Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance

There has been a recent shift toward improving wireless access security within the OSI PHY layer by exploiting RF features that are inherently device specific and difficult to replicate by an unintended party. This work addresses the extraction and exploitation of RF "fingerprints" to classify emissions and provide device-specific identification. Burst transient detection precedes RF fingerprint extraction and is generally the most critical step in the overall process. This work provides a much needed sensitivity analysis of burst detection capability. The analysis is conducted using instantaneous amplitude responses with both Fractal-Bayesian Step Change Detection (Fractal-BSCD) and Variance Trajectory (VT) processes. The performance of each method is evaluated under varying SNR conditions using experimentally collected 802.11a OFDM signals. The impact of transient detection error on signal classification performance is then demonstrated using RF fingerprints and Multiple Discriminant Analysis (MDA) with Maximum Likelihood (ML) classification. The VT technique emerges as the better alternative for all SNRs considered and yields MDA-ML classification accuracy that is consistent with "perfect" transient estimation performance.

[1]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[2]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[3]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[4]  O. Ureten,et al.  Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .

[5]  K OrJ Numerical Bayesian methods applied to signal processing , 1996 .

[6]  T. Higuchi Approach to an irregular time series on the basis of the fractal theory , 1988 .

[7]  J. Dudczyk,et al.  Mixed Method Based on Intrapulse Data and Radiated Emission to Emitter Sources Recognition , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.

[8]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[9]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[10]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[11]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[13]  J. Dudczyk,et al.  Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).

[14]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[15]  L. E. Langley,et al.  Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.

[16]  K. Riedel Numerical Bayesian Methods Applied to Signal Processing , 1996 .

[17]  Robert F. Mills,et al.  Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.