Types and Origins of Fingerprints

We present a systematic review of physical-layer identification systems and provide a summary of current state-of-the-art techniques. We further review the types of fingerprints that were discussed in prior work and highlight issues that are still open and need to be addressed in future work.

[1]  Jeyanthi Hall,et al.  Detection of rogue devices in wireless networks , 2006 .

[2]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[3]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[4]  B. Yener,et al.  Active Attacks Against Modulation-based Radiometric Identification , 2009 .

[5]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[6]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.

[7]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[8]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[9]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[10]  Chih-Ming Wang,et al.  Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards , 2009, IEEE Transactions on Microwave Theory and Techniques.

[11]  Michael A. Temple,et al.  Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[12]  Jia Di,et al.  Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Dale R. Thompson,et al.  Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics , 2009 .

[14]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[16]  Srdjan Capkun,et al.  Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.

[17]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[18]  Anil K. Jain,et al.  Feature Selection: Evaluation, Application, and Small Sample Performance , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[20]  Mala Mitra,et al.  Privacy for RFID Systems to Prevent Tracking and Cloning , 2008 .

[21]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[22]  Robert F. Mills,et al.  Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.

[23]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[24]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[25]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[26]  Anil K. Jain,et al.  Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Srdjan Capkun,et al.  On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.

[28]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.

[29]  Chih-Ming Wang,et al.  Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics , 2010, IEEE Transactions on Microwave Theory and Techniques.

[30]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[31]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[32]  Michael A. Temple,et al.  Application of wavelet denoising to improve OFDM-based signal detection and classification , 2010, Secur. Commun. Networks.

[33]  Sigeru Omatu,et al.  Identification of the defective transmission devices using the wavelet transform , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[35]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[36]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[37]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[38]  Harold H. Szu,et al.  Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.

[39]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[40]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[41]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[42]  Michael A. Temple,et al.  Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.

[43]  C. Frank Most Secret War: British Scientific Intelligence 1939–1945 , 1978 .

[44]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[45]  Michel Barbeau,et al.  Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks , 2005 .

[46]  Michael A. Temple,et al.  Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.

[47]  Michael A. Temple,et al.  Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.