Research on Individual Identification of Wireless Devices Based on Signal's Energy Distribution

With the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the security of the wireless network is being confronted with a series of new threats and challenges. The radio frequency fingerprinting (RFF) extracting from radio signals is a physical-layer method for wireless network security. In this paper, a novel feature extraction method based on the signal's energy distribution is proposed, an experiment under the real wireless device environments has evaluated validation. The experiment results indicate that the identification rate is higher than 95% at SNR $ \gt 25 \mathrm {d}\mathrm {B}$, which proved that the method is well-suited for wireless device identification tasks, and promising for a wide variety of related security problems.

[1]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  N. Huang,et al.  The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis , 1998, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[3]  Iman Tabatabaei Ardekani,et al.  An Overview of Radio Frequency Fingerprinting for Low-End Devices , 2014, Int. J. Mob. Comput. Multim. Commun..

[4]  Ming Yang,et al.  Architecture and key technologies of cyberspace security , 2016 .

[5]  Jasmine Norman,et al.  Secure neighbour authentication in wireless sensor networks , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[6]  Thomas Kunz,et al.  Practical RF fingerprints for Wireless Sensor Network authentication , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[7]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[8]  Dennis Goeckel,et al.  Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion , 2015, IEEE Transactions on Wireless Communications.

[9]  Michael A. Temple,et al.  Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Michael A. Temple,et al.  Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.

[11]  Hao Wu,et al.  Specific emitter identification based on Hilbert-Huang transform-based time-frequency-energy distribution features , 2014, IET Commun..

[12]  S. Ur Rehman,et al.  The analysis of RF fingerprinting for low-end wireless receivers with application to IEEE 802.11a , 2012, 2012 International Conference on Selected Topics in Mobile and Wireless Networking.

[13]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[14]  Samir Avdakovic,et al.  Energy Distribution of EEG Signals: EEG Signal Wavelet-Neural Network Classifier , 2010, ArXiv.

[15]  Caidan Zhao,et al.  Identification of radio transmitters fingerprint based on curve fitting , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[16]  Kristine L. Bell,et al.  Constrained CramrRao Bounds , 2007 .

[17]  Trevor J. Bihl,et al.  Feature Selection for RF Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Juan Manuel Górriz,et al.  RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation , 2014 .

[19]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[20]  M. Jabri,et al.  Robust principal component analysis , 2000, Neural Networks for Signal Processing X. Proceedings of the 2000 IEEE Signal Processing Society Workshop (Cat. No.00TH8501).

[21]  Kevin W. Sowerby,et al.  RF fingerprint extraction from the energy envelope of an instantaneous transient signal , 2012, 2012 Australian Communications Theory Workshop (AusCTW).

[22]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[23]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[24]  Michael A. Temple,et al.  Classifier selection for physical layer security augmentation in Cognitive Radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[25]  Kui Ren,et al.  Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Dennis Goeckel,et al.  Wireless Device Identification Based on RF Oscillator Imperfections , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Darko Kirovski,et al.  RF Fingerprinting Physical Objects for Anticounterfeiting Applications , 2011, IEEE Transactions on Microwave Theory and Techniques.

[28]  Can Emre Koksal,et al.  On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.