Academia.eduAcademia.edu

Outline

Portability of an RF fingerprint of a wireless transmitter

2014, 2014 IEEE Conference on Communications and Network Security

Abstract

In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bitlevel algorithms to establish the identity of a legitimate wireless device. Physical layer security is a new paradigm in which features extracted from an analog signal can be used to establish the unique identity of a transmitter. Our previous research work into RF fingerprinting has shown that every transmitter has a unique RF fingerprint owing to imperfections in the analog components present in the RF front end. Generally, it is believed that the RF fingerprint of a specific transmitter is same across all receivers. That is, a fingerprint created in one receiver can be transported to another receiver to establish the identity of a transmitter. However, to the best of the author's knowledge, no such example is available in the literature in which an RF fingerprint generated in one receiver is used for identification in other receivers. This paper presents the results of experiments, and analyzing the feasibility of using an universal RF fingerprint of a transmitter for identification across different receivers.

References (28)

  1. U. Meyer and S. Wetzel, "A man-in-the-middle attack on umts," in Proceedings of the 3rd ACM workshop on Wireless security. ACM, 2004, pp. 90-97.
  2. S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, Y. Shah, W. Trappe, and N. Mandayam, "Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]," Wireless Communications, IEEE, vol. 17, no. 5, pp. 63-70, 2010.
  3. D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proceedings of the 5th ACM workshop on Wireless security. ACM, 2006, pp. 43-52.
  4. N. Nguyen, G. Zheng, Z. Han, and R. Zheng, "Device fin- gerprinting to enhance wireless security using nonparametric bayesian method," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 1404-1412.
  5. M. Debbah, "Mobile flexible networks: The challenges ahead," in Advanced Technologies for Communications, 2008. ATC 2008. International Conference on. IEEE, 2008, pp. 3-7.
  6. B. Kauffmann, F. Baccelli, A. Chaintreau, V. Mhatre, K. Pa- pagiannaki, and C. Diot, "Measurement-based self organization of interfering 802.11 wireless access networks," in INFOCOM 2007. 26th IEEE International Conference on Computer Com- munications. IEEE. IEEE, 2007, pp. 1451-1459.
  7. R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," Selected Areas in Communications, IEEE Journal on, vol. 26, no. 1, pp. 25-37, 2008.
  8. Q. Li and W. Trappe, "Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships," Informa- tion Forensics and Security, IEEE Transactions on, vol. 2, no. 4, pp. 793-808, 2007.
  9. O. Ureten and N. Serinken, "Wireless security through rf fin- gerprinting," Electrical and Computer Engineering, Canadian Journal of, vol. 32, no. 1, pp. 27 -33, winter 2007.
  10. J. Toonstra and W. Kinsner, "A radio transmitter fingerprinting system ODO-1," in Electrical and Computer Engineering, 1996. Canadian Conference on, vol. 1. IEEE, 2002, pp. 60-63.
  11. K. Gard, L. Larson, and M. Steer, "The impact of rf front- end characteristics on the spectral regrowth of communications signals," Microwave Theory and Techniques, IEEE Transactions on, vol. 53, no. 6, pp. 2179-2186, 2005.
  12. B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, "Attacks on physical-layer identification," in Proc. ACM Conf on Wireless network security, 2010, pp. 89-98.
  13. S. U. Rehman, K. Sowerby, and C. Coghill, "Rf fingerprint ex- traction from the energy envelope of an instantaneous transient signal," in Communications Theory Workshop (AusCTW), 2012
  14. Australian, 30 2012-feb. 2 2012, pp. 90 -95.
  15. S. Rehman, K. Sowerby, and C. Coghill, "Analysis of receiver front end on the performance of rf fingerprinting," in Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on. IEEE, 2012, pp. 2494- 2499.
  16. --, "Analysis of impersonation attacks on systems using rf fingerprinting and low-end receivers," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 591-601, 2014.
  17. --, "Experimental analysis of channel impairments on the performance of rf fingerprinting using low-end receivers," in 9th Annual wireless virginia summer school. Virginia Tech, 2013.
  18. S. Rehman, K. Sowerby, C. Coghill, and W. Holmes, "The analysis of rf fingerprinting for low-end wireless receivers with application to ieee 802.11 a," in Mobile and Wireless Network- ing (iCOST), 2012 International Conference on Selected Topics in. IEEE, 2012, pp. 24-29.
  19. I. C. S. L. M. S. Committee et al., "Ieee 802.11: Wireless lan medium access control and physical layer specifications," 1999.
  20. I. Kennedy, P. Scanlon, and M. Buddhikot, "Passive steady state rf fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays," in New Frontiers in Dy- namic Spectrum Access Networks, 2008. DySPAN 2008. 3rd IEEE Symposium on. IEEE, 2008, pp. 1-12.
  21. I. Kennedy, P. Scanlon, F. Mullany, M. Buddhikot, K. Nolan, and T. Rondeau, "Radio transmitter fingerprinting: A steady state frequency domain approach," in Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE, 2008, pp. 1-5.
  22. B. Widrow and M. Lehr, "30 years of adaptive neural networks: perceptron, madaline, and backpropagation," Proceedings of the IEEE, vol. 78, no. 9, pp. 1415-1442, 1990.
  23. A. Jain, J. Mao, and K. M. Mohiuddin, "Artificial neural networks: a tutorial," Computer, vol. 29, no. 3, pp. 31-44, 1996.
  24. C. Eklund, R. B. Marks, K. L. Stanwood, and S. Wang, "Ieee standard 802.16: a technical overview of the wirelessman/sup tm/air interface for broadband wireless access," Communica- tions Magazine, IEEE, vol. 40, no. 6, pp. 98-107, 2002.
  25. C. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. Shellhammer, and W. Caldwell, "Ieee 802.22: The first cognitive radio wireless regional area network standard," Communications Magazine, IEEE, vol. 47, no. 1, pp. 130-138, 2009.
  26. R. Shaukat, S. Khan, and A. Ahmed, "Augmented Security in IEEE 802.22 MAC Layer Protocol," in Wireless Communica- tions, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on. IEEE, 2008, pp. 1-4.
  27. K. Bian and J. Park, "Security vulnerabilities in IEEE 802.22," in Proceedings of the 4th Annual International Conference on Wireless Internet. ICST (Institute for Computer Sci- ences, Social-Informatics and Telecommunications Engineer- ing), 2008, pp. 1-9.
  28. M. Ettus, "Sbx schematic," Ettus Research, Mountain View, CA, http://code.ettus.com/redmine/ettus/documents/21, Aug, 2012.