Fingerprinting by Design: Embedding and Authentication

In this chapter we consider the design of fingerprints for the purpose of authenticating a message. We begin with a background discussion of fingerprinting and related ideas, progressing to a communications point of view. Fingerprint embedding for message authentication is motivated by the desire to make an authentication tag less accessible to an eavesdropper. We consider metrics for good fingerprint design, and apply these to develop an embedding scheme for wireless communications. Wireless software defined radio experiments validate the theory and demonstrate the applicability of our approach.

[1]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[2]  Jan P. Allebach,et al.  A survey of forensic characterization methods for physical devices , 2006, Digit. Investig..

[3]  Brian M. Sadler,et al.  MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[6]  Georgios B. Giannakis,et al.  Basis expansion models and diversity techniques for blind identification and equalization of time-varying channels , 1998, Proc. IEEE.

[7]  Gunjan Verma,et al.  A MATLAB Library for Rapid Prototyping of Wireless Communications Algorithms with the Universal Software Radio Peripheral (USRP) Radio Family , 2013 .

[8]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[9]  Ueli Maurer,et al.  Unbreakable Keys from Random Noise , 2007 .

[10]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[11]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Yuguang Fang,et al.  Scalable and deterministic key agreement for large scale networks , 2007, IEEE Transactions on Wireless Communications.

[13]  Edward J. Delp,et al.  Texture based attacks on intrinsic signature based printer identification , 2010, Electronic Imaging.

[14]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[15]  John S. Baras,et al.  Authentication of fingerprint scanners , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Mikael Coldrey,et al.  Training-Based MIMO Systems—Part I: Performance Comparison , 2007, IEEE Transactions on Signal Processing.

[20]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[21]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[22]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[23]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[24]  Edward J. Delp,et al.  Scanner Identification Using Feature-Based Processing and Analysis , 2009, IEEE Transactions on Information Forensics and Security.

[25]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[26]  Mani Mina,et al.  Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.

[27]  S. Venkatesan,et al.  Capacity of a Gaussian MIMO channel with nonzero mean , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[28]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[29]  Shi Jin,et al.  Near-optimal power allocation for MIMO channels with mean or covariance feedback , 2010, IEEE Transactions on Communications.

[30]  John S. Baras,et al.  Multicarrier authentication at the physical layer , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[31]  Ralph P. Grimaldi,et al.  Discrete and Combinatorial Mathematics: An Applied Introduction , 1998 .