHART signals in Section 2.2.2.

1.3. Paper Contribution

There is a wide range of RF fingerprinting methods surveyed in [6] that can be used for device classification. The effectiveness of these methods is directly related to fingerprint “profile” features, which yield best-case performance when the features are ideally unique across the pool of devices to be classified. While the numerous fingerprint features noted in [6] are influenced by waveform level “events” (turn-on/turn-off transients, intentional/unintentional amplitude, phase, frequency modulation, etc.), none of the noted methods in [6] use RF fingerprints comprised of event-based features such as used here.
As completed here, the use of RF signal eventization coding and characterizing its effect on device classification performance is believed to be a first-of-a-kind activity for higher RF frequency (10 s of MHz) event processing. The work in [30] is perhaps the most related but considered much lower frequency signals, including very low-frequency signals (10 Hz to 1 KHz) as occurs in smart device biometric applications and mid-audio frequency signals (500 Hz to 2 KHz) as occurs in human voice recognition applications. As noted in Section 1.2, the success in [30] with these lower frequency signals is achieved using a threshold-based contrast encoding method, which was adopted here for higher frequency RF signal consideration.
Of equal importance, the RndF accuracy benchmark (%C ≥ 90%) established here and the identification of the average number of RF Events-Per-Burst (NEPB ≥ 400) required to achieve this accuracy sustain motivation for continuing the development and demonstration of an RF event radio capability. The RndF classifier is a reliable precursor for subsequent RndF-to-Convolutional Neural Network (CNN) classifier transition activity that is currently underway. The RndF-to-CNN transition activity will provide the baseline for the final CNN-to-SNN transition activity with the resultant neuromorphic-friendly SNN classifier holding the most promise for meeting high accuracy, low latency, and high energy efficiency objectives when implemented in hardware.

1.4. Paper Organization

The remainder of this paper is organized as follows. The Demonstration Methodology is presented in Section 2 and includes selected details on WirelessHART signals, RF signal eventization encoding, and fingerprint formation using non-eventized and eventized features. Summary details for the implemented MDA/ML and RndF classifiers are presented in Section 3. The device classification results are presented in Section 4 and predominantly focus on RndF classifier performance, which provides the basis for drawing conclusions and declaring demonstration success. The paper ends with a research summary and conclusions in Section 5.

2. Demonstration Methodology

This section provides selected details for key processes and activities used for conducting the experimental demonstrations and generating the classification results presented in Section 4. Selected details are provided for the following:
  • WirelessHART Signals in Section 2.1—provides details for the WirelessHART adapters being discriminated, the Frequency-Hopped Time Division Multiple Access (FH-TDMA) process used to add multi-channel Cross-Channel Interference (CCI) effects, and the Signal-to-Interference-plus-Noise (SINR) ratio scaling process used to induce varying channel effects. The use of CCI-laden bursts here for the initial demonstration was (i) a matter of experimental convenience given that the single-channel WirelessHART bursts and the FH-TDMA process for coherently combining them were available [14]; and (ii) it was believed that discrimination using CCI-laden bursts presented a greater challenge when compared with single-channel discrimination;
  • RF Signal Eventization Encoding in Section 2.2—provides details for the threshold-based contrast encoding used for one-dimensional Time Domain (1D-TD) and two-dimensional Gabor Transform (2D-GTX) fingerprinting demonstrations. This includes encoding the WirelessHART FH-TDMA signal responses into event sequences used for fingerprint generation;
  • Fingerprint Formation in Section 2.3—provides details for forming the non-eventized statistical DNA and eventized fingerprint vectors that are input to the classifiers to assess device discriminability. These vectors are often referred to as input “samples” within the machine learning community. However, the term fingerprints is used exclusively herein to help minimize potential confusion between classifier input samples and experimentally collected time domain samples in the FH-TDMA signals.

2.1. WirelessHART Signals

The experimental signals used here for eventization demonstrations were originally collected in support of work in [13] and subsequently processed to support work in [14] that added multi-channel Cross-Channel Interference (CCI) effects. Selected experimental collection details from these previous works are included here for completeness. The signal collections were performed in a typical laboratory environment using the four Siemens AW210 [31] and four Pepperl+Fuchs Bullet [32] devices listed in Table 1. Note that while two different manufacturers are listed, which is based on labels affixed to the devices, all devices were actually manufactured in a single plant located in Twinsburg Ohio, USA. The change in labeling and serial number sequencing is a result of Pepperl+Fuchs acquiring the manufacturing facility from Siemens.
As illustrated in Figure 1, the devices communicate directly with an Emerson 1410 gateway [33] one at a time while a USRP X310 Software Defined Radio (SDR) [34] collects the device emissions. The devices were placed 8 ft. from the gateway, and the SDR collection antenna was positioned 18 in. from the operating device. Each device was operated in non-overlapping 5.0 MHz WirelessHART channels (Chn#1–Chn#15) in the 2.4 GHz industrial, scientific, and medical frequency band [35]. The channel center frequencies include fc(m) = 2405 + 5m MHz for m ∈ {1, 2, …, 15} and span [fc(m) − 2.5, fc(m) + 2.5] MHz. The devices use preamble-based signaling with Offset Quadrature Phase-Shift Keyed (O-QPSK) data modulation.
The X310 collection receiver was manufactured by Ettus Research in Austin, TX, USA. It uses an RF bandwidth of BWCol = 100 MHz and was set to a center frequency of fCtr = 2.440 GHz, which was sufficient for collecting signals in all WirelessHART frequency channels. The collection receiver employed an fS = 100 Mega-Samples per second (MSps) sample rate and a total of 2500 experimental bursts were collected per device in each of the 15 WirelessHART channels. Post-collection Signal-to-Noise Ratio (SNR) analysis in [13] showed that an average collected SNRCol ≈ 41.4 dB was realized across all devices, all channels, and all collected bursts. The effects of real-world CCI were added post-collection through coherent re-combination using a Frequency-Hopped, Time Division Multiple Access (FH-TDMA) process [14]. This process was used to (1) mimic WirelessHART network operation that includes multiple adapters simultaneously transmitting in multiple frequency channels [36], and (2) enable classification performance assessment under conditions that are expected to increase the device discrimination challenge. As detailed below, the induction of CCI necessitated the need for an alternate Signal-to-Interference-plus-Noise Ratio (SINR) metric.
The FH-TDMA processing in Figure 2 was implemented such that NFrq = 8 adjacent Frequency Slots (FS) were occupied within each Time Slot (TS). The frequency assignment of device D4 across time slots is highlighted in blue to illustrate the frequency hopping nature of the process when considering the FH-TDMA assignment for a given device. The FH sequential TS-by-TS processing included (1) random assignment of collected signals from all NDev = 8 devices to 1-of-8 FH frequency slots corresponding to WirelessHART Chn#8–Chn#15 operation; (2) coherent summation of the eight assigned bursts, one from each of the users operating in their assigned frequency channel—this effectively induces the cross-device CCI effects; (3) FS-by-FS slot (channel-by-channel) filtering using a 5.0 MHz bandpass channel filter to extract and segregate individual user signals; (4) device-by-device down-conversion and filtering using a 2.5 MHz baseband filter; and (5) factor-of-20 sample decimation for a final sample rate of fS = (100 MSps)/20 = 5 MSps.
The FH-TDMA processing was repeated until a total of NBrst = 8576 CCI-bearing responses, denoted as s F h T d ( t ) , were generated for each of the eight devices. The SINR of the channel-filtered s F h T d ( t ) was scaled prior to eventization and DNA fingerprint generation. The input signal to the eventization and fingerprinting processes is given by
s F h T d t = f i l t e r   s W H t + s C C I t + n B c k ( t )       ,
where filter [ ] denotes the WirelessHART channel filtering used to segregate individual user signals, s W H t is the experimentally collected WirelessHART signal, s C C I t accounts for the induced CCI contribution, and n B c k ( t ) represents background noise that was present during the collection. The SINR of the s F h T d ( t ) responses in Equation (1) were scaled on a channel-by-channel basis using channel-filtered Additive White Gaussian Noise (AWGN) to induce channel variation effects according to
S I N R S W H I C C I + N B c k + N A W G N   ,
S I N R d B = S W H d B 10 × L o g 10 I C C I + N B c k + N A W G N   ,
where SWH is the average collected WirelessHART signal power, ICCI is the average induced CCI power, NBck is the average collected background power, and NAWGN is the average channel-filtered noise power that is added to set the desired analysis SINR. It was empirically determined that the average (cross-device, cross-burst, cross-channel) power levels before FH-TDMA processing (NBck only contributes) and after FH-TDMA processing (both ICCI + NBck contribute) resulted in an approximate +8.5 dB increase in the noise floor of s F h T d t . The noise floor was further increased by varying NAWGN to set the simulated range of +6.5 > SINR(dB) > +26.5 dB used for results presented in Section 4.

2.2. RF Signal Eventization Encoding

Threshold-based contrast encoding [30] was adopted here for initial RF eventization demonstration using the WirelessHART signals detailed in Section 2.1. The methodology here includes (1) the first application of Temporal Contrast encoding to one-dimensional Time Domain (1D-TD) WirelessHART signals in Section 2.2.1, and (2) the introduction of a Temporal–Spectral Contrast encoding approach using two-dimensional Gabor Transform (2D-GTX) responses in Section 2.2.2.
Effects of RF eventization on device classification performance were investigated using the experimentally collected WirelessHART burst responses. Figure 3a,b show the 1D-TD amplitude and 2D-GTX magnitude responses generated from the sequence of samples b C o l ( n ) for a representative WirelessHART burst. Elements of the b C o l ( n ) sequence are sample values of the real-valued continuous burst response b C o l ( t ) taken at the t n -th time instant. There are various eventization processes that could be considered and a select few were considered here for initial assessments. As detailed in the next two sub-sections, the threshold-based contrast encoding processes used here include (1) eventization of 1D-TD non-transformed b C o l ( n ) sample sequences, and (2) eventization of transformed 2D-GTX sequences of the b C o l ( n ) sequence.
For both the 1D-TD and 2D-GTX demonstrations, a threshold-based eventization process is used. For 1D-TD, a given threshold value (Thr) is applied to centered (mean removed) and normalized (values scaled to span [−1 +1]) responses. For all of the 1D-TD and 2D-GTX responses to be eventized, with CtrNrm(m) representing a given element of the centered-normalized response, the detection of an event using CtrNrm(m) includes comparing abs[CtrNrm(m)] with the Thr value and declaring one of two conditions: (1) for abs[CtrNrm(m)] ≥ Thr, a detection is declared and an eventization value of sign[CtrNrm(m)] = ±1 is assigned to the mth element where sign[x] is the sign of x—this is the detection of what are called positive (+1) and negative (−1) events; and (2) for abs[CtrNrm(m)] < Thr, a value of zero is assigned for the mth element to indicate no event was detected.

2.2.1. One-Dimensional Time Domain (1D-TD) Eventization

The 1D-TD eventization processing included (1) Direct Eventization using the centered-normalized b C t r - N r m 1 D - D i r ( n ) sequence samples for threshold-based event detection; (2) Integral Eventization using the centered-normalized integrated b C t r - N r m 1 D - I n t ( n ) sequence samples for threshold-based event detection; and (3) Derivative Eventization using the centered-normalized first derivative b C t r - N r m 1 D - D e r ( n ) sequence samples for threshold-based event detection. The 1D-TD centering (mean removal), normalization, thresholding, and eventization process are illustrated in Figure 4 using the first derivative b C t r - N r m 1 D - D e r ( n ) sequence of samples for the representative WirelessHART response in Figure 3.
The threshold-based eventization process illustrated in Figure 4 was applied to the 1D-TD direct b C t r - N r m 1 D - D i r ( n ) , integrated b C t r - N r m 1 D - I n t ( n ) , and first derivative b C t r - N r m 1 D - D e r ( n ) sequences using selected threshold values (+/− Thr). The event declaration assignments of e(n) ∈ [−1 0 +1] were made and used to form eventized fingerprints per Equation (7) in Section 2.3.2 and used for RndF classifier training and testing. Apart from the actual eventization detections, i.e., assignment of ±1 detection values at specific n indices, results for the other 1D-TD b C t r - N r m 1 D - D i r ( n ) direct and b C t r - N r m 1 D - I n t ( n ) integral sequences would appear similar.

2.2.2. Two-Dimensional Gabor Transform (2D-GTX) Eventization

A detailed discussion of GTX processing is omitted here for brevity. The reader is referred to the many works that have addressed GTX development and its application for improving signal joint time–frequency resolution. The GTX application trail is diverse and spans from some of the earliest signal processing development activity [37,38,39] to some of the most recent work [40,41]. Of most relevance here is the Gabor-based DNA fingerprinting work, with early demonstrations occurring in [42,43] and the most recent demonstrations being performed in [8]—the GTX processing implemented here was based on these works. Elements of the complex GTX matrix are denoted by GTX(k,m) for k = 1, 2, …, KTim and m = 1, 2, …, MFrq. The full GTX matrix generation parameters included KTim = 16, MFrq = 128, with NΔ = 64 time sample shifts between transformations. The analysis Gaussian window width was set to WGW = 0.01. Following the generation of GTX(m,k) for a given input burst, there were two 2D-GTX eventization encoding processes considered:
  • Direct Eventization: Elements of the (MTim × KFrq)-dimensional GTX matrix such as shown in Figure 5a were generated from collected b C o l ( n ) sequence samples. Centering and normalization were applied to the resultant GTX matrix such that −1 ≤   a b s G T X C t r - N r m D i r ( m , k ) ≤ +1 for all m, k.
  • Derivative Eventization: The (MTim × KFrq)-dimensional GTX matrix was used with row-wise (row-by-row) differencing followed by centering and normalization such that −1 ≤ a b s G T X C t r - N r m D e r ( m , k ) ≤ +1 for all m, k.
The previously detailed threshold-based eventization detection process was applied to elements of the centered-normalized matrices, i.e., CtrNrm(m,k) = a b s G T X C t r - N r m D i r ( m , k ) and CtrNrm(m,k) = a b s G T X C t r - N r m D e r ( m , k ) , respectively. These CtrNrm(m,k) were compared with specified threshold values (0 < Thr < 1) and event declaration assignments of e(n) ∈ [−1 0 +1] made. The e(n) assignments were used to form eventized fingerprints per Equation (7) in Section 2.3.2 and used for RndF classifier training and testing.
Sequential stages of the GTX eventization process are illustrated in Figure 5 for derivative eventization of the GTX matrix in Figure 3b—the graphic illustration would be similar for direct eventization. The illustration includes (1) Figure 5a, which is the derivative GTX matrix response with the event detection ROI highlighted; (2) Figure 5b, which is an expanded view of the event detection ROI in Figure 5a; (3) Figure 5c, which is the eventized GTX derivative matrix for the ROI using a threshold value of Thr = 0.6; and (4) Figure 5d, which is the vectorized form of the GTX event matrix in Figure 5c.

2.3. Fingerprint Formation

For consistency with a majority of AFIT’s historically related fingerprinting work [8,9,11,13,14,42,43], the classifier input “samples” are referred to herein as fingerprints—this helps minimize the potential confusion between classifier input “samples” and experimentally collected time domain samples in the b C o l ( n ) sequence. Three different types of fingerprints were formed using N C o l samples of the collected burst sequence b C o l ( n ) . These include (1) the non-eventized as-collected F N o n E v C o l and non-eventized statistical F N o n E v S t a t fingerprints detailed in Section 2.3.1, and (2) the eventized F E v fingerprints detailed in Section 2.3.2.

2.3.1. Non-Eventized Fingerprint Formation

Classification assessments were performed using two different Non-Eventized (NonEv) fingerprint types. The non-eventized as-collected fingerprints F N o n E v C o l   were formed as vectors having elements equaling the N C o l sample values of the collected burst sequence b C o l ( n ) according to
F N o n E v C o l =   b C o l 1     b C o l 2       b C o l n         b C o l n N C o l 1     b C o l n N C o l   1 × N F e a t
where b C o l n is the nth collected sample for n = 1, 2, …, NCol, and N F e a t = N C o l is the total number of fingerprint features. This produces the highest-dimensional non-eventized fingerprints and generally requires the highest computational intensity (energy consumption) to perform classification.
The non-eventized statistical DNA fingerprints F N o n E v D N A   were formed from statistical features of non-transformed 1D-TD and 2D-GTX responses as illustrated in Figure 3a and Figure 3b, respectively. This process is consistent with previous DNA fingerprint generation where the fingerprint features include statistical metrics of variance (σ2), skewness (γ), and kurtosis (κ). These statistics are calculated using samples within selected sub-regions of (1) 1D-TD amplitude (Amp), phase (Phz), and/or frequency (Frq) responses as detailed in [14], and (2) 2D-GTX transform matrices as detailed in [8,42,43]. For each of the selected 1D-TD responses (centered-normalized amplitude, phase, and/or frequency) and 2D-GTX response (centered-normalized magnitude), the response is divided into NSRgn sub-regions, and the non-eventized statistical DNA fingerprint is formed according to
F N o n E v D N A =   f S R 1     f S R 2         f S R 3           f S R i         f S R N S R g n 1     f S R N S R g n   1 × N F e a t ,
where the symbol denotes vector concatenation, index i = 1, 2, …, NSRgn, and N F e a t is the total number of fingerprint features. Considering the noted N S t a t = 3 statistical features (σ2, γ, κ), the   f S R i in Equation (5) are calculated using ith sub-region samples according to
  f S R i = σ S R i 2 γ S R i   κ S R i 1 × 3 .
This yields a total of N F e a t = N S R g n × N S t a t × N R e s p features when substituting Equation (6) back into Equation (5) where N R e s p is the total number of instantaneous responses used (amplitude, phase, and/or frequency). Statistical DNA fingerprints generated per Equation (6) are the lowest-dimensional non-eventized fingerprints and require lower computational intensity (energy consumption) to perform classification.

2.3.2. Eventized Fingerprint Formation

The Eventized (Ev) classification assessments were performed using fingerprints formed directly from e(n) ∈ [−1 0 +1] assignments such as illustrated in the eventization vectors shown in Figure 2 and Figure 5. The eventized fingerprint is formed according to
F E v =   e 1     e 2     e 3   e n     e N E v   1 × N F e a t ,
where n = 1, 2, … N E v = N F e a t . Given a total number of   N E v detected events, the nth fingerprint feature in Equation (7) is assigned as either (1) e n = + / 1 for a Positive/Negative event or (2) e n = 0 when no event is detected. The N E v events used to form the F E v fingerprint in Equation (7) equals either (1) the total number of 1D-TD eventized response samples, e.g., the total number of samples in Figure 4b, or (2) the total number of elements in the eventized 2D-GTX response, e.g., the total number of 2D-GTX elements (KTim × MFrq) in Figure 5d.

3. Device Classification

Both 1D-TD and 2D-GTX fingerprints were generated per Section 2.3 for the eventization methods in Section 2.2 and used to discriminate the WirelessHART devices listed in Table 1. For consistency with prior non-eventized DNA fingerprinting works [8,9,11,13,14,42,43], classification results are first generated for a Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) classifier adopted from these earlier works. Some fundamental details for MDA/ML processing are provided next in Section 3.1—the reader is referred to cited works therein for additional details. A Random Forest (RndF) classifier is then introduced and used to generate the primary results used for drawing conclusions related to similarity and/or differences between Non-Eventized (NonEv) and Eventized (Ev) fingerprinting performances. Fundamental details for the RndF classifier used here are provided below in Section 3.2—the reader is referred to cited works therein for additional details.
Regardless of the classification method used, the classification results reported herein are based on a classification confusion matrix, as illustrated in Table 2. This shows classification testing results using fingerprints for the 2D-GTX derivative eventization process illustrated in Figure 5. The entries are used to calculate the average cross-class percent correct %C, which is a less rigorous metric than that used herein to enhance appreciation for the work across a broader, cross-discipline readership [11]. A more detailed analysis of confusion matrix results for a multi-class classifier may be performed using the methods in [44]. The Table 2 classification results are for an NCls = 8 class (device) model using a total of NTST = 1716 held-out testing fingerprints for each device. The sum of the bold diagonal entries is divided by the total number of trials represented in the confusion matrix to provide an estimated %C ≈ [13,094/(8 × 1716)] × 100 ≈ 95.38%. The last row in Table 2 also provides the per-class average percent correct %CCls, which is calculated using the number of correct estimates for the class divided by NTST = 1716.

3.1. MDA/ML-Based Classification

The MDA/ML designation is used to reinforce that there are two fundamental processes involved, including MDA model development and ML class estimation. A few summary details of MDA and ML processing are provided here for completeness and are primarily taken from [11]. MDA is a multi-class (NCls > 2) form of Fisher’s linear discriminant processing. The process takes in NTNG  1 × N F e a t -dimensional training fingerprints F T N G and outputs an N F e a t × N C l s 1 -dimensional projection matrix ( W ) and training fingerprint statistics—the collection of ( W , μF, σF, μk, Σk) for k = 1, 2, …, NCls that is returned from MDA processing is known as the model.
The generation of W is analytically driven by optimization conditions that include the pool of input NTNG fingerprint features being normally distributed. The resultant matrix W effectively projects the NTNG fingerprints into an N C l s 1 decision space where the inter-class mean separation distance is maximized and the intra-class spread is minimized [45]. Given the trained MDA model, the MDA projection vector for a given testing fingerprint F U , i.e., an “unknown” fingerprint for one of the classes that was not used for model development, the N C l s 1 -dimensional projection vector is calculated using p U = F U μ F σ F 1 W where denotes a Hadamard product.
The resultant projection vector p U is used for class estimation, a one-versus-all best match assessment where p U is declared (rightly or wrongly) as coming from/belonging to the kth-class (k = 1, 2, …, NCls). The declaration of a class estimate can be made using many measures of similarity, including (1) a distance-based Euclidean distance measure where the class estimate is based on the minimum geometric distance between fingerprint projection p U and the model training class mean μk across all classes; and (2) probability-based measure where p U is mapped to the a-posterior probabilities (likelihoods) of all classes and the class yielding the maximum likelihood is the estimated class. When performed under Bayesian conditions of equal a priori probabilities for all classes and equal costs for making an estimation error, the resultant probability-based estimate is referred to as a Maximum Likelihood (ML) estimate.

3.2. RndF-Based Classification

For RndF classification decisions each “unknown” F U testing fingerprint is classified by each tree in the ensemble. The final output class estimate is made through a plurality vote, whereby the class receiving the most votes across the ensemble is declared as the estimate [46]—a majority of the ensemble classifiers do not have to agree with the estimate. This requires that a large ensemble of classifiers be used to ensure an unbiased and accurate classification estimate is made. In general, the use of more trees can increase classification performance but at the expense of increased estimation time. To minimize both bias and between-tree correlation across the ensemble, the trees can be grown to be full-length (maximum depth). For all RndF results presented in Section 4, the RndF classifier was implemented in a Python-based Scikit-Learn environment using the following:
  • Number of Trees: 100;
  • Epoch Termination Criterion: Gini Impurity;
  • Maximum Tree Depth: None; resulting in full-length trees with pure leaves;
  • Minimum Number of Fingerprints to Split: 2;
  • Minimum Number of Fingerprints in a Leaf: 1;
  • Number of features for random subspace selection: N F e a t = 1000 32 .
One unique benefit is that RndF processing enables the calculation and output of Gini index relevance values for all features. The Gini index value reflects the relative importance of a given feature on the final classification estimate—a higher Gini Index value indicates a greater influence on the final class estimate. Gini index ranking was successfully exploited in previous DNA-based fingerprinting work [12] using the same WirelessHART devices being used here. This work demonstrated fingerprint dimensional reduction that included Gini-based identification and removal of the lowest-ranked, most irrelevant 80% of the fingerprint features while sacrificing a marginal 1% < %CΔ < 2% degradation in overall classification performance.
Representative Gini index values are presented in Figure 6 for an NCls = 8 RndF classifier using 1D-TD eventized fingerprints. The eventized fingerprints from Equation (7) included a total of NFeat = 1000 features and an average number of detected Events-Per-Burst equaling NEPB = 206 events—as introduced here the NEPB average is calculated across eventized fingerprints for all NBrst = 8576 bursts from each of the NDev = 8 devices. Figure 6a shows the sorted (highest-to-lowest) Gini values and Figure 6b shows the non-sorted Gini values for each feature index number. The feature-by-feature retention/removal of higher/lower significant features is clearly supported and suggests that the dimensional reduction benefit demonstrated in [12] may be realizable for the eventized fingerprints being considered here—this investigation remains a topic for future research.

4. Device Classification Results

Both 1D-TD and 2D-GTX fingerprints were generated per Section 5 and used to discriminate WirelessHART signals. For consistency with prior non-eventized DNA fingerprinting works [8,9,11,13,14,42,43], classification was first performed with a Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) classifier—the reader is referred to the noted references for MDA/ML-based device discrimination details. The RndF classifier detailed in Section 3.2 was then introduced and an MDA/ML vs. RndF classification comparison was performed.
Figure 7 shows classification results for both classifiers and NCls = NDev = 8 classes using both non-eventized (NonEv) 1D-TD and 2D-GTX DNA fingerprint features. The sets of NFP = NBrst = 8576 1D-TD and 2D-GTX DNA fingerprints per device were generated using Equations (5) and (6). The total number of available fingerprints was then divided into an 80% training subset and a 20% testing subset. Each subset was stratified and balanced to ensure an equal number of class representations. Ultimately, 54,880 fingerprints were used for training, and 13,728 fingerprints were used for testing.
For 1D-TD DNA fingerprinting results in Figure 7, the statistical F N o n E v S t a t fingerprints in Equation (6) were formed using (1) NResp = 3 (Amp, Phz, Frq) non-eventized burst responses; (2) NSRgn = 16 fingerprinting regions per response; and (3) NStat = 3 statistics (σ2, γ, κ) to form vectors per Equation (5). The statistical vectors from Equation (6) were used in Equation (5) to form the final composite F N o n E v 1 D - T D = F N o n E v S t a t fingerprints. The resultant F N o n E v 1 D - T D fingerprints used for Figure 7 results had a total of N F e a t 1 D - T D = 3 × 16 × 3 = 144 features.
For 2D-GTX DNA fingerprinting results in Figure 7, the statistical F N o n E v S t a t fingerprints in Equation (5) were formed by (1) dividing non-eventized 2D-GTX matrices into   N T i m B l k × N F r q B l k -dimensional sub-matrices where N T i m B l k and N F r q B l k denote the number of time and frequency blocks, respectively; (2) calculating NStat = 3 statistics (σ2, γ, κ) for each of the N T i m B l k = 9 × N F r q B l k = 6 = 54   sub-matrices; and (3) forming the statistical feature vectors per Equation (6). The statistical vectors from Equation (6) were used in Equation (5) to form the final composite F N o n E v 2 D - G T X = F N o n E v S t a t fingerprints. The resultant F N o n E v 2 D - G T X fingerprints used for Figure 7 results had a total of N F e a t 2 D - G T X = 9 × 6 × 3 = 162 features.
In light of next-step performance assessments in the following sub-sections using eventized fingerprints, there are two conclusions to be considered from Figure 7:
  • 2D-GTX fingerprinting outperforms 1D-TD fingerprinting for both classifiers across a majority of the SINR ≥ 10.5 dB considered—the 2D-GTX vs. 1D-TD benefit here is consistent with prior 2D-GTX DNA fingerprinting findings [8,42,43];
  • For best-case 2D-GTX fingerprints, MDA/ML (unfilled ★) outperforms RndF (unfilled ✶) by an average of % C G T X - T D + 2.97 % across the range of SINR(dB) considered. This includes operating under lower S I N R G T X - T D 4   d B channel conditions to achieve an arbitrary performance benchmark of %C = 90%.
In transitioning to eventized classification performance results in the following sub-sections, it is noted that the eventized F E v fingerprints are formed using Equation (7) and contain zero-valued elements. Thus, the statistical distribution of eventized fingerprint features is binary and not well-suited for MDA/ML classification—the development of MDA models and classification performance is dependent upon the input features being normally distributed. This is accounted for in MDA projection matrix formation, which requires the inversion of a composite input fingerprint matrix. As the number of zero-valued fingerprint features increases, the matrix becomes non-invertible (determinant approaches zero) and projection matrix formation is not possible. Thus, all results in the following sub-sections were obtained using an RndF classier with the parameters noted in Section 3.2.

4.1. Eventized Classification

Classification performance using 1D-TD and 2D-GTX eventized fingerprints was next considered for the eventization methods detailed in Section 2.2. The results were generated using the same RndF classifier detailed in Section 3.2 and used for the non-eventized results in Figure 7. The 1D-TD vs. 2D-GTX RndF classification results are presented in Figure 8. The eventized F E v 1 D - T D and F E v 2 D - G T X fingerprints were formed using Equation (7) for each of the Direct, Derivative, and Integral eventization methods considered. The fingerprint features included the detected eventization values (−1, +1) such as those illustrated in Figure 4b (TD-DNA) and Figure 5d (GTX-DNA), and zero values at remaining indices where no event is detected.
One operational implementation objective includes minimizing the number of fingerprint features, which in turn minimizes the required computational resources. This is supported by (1) setting eventization thresholds to minimize the number of detected Events-Per-Burst (NEPB), while (2) achieving a given %C classification performance. As indicated in Table 3, the resultant NEPB and %C classification performance is a function of the eventization method employed (method-dependent) and the specific threshold value (threshold-dependent) used with a given method. The results in Table 3 are a selected subset of results obtained for a range of empirical thresholds spanning 0.01 < Thr < 0.75 in ΔThr = 0.05 increments. Table 3 shows the threshold value yielding the minimum NEPB to achieve the maximum asymptotic %C for that threshold. As first used in Table 3, the color coded symbology for the various eventization methods is retained throughout the remainder of the paper in tables and figures to assist in tracking per-method performances.
The %C classification results in Figure 8 were obtained for the indicated average (cross-burst, cross-device) number of NEPB using a given eventization method. Relative to achieving a minimum NEPB demonstration objective, there are several conclusions drawn from Figure 8.
  • The 1D-TD Integral (Electronics 13 02020 i001) fingerprinting performance does not achieve the arbitrary performance benchmark of %C = 90% for all 50 < NEPB < 900 considered—integral-based eventization was henceforth removed from further consideration;
  • The 1D-TD Direct () fingerprinting performance is second-best and approaches the %C = 90% benchmark for NEPB > 480. Of note here is the poorer performing 1D-TD Derivative (Electronics 13 02020 i002) fingerprints, which do achieve the %C = 90% benchmark for any NEPB considered. Thus, the penalty in classification performance for taking a time domain derivative is severe, and the computational cost for doing so should be avoided;
  • The 2D-GTX Derivative () fingerprinting performance is best overall across the entire range of 50 < NEPB < 850 considered. This includes the %C = 90% benchmark being achieved for NEPB > 380 detected events—the previously demonstrated benefit of eventized over non-eventized fingerprinting in Figure 7 is retained.
The classification performance for both 1D-TD (Electronics 13 02020 i002) and 2D-GTX () Derivative fingerprints is statistically equivalent over an approximate range of 50 < NEPB < 215. For NEPB > 215, the 2D-GTX () derivative fingerprints provide a clear benefit that includes an increase in performance of 1% < %CΔ < 12.2%. This benefit is realized at the expense of performing one additional processing step that included taking a row-wise derivative of the input GTX matrix before performing eventization. There are other processing alternatives that may be considered (e.g., a column-wise derivative) to achieve similar or even greater benefit—alternatives remain on the list for future consideration.

4.2. Non-Eventized vs. Eventized Classification

To directly highlight the effect of eventization on device classification performance, a comparison of Non-Eventized (NonEv) vs. Eventized (Ev) RndF classification was performed. As presented in Figure 9, the comparisons were performed for SINR = 16.5 dB channel conditions using eventized fingerprints based on NEPB = 600 events. A selection of these values is based on RndF achieving the %C = 85% benchmark, with SINR selected from Figure 7 and NEPB selected from Figure 8 where all fingerprinting methods achieved the benchmark. The performance degradation resulting from eventization is reflected in the eventization difference metric % C E v % C E v % C N o n E v shown in Table 4 where % C E v is the performance using eventized fingerprints and % C N o n E v is the performance using non-eventized fingerprints.
As indicated in Table 4  % C E v results, all eventization methods degraded performance to some degree with the GTX-based eventization methods degrading performance by % C E v 2 D - D i r 4.96 % and % C E v 2 D - D e r 2.88 % . It is not unreasonable to expect that this level of degradation will ultimately be acceptable when considering other benefits provided by eventization. For example, achieving the %C = 90% benchmark in Figure 8 requires NEPB ≈ 380 events using the 2D-GTX derivative F D e r - E v 2 D - G T X fingerprints that include an average of (NS = 1250) − (NEPB ≈ 380) = 870 zero-valued elements. It is envisioned that a form of dimensional reduction (compression) may be possible for the derivative F D e r - E v 2 D - G T X fingerprints by removing zero-valued elements that are common across the pool of device fingerprints being used. If this can be done, there will be an approximate [(1250 − 380)/1250] × 100 ≈ 70% reduction in the number of eventized fingerprint features—this would decrease the computational processing requirements and may sufficiently offset the 3 % < % C E v 2 D - D e r < 4 % loss observed here with the RndF classifier. Furthermore, this level of degradation is considered marginal in light of the energy savings demonstrated by using SNN classification architectures [15].

5. Summary and Conclusions

This paper summarizes first-step research activity aimed at realizing an envisioned “event radio” capability that mimics neuromorphic event-based camera processing. The energy efficiency of neuromorphic processing is orders of magnitude higher than traditional von Neumann-based processing architectures (10× to 1000× [17,18,19]) and realized through synergistic design of brain-inspired software [47] and hardware [22] computing elements. The development and availability of event-based hardware devices supporting Radio Frequency (RF) applications are severely lagging when compared with activity in the event-based camera arena. Despite this lag, there remains considerable interest across the technical community in obtaining neuromorphic efficiency benefits through event-based RF signal processing. For the Operational Technology (OT) protection needs addressed here, this processing includes efficient software computing capability to provide reliable device classification.
While not envisioned as the final solution, a Random Forest (RndF) classifier is first considered here as a reliable precursor to using a Convolutional Neural Network (CNN) classifier, which is, in turn, a precursor to eventual demonstrations using the desired neuromorphic-friendly Spiking Neural Network (SNN) classifier. The event-based RF fingerprints used for RndF device classification were generated from experimentally collected signals for NDev = 8 WirelessHART devices. The signals were pre-conditioned prior to fingerprint generation to induce the generally adverse effects of Cross-Channel Interference (CCI). The induced CCI is a result of the NDev = 8 devices simultaneously operating in NCh = 8 different FH-TDMA network channels [14]. For completeness, classification performance for non-eventized fingerprints was performed as well and used as a baseline for characterizing the effects of eventization on classifier performance. The average %C correct classification results show the following:
  • 2D-GTX non-eventized fingerprinting performs best with an MDA/ML classifier across the range of the 6.5 < SINR< 26.5 dB considered;
  • 2D-GTX eventized derivative fingerprinting performs best with a RndF classifier under SINR = 16.5 dB channel conditions across the range of the 50 < NEPB < 900 considered;
  • 2D-GTX derivative-based eventization suffers a marginal performance penalty of % C E v 2 D - G T X 2.88 % when compared with non-eventized performance;
  • An arbitrary performance benchmark of %C ≥ 90% is achieved under SINR = 16.5 dB channel conditions using an average of NEPB ≥ 400 detected events per burst.
While RndF is not envisioned as being the final solution for achieving neuromorphic benefits in an event radio, the 2D-GTX eventized classification performance is promising and sufficiently motivates next-step demonstration activity, which includes (1) fingerprint dimensional reduction (compression) supported using rank-ordered RndF Gini feature relevance values such as illustrated in Figure 6—such a reduction minimizes the required computational generation, storage, transfer, complexity, etc.; and (2) transitioning to a Convolutional Neural Network (CNN) classifier as a precursor to near-end-game demonstrations using the desired neuromorphic-friendly Spiking Neural Network (SNN) classifier—RndF performance has historically provided a reliable baseline for highlighting the classification improvement that is achievable using a CNN classifier with similarly structured signals. It is believed that classification performance will remain favorable and represent one significant step toward identifying the software computing elements required to implement an event radio. It is also hoped that this will motivate researchers and designers to develop complementary hardware computing elements so that the full benefits of neuromorphic processing may be realized in the envisioned event radio.

Author Contributions

Conceptualization, M.J.S. and M.A.T.; Data curation, M.A.T.; Formal analysis, M.J.S., M.A.T. and J.W.D.; Investigation, M.J.S.; Methodology, M.J.S., M.A.T. and J.W.D.; Project administration, M.A.T. and J.W.D.; resources, M.A.T. and J.W.D.; supervision, M.A.T.; graphic visualization, M.J.S. and M.A.T.; writing—original draft, M.A.T.; writing—review and editing, M.J.S., M.A.T. and J.W.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by support funding received from the Spectrum Warfare Division, Sensors Directorate, U.S. Air Force Research Laboratory, Wright-Patterson AFB, Dayton OH, during U.S. Government Fiscal Years 2021–2023.

Data Availability Statement

The experimentally collected WirelessHART data used to obtain results were not approved for public release at the time of paper submission. Requests for release of these data to a third party should be directed to the corresponding author. Data distribution to a third party will be made on a request-by-request basis and are subject to public affairs approval.

Acknowledgments

The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the United States Air Force or the U.S. Government. This paper is approved for public release, Case Number 88ABW-2024-0175.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used throughout the manuscript:
1D-TDOne-Dimensional Time Domain
2D-GTXTwo-Dimensional Gabor Transform
CCICross-Channel Interference
CNNConvolutional Neural Network
DNADistinct Native Attribute
FH-TDMAFrequency-Hopped, Time Division Multiple Access
FSFrequency Slot
GTXGabor Transform
HARTHighway Addressable Remote Transducer
IDIdentity/Identification
IoTInternet of Things
IIoTIndustrial Internet of Things
MDAMultiple Discriminant Analysis
MHzMegahertz
MLMaximum Likelihood
MSpsMega-Samples Per Second
RndFRandom Forest
SDRSoftware Defined Radio
SNNSpiking Neural Network
TSTime Slot

References

  1. FieldComm Group. WirelessHART: Proven and Growing Technology with a Promising Future, Global Control. 29 March 2018. Available online: https://tinyurl.com/fcgwirelesshartglobalcontrol (accessed on 11 May 2024).
  2. Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
  3. Liu, X.; Qian, C.; Hatcher, W.G.; Xu, H.; Liao, W.; Yu, W. Secure Internet of Things (IoT)-based Smart-World Critical Infrastructures: Case Studies and Research Opportunities. IEEE Access 2019, 7, 79523–79544. [Google Scholar] [CrossRef]
  4. Cyber Security and Infrastructure Agency (CISA). Cybersecurity and Physical Security Convergence. 2021. Available online: https://www.cisa.gov/cybersecurity-and-physical-security-convergence (accessed on 11 May 2024).
  5. Stouffer, K.; Pease, M.; Tang, C.; Zimmerman, T.; Pillitteri, V.; Lightman, S. Guide to Operational Technology (OT) Security; Special Publication, NIST.SP.800-82r3; National Institute of Standards (NIST): Gaithersburg, MD, USA, 2023. [Google Scholar]
  6. Soltanieh, N.; Norouzi, Y.; Yang, Y.; Karmakar, N.C. A Review of Radio Frequency Fingerprinting Techniques. IEEE J. Radio Freq. Identif. 2020, 4, 222–233. Available online: https://ieeexplore.ieee.org/document/8970312. (accessed on 11 May 2024). [CrossRef]
  7. Fadul, M.K.M.; Reising, D.R.; Weerasena, L.P.; Loveless, T.D.; Sartipi, M.; Tyler, J.H. Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning. IEEE Trans. Inf. Forensics Secur. 2024, 19, 3194–3209. Available online: https://ieeexplore.ieee.org/document/10417054 (accessed on 11 May 2024). [CrossRef]
  8. Mims, W.H.; Temple, M.A.; Mills, R.F. Active 2D-DNA Fingerprinting of WirelessHART Adapters to Ensure Operational Integrity in Industrial Systems. Sensors 2022, 22, 4906. Available online: https://www.mdpi.com/1424-8220/22/13/4906 (accessed on 11 May 2024). [CrossRef]
  9. Long, J.D.; Temple, M.A.; Rondeau, C.M. Discriminating WirelessHART Communication Devices Using Sub-Nyquist Stimulared Responses. Electronics 2023, 12, 1973. [Google Scholar] [CrossRef]
  10. Devan, P.A.M.; Hussin, F.A.; Ibrahim, R.; Bingi, K.; Khanday, F.A. A Survey on the Application of WirelessHART for Industrial Process Monitoring and Control. Sensors 2021, 21, 4951. [Google Scholar] [CrossRef]
  11. Rondeau, C.M.; Temple, M.A.; Betances, J.A.; Schubert Kabban, C.M. Extending Critical Infrastructure Element Longevity Using Constellation-Based ID Verification. J. Comput. Secur. 2020, 100, 102073. [Google Scholar] [CrossRef]
  12. Rondeau, C.M.; Temple, M.A.; Schubert Kabban, C.M. TD-DNA Feature Selection for Discriminating WirelessHART IIoT Devices. In Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA, 7–10 January 2020; Available online: https://scholarspace.manoa.hawaii.edu/bitstreams/35252979-27c2-4ae0-b8fb-35529f731e5a/download (accessed on 11 May 2024).
  13. Gutierrez, J.A.; Borghetti, B.J.; Temple, M.A. Considerations for RF Fingerprinting across Multiple Frequency Channels. Sensors 2022, 22, 2111. [Google Scholar] [CrossRef]
  14. Maier, M.J.; Hayden, H.S.; Temple, M.A.; Fickus, M.C. Ensuring the Longevity of WirelessHART Devices in Industrial Automation and Control Systems Using Distinct Native Attribute Fingerprinting. Int. J. Crit. Infrastruct. Prot. 2023, 43, 100641. [Google Scholar] [CrossRef]
  15. Christensen, D.V.; Dittmann, R.; Linares-Barranco, B.; Sebastian, A.; Le Gallo, M.; Redaelli, A.; Slesazeck, S.; Mikolajick, T.; Spiga, S.; Menzel, S.; et al. 2022 Roadmap on Neuromorphic Computing and Engineering. Neuromorphic Comput. Eng. 2022, 2, 022501. [Google Scholar] [CrossRef]
  16. Nunes, J.D.; Carvalho, M.; Carneiro, D.; Cardoso, J.S. Spiking Neural Networks: A Survey. IEEE Access 2022, 10, 60738–60764. Available online: https://ieeexplore.ieee.org/document/9787485 (accessed on 11 May 2024). [CrossRef]
  17. Cai, F.; Kumar, S.; Van Vaerenbergh, T.; Sheng, X.; Liu, R.; Li, C.; Liu, Z.; Foltin, M.; Yu, S.; Xia, Q.; et al. Power-Efficient Combinatorial Optimization using Intrinsic Noise in Memristor Hopfield Neural Networks. Nat. Electron. 2020, 3, 409–418. Available online: https://www.nature.com/articles/s41928-020-0436-6 (accessed on 11 May 2024). [CrossRef]
  18. Chatterjee, B.; Panda, P.; Maity, S.; Roy, K.; Sen, S. An Energy-Efficient Mixed-Signal Neuron for Inherently Error-Resilient Neuromorphic Systems. In Proceedings of the 2017 IEEE International Conference on Rebooting Computing (ICRC), Washington, DC, USA, 8–9 November 2017. [Google Scholar]
  19. Clark, K.; Wu, Y. Survey of Neuromorphic Computing: A Data Science Perspective. In Proceedings of the IEEE 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI), Taiyuan, China, 26–28 May 2023. [Google Scholar]
  20. Gallego, G.; Delbrück, T.; Orchard, G.; Bartolozzi, C.; Taba, B.; Censi, A.; Leutenegger, S.; Davison, A.J.; Conradt, J.; Daniilidis, K.; et al. Event-Based Vision: A Survey. IEEE Trans. Pattern Anal. Mach. Intell. 2022, 44, 154–180. Available online: https://ieeexplore.ieee.org/document/9138762 (accessed on 11 May 2024). [CrossRef]
  21. Davies, M.; Srinivasa, N.; Lin, T.H.; Chinya, G.; Cao, Y.; Choday, S.H.; Dimou, G.; Joshi, P.; Imam, N.; Jain, S.; et al. Loihi: A Neuromorphic Manycore Processor with On-chip Learning. IEEE Micro 2018, 38, 82–99. Available online: https://ieeexplore.ieee.org/document/8259423 (accessed on 11 May 2024). [CrossRef]
  22. Farr, P.; Jones, A.M.; Bihl, T.; Boubin, J.; DeMange, A. Waveform Design Implemented on Neuromorphic Hardware. In Proceedings of the 2020 IEEE International Radar Conference (RADAR), Washington, DC, USA, 28–30 April 2020; pp. 934–939. Available online: https://ieeexplore.ieee.org/document/9114635 (accessed on 11 May 2024).
  23. Ammar, M.A.; Abdel-Latif, M.S.; Badran, K.M.; Hassan, H.A. Deep Learning Achievements and Opportunities in Domain of EW Applications. In Proceedings of the 2021 Tenth International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt, 5–7 December 2021; Available online: https://ieeexplore.ieee.org/document/9694245/metrics#metrics (accessed on 11 May 2024).
  24. Zhu, B.; Perez, A.; Hernandez, J. Event-based Time Series Data Preprocessing: Application to Traffic Flow Time Series. In Proceedings of the ITISE 2014: International Work-Conference on Time Series, Granada, Spain, 25–27 June 2014; Available online: https://oa.upm.es/36830/ (accessed on 11 May 2024).
  25. Guralnik, V.; Srivastava, J. Event Detection From Time Series Data. In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-99), San Diego, CA, USA, 15–18 August 1999; Available online: https://dl.acm.org/doi/pdf/10.1145/312129.312190 (accessed on 11 May 2024).
  26. Benko, Z.; Babel, T.; Somogyvari, Z. Model-free Detection of Unique Events in Time Series. Sci. Rep. 2022, 12, 227. [Google Scholar] [CrossRef]
  27. Auge, D.; Hille, J.; Mueller, E.; Knoll, A. A Survey of Encoding Techniques for Signal Processing in Spiking Neural Networks. Neural Process Lett. 2021, 53, 4693–4710. [Google Scholar] [CrossRef]
  28. Petro, B.; Kasabov, N.; Kiss, R. Selection and Optimization of Temporal Spike Encoding Methods for Spiking Neural Networks. IEEE Trans. Neural Netw. 2020, 31, 358–370. Available online: https://ieeexplore.ieee.org/document/8689349 (accessed on 11 May 2024). [CrossRef] [PubMed]
  29. Yarga, S.; Rouat, J.; Wood, S. Efficient Spike Encoding Algorithms for Neuromorphic Speech Recognition. In Proceedings of the International Conference on Neuromorphic Systems (ICONS), Knoxville, TN, USA, 27–29 July 2022; Available online: https://arxiv.org/pdf/2207.07073 (accessed on 11 May 2024).
  30. Forno, E.; Fra, V.; Pignari, R.; Macii, E.; Urgese, G. Spike Encoding Techniques for IoT Time-Varying Signals Benchmarked on a Neuromorphic Classification Task. Front. Neurosci. 2022, 16, 999029. [Google Scholar] [CrossRef]
  31. Siemens. WirelessHART Adapter, SITRANS AW210, 7MP3111. User Manual. November 2012. Available online: https://tinyurl.com/yyjbgybm (accessed on 11 May 2024).
  32. Pepperl+Fuchs. WHA-BLT-F9D0-N-A0-*, WirelessHART Adapter. Manual. Available online: https://tinyurl.com/pepplusfucwirelesshart (accessed on 11 May 2024).
  33. Emerson. Emerson Wireless 1410 Gateway. Reference Manual 00809-0200-4410, Rev CA, Sep 2020. Available online: https://www.emerson.com/documents/automation/manual-emerson-smart-wireless-gateway-1410-en-77632.pdf (accessed on 16 May 2024).
  34. Ettus Research. USRP X300 and X300 X Series. Specification Sheet. Available online: https://www.ettus.com/wp-content/uploads/2024/01/X300_X310_Spec_Sheet_2024-01-23.pdf. (accessed on 11 May 2024).
  35. IEEE Standards Association. Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs); IEEE Std 802.15.4TM-2011; IEEE: New York, NY, USA, 2011. [Google Scholar]
  36. HART Communication Foundation. Co-Existence of WirelessHART with Other Wireless Technologies. Tech Note: HCF_LIT-122, Rev. 1.0. 2010. Available online: https://www.emerson.com/documents/automation/white-paper-co-existence-of-wirelesshart-other-wireless-technologies-by-hcf-en-42582.pdf. (accessed on 11 April 2024).
  37. Bastiaans, M.J. Gabor’s Expansion of a Signal into Gaussian Elementary Signals. Proc. IEEE 1980, 68, 538–539. Available online: https://ieeexplore.ieee.org/document/1455955 (accessed on 11 May 2024). [CrossRef]
  38. Bastiaans, M.J.; Geilen, M.C.W. On the Discrete Gabor Transform and the Discrete Zak Transform. Signal Process. 1996, 49, 151–166. [Google Scholar]
  39. Qian, S.; Chen, D. Discrete Gabor Transform. IEEE Trans. Signal Process. 1993, 41, 2429–2438. Available online: https://ieeexplore.ieee.org/document/224251 (accessed on 11 May 2024). [CrossRef]
  40. Rathinaraj, J.D.J.; McKinley, G.H. Gaborheometry: Applications of the Discrete Gabor Transform for Time Resolved Oscillatory Rheometry. J. Rheol. 2023, 67, 479–497. [Google Scholar] [CrossRef]
  41. Lindeberg, T. A Time-causal and Time-recursive Analogue of the Gabor transform. arXiv 2023, arXiv:2308.14512. [Google Scholar] [CrossRef]
  42. Reising, D.R.; Temple, M.A.; Jackson, J.A. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1180–1192. Available online: https://ieeexplore.ieee.org/document/7031931 (accessed on 11 May 2024). [CrossRef]
  43. Reising, D.R.; Temple, M.A. WiMAX Mobile Subscriber Verification Using Gabor-Based RF-DNA Fingerprints. In Proceedings of the 2024 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; Available online: https://ieeexplore.ieee.org/document/6364039 (accessed on 11 May 2024).
  44. Tharwat, A. Classification Assessment Methods. Appl. Comput. Inform. 2020, 17, 168–192. [Google Scholar] [CrossRef]
  45. Duda, R.O.; Hart, P.E.; Stork, D.G. Pattern Classification, 2nd ed.; John Wiley & Sons: New York, NY, USA, 2001. [Google Scholar]
  46. Breiman, L. Random Forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef]
  47. Eliasmith, C.; Anderson, C.H. Neural Engineering: Computation, Representation, and Dynamics in Neurobiological Systems; The MIT Press: Cambridge, MA, USA, 2004; ISBN 9780262550604. [Google Scholar]
Figure 1. Experimental setup used for collecting the WirelessHART bursts that were input to the FH-TDMA process to induce adverse Cross-Channel Interference (CCI) effects.
Figure 1. Experimental setup used for collecting the WirelessHART bursts that were input to the FH-TDMA process to induce adverse Cross-Channel Interference (CCI) effects.
Electronics 13 02020 g001
Figure 2. Frequency-Hopped, Time Division Multiple Access (FH-TDMA) process used with collected bursts from [13] to induce adverse Cross-Channel Interference (CCI) effects.
Figure 2. Frequency-Hopped, Time Division Multiple Access (FH-TDMA) process used with collected bursts from [13] to induce adverse Cross-Channel Interference (CCI) effects.
Electronics 13 02020 g002
Figure 3. Illustration showing (a) one-dimensional Time Domain (1D-TD) amplitude and (b) two-dimensional Gabor transform (2D-GTX) magnitude responses for a representative WirelessHART burst. The normalized 2D-GTX magnitude response was generated using the processing in Section 2.2.2 with MTim = 16, KFrq = 128, and NΔ = 64 time sample shifts between transforms.
Figure 3. Illustration showing (a) one-dimensional Time Domain (1D-TD) amplitude and (b) two-dimensional Gabor transform (2D-GTX) magnitude responses for a representative WirelessHART burst. The normalized 2D-GTX magnitude response was generated using the processing in Section 2.2.2 with MTim = 16, KFrq = 128, and NΔ = 64 time sample shifts between transforms.
Electronics 13 02020 g003aElectronics 13 02020 g003b
Figure 4. Illustration of 1D-TD Derivative Eventization of the WirelessHART burst in Figure 3 showing (a) the centered-normalized First Derivative response with a threshold value of Thr = ±0.85 (dashed lines) overlaid, and (b) the corresponding eventized response showing the detection of 35 Positive (green +1 indices) and 41 Negative (red −1 indices) events at the indicated time indices.
Figure 4. Illustration of 1D-TD Derivative Eventization of the WirelessHART burst in Figure 3 showing (a) the centered-normalized First Derivative response with a threshold value of Thr = ±0.85 (dashed lines) overlaid, and (b) the corresponding eventized response showing the detection of 35 Positive (green +1 indices) and 41 Negative (red −1 indices) events at the indicated time indices.
Electronics 13 02020 g004
Figure 5. Illustration of 2D-GTX Derivative Eventization of the WirelessHART GTX burst response in Figure 3b. Results for (KTim × MFrq) = (16 × 128)-dimensional transform using a threshold value of Thr = 0.60. A total of 76 events were detected, including 38 Positive (+1) and 38 Negative (−1). Graphic shows (a) centered-normalized GTX first derivative matrix with the event detection ROI highlighted; (b) expanded view of the detection ROI; (c) three-valued (−1, 0, +1) eventized GTX matrix with locations of Positive (green elements), Negative (red elements) and no event detections (gray elements) highlighted; and (d) vectorized form of the GTX event matrix in (c) showing Positive (green +1 indices), Negative (red −1 indices) and no event (gray 0 indices). The vector elements in (d) are taken sequentially from (c) in a row-wise bottom-to-top, left-to-right, order.
Figure 5. Illustration of 2D-GTX Derivative Eventization of the WirelessHART GTX burst response in Figure 3b. Results for (KTim × MFrq) = (16 × 128)-dimensional transform using a threshold value of Thr = 0.60. A total of 76 events were detected, including 38 Positive (+1) and 38 Negative (−1). Graphic shows (a) centered-normalized GTX first derivative matrix with the event detection ROI highlighted; (b) expanded view of the detection ROI; (c) three-valued (−1, 0, +1) eventized GTX matrix with locations of Positive (green elements), Negative (red elements) and no event detections (gray elements) highlighted; and (d) vectorized form of the GTX event matrix in (c) showing Positive (green +1 indices), Negative (red −1 indices) and no event (gray 0 indices). The vector elements in (d) are taken sequentially from (c) in a row-wise bottom-to-top, left-to-right, order.
Electronics 13 02020 g005aElectronics 13 02020 g005b
Figure 6. RndF Gini index relevance using 1D-TD derivative eventized fingerprints having NFeat = 1000 features: (a) Sorted rank-ordered relevance, and (b) Non-sorted per-feature relevance.
Figure 6. RndF Gini index relevance using 1D-TD derivative eventized fingerprints having NFeat = 1000 features: (a) Sorted rank-ordered relevance, and (b) Non-sorted per-feature relevance.
Electronics 13 02020 g006
Figure 7. MDA/ML and RndF classification performance using Non-Eventized (NonEv) statistical 1D-TD DNA and 2D-GTX DNA fingerprints generated from Equation (6).
Figure 7. MDA/ML and RndF classification performance using Non-Eventized (NonEv) statistical 1D-TD DNA and 2D-GTX DNA fingerprints generated from Equation (6).
Electronics 13 02020 g007
Figure 8. RndF classification performance for SINR = 16.5 dB channel conditions using 1D-TD and 2D-GTX eventized fingerprints. Results presented for a varying number of average Events-Per-Burst (NEPB) that were generated by varying the method-dependent threshold values.
Figure 8. RndF classification performance for SINR = 16.5 dB channel conditions using 1D-TD and 2D-GTX eventized fingerprints. Results presented for a varying number of average Events-Per-Burst (NEPB) that were generated by varying the method-dependent threshold values.
Electronics 13 02020 g008
Figure 9. Summary of RndF classification performance using 1D-TD and 2D-GTX Non-Eventized (NonEv) and Eventized (Ev) fingerprints. Results are shown for SINR = 16.5 dB channel conditions and an average of Number of Events-Per-Burst of NEPB = 600 for all eventization methods. The effect of eventization is reflected in the % C E v metrics with a negative (−) sign denoting degradation and a positive (+) sign denoting improvement.
Figure 9. Summary of RndF classification performance using 1D-TD and 2D-GTX Non-Eventized (NonEv) and Eventized (Ev) fingerprints. Results are shown for SINR = 16.5 dB channel conditions and an average of Number of Events-Per-Burst of NEPB = 600 for all eventization methods. The effect of eventization is reflected in the % C E v metrics with a negative (−) sign denoting degradation and a positive (+) sign denoting improvement.
Electronics 13 02020 g009
Table 1. Details for the NDev = 8 WirelessHART adapters (D1, D2, …, D8) used for demonstration [13,14] showing two different manufacturers and models with the indicated serial number (S/N).
Table 1. Details for the NDev = 8 WirelessHART adapters (D1, D2, …, D8) used for demonstration [13,14] showing two different manufacturers and models with the indicated serial number (S/N).
Device IDManufacturerModelS/N
D1SiemensAW210003095
D2SiemensAW210003159
D3SiemensAW210003097
D4SiemensAW210003150
D5Pepperl+FuchsBullet1A32DA
D6Pepperl+FuchsBullet1A32B3
D7Pepperl+FuchsBullet1A3226
D8Pepperl+FuchsBullet1A32A4
Table 2. Classification confusing matrix for 2D-GTX derivative eventized fingerprints for an NCls = 8 class (device) classifier using NTST = 1716 testing fingerprints per device. The bold diagonal entries are correct device estimates and yield an overall average cross-class percent correct of %C ≈ 95.38. The bottom row shows the individual per-class %CCls performance.
Table 2. Classification confusing matrix for 2D-GTX derivative eventized fingerprints for an NCls = 8 class (device) classifier using NTST = 1716 testing fingerprints per device. The bold diagonal entries are correct device estimates and yield an overall average cross-class percent correct of %C ≈ 95.38. The bottom row shows the individual per-class %CCls performance.
Estimated Class (%)
Actual ClassD1D2D3D4D5D6D7D8
D117082500001
D2316951300302
D3031167700710
D4000169520190
D50014163064143
D66213001091494947
D7006330651915390
D812100013701656
%CCls99.53%98.78%97.73%98.78%94.99%87.06%89.69%96.50%
Table 3. Method-dependent threshold values and resultant minimum NEPB required to achieve the indicated maximum %C classification performance.
Table 3. Method-dependent threshold values and resultant minimum NEPB required to achieve the indicated maximum %C classification performance.
Eventization MethodThreshold
(Thr)
Minimum
NEPB
Maximum
%C
1D-TDDirect ()0.6048289.71
Integral (Electronics 13 02020 i001) 0.4036874.77
Derivative (Electronics 13 02020 i002)0.6029587.43
2D-GTX Direct () 0.0573892.06
Derivative ()0.1052691.62
Table 4. Comparison of non-eventized and eventized classification performance is shown in Figure 9 for each of the eventization methods considered.
Table 4. Comparison of non-eventized and eventized classification performance is shown in Figure 9 for each of the eventization methods considered.
Eventization Method % C N o n E v % C E v % C E v
1D-TDDirect ()90.2289.50−0.72
Integral (Electronics 13 02020 i001) 80.5575.60−4.95
Derivative (Electronics 13 02020 i002)88.0287.00−1.02
2D-GTX Direct () 90.7095.66−4.96
Derivative ()92.5095.38−2.88
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Smith, M.J.; Temple, M.A.; Dean, J.W. Effects of RF Signal Eventization Encoding on Device Classification Performance. Electronics 2024, 13, 2020. https://doi.org/10.3390/electronics13112020

AMA Style

Smith MJ, Temple MA, Dean JW. Effects of RF Signal Eventization Encoding on Device Classification Performance. Electronics. 2024; 13(11):2020. https://doi.org/10.3390/electronics13112020

Chicago/Turabian Style

Smith, Michael J., Michael A. Temple, and James W. Dean. 2024. "Effects of RF Signal Eventization Encoding on Device Classification Performance" Electronics 13, no. 11: 2020. https://doi.org/10.3390/electronics13112020

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop