Wireless Physical-Layer Identification: Modeling and Validation

The wireless physical-layer identification (WPLI) techniques utilize the unique features of the physical waveforms of wireless signals to identify and classify authorized devices. As the inherent physical-layer features are difficult to forge, WPLI is deemed as a promising technique for wireless security solutions. However, as of today, it still remains unclear whether the existing WPLI techniques can be applied under real-world requirements and constraints. In this paper, through both theoretical modeling and experiment validation, the reliability and the differentiability of the WPLI techniques are rigorously evaluated, especially under the constraints of the state-of-the-art wireless devices, real operation environments, as well as wireless protocols and regulations. In particular, a theoretical model is first established to systematically describe the complete procedure of the WPLI. More importantly, the proposed model is then implemented to thoroughly characterize the various WPLI techniques that utilize the spectrum features coming from the nonlinear RF front-end, under the influences from different transmitters, receivers, and wireless channels. Subsequently, the limitations of the existing WPLI techniques are revealed and evaluated in details using both the developed theoretical model and the in-lab experiments. The real-world requirements and constraints are characterized along each step in WPLI, including: 1) the signal processing at the transmitter (device to be identified); 2) the various physical-layer features that originate from circuits, antenna, and environments; 3) the signal propagation in various wireless channels; 4) the signal reception and processing at the receiver (the identifier); and 5) the fingerprint extraction and classification at the receiver.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[2]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[3]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[4]  J. Stevenson Kenney,et al.  Predicting spectral regrowth of nonlinear power amplifiers , 2002, IEEE Trans. Commun..

[5]  Robert F. Mills,et al.  Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  M. Steer,et al.  The impact of RF front-end characteristics on the spectral regrowth of communications signals , 2005, IEEE Transactions on Microwave Theory and Techniques.

[7]  Dennis Goeckel,et al.  RF fingerprinting of users who actively mask their identities with artificial distortion , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[8]  Massimo D'Apuzzo,et al.  Modeling DAC Output Waveforms , 2010, IEEE Transactions on Instrumentation and Measurement.

[9]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[10]  Ian F. Akyildiz,et al.  Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .

[11]  Michael A. Temple,et al.  Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.

[12]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[13]  U. Pesovic,et al.  Implementation of IEEE 802.15.4 transceiver on software defined radio platform , 2012, 2012 20th Telecommunications Forum (TELFOR).

[14]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[15]  Hideki Ochiai,et al.  Characterization of power spectral density for nonlinearly amplified OFDM signals based on cross-correlation coefficient , 2014, EURASIP J. Wirel. Commun. Netw..

[16]  Ming-Wei Liu,et al.  Specific Emitter Identification using Nonlinear Device Estimation , 2008, 2008 IEEE Sarnoff Symposium.

[17]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[18]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[19]  Zhu Han,et al.  Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[20]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[21]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[22]  Dennis Goeckel,et al.  Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion , 2015, IEEE Transactions on Wireless Communications.

[23]  S. Ur Rehman,et al.  The analysis of RF fingerprinting for low-end wireless receivers with application to IEEE 802.11a , 2012, 2012 International Conference on Selected Topics in Mobile and Wireless Networking.

[24]  Robert Y. Levine,et al.  Training-set-based performance measures for data-adaptive decisioning systems , 1992, Optics & Photonics.

[25]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[26]  Risto Wichman,et al.  Receiver-side nonlinearities mitigation using an extended iterative decision-based technique , 2011, Signal Process..

[27]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.

[28]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[29]  Christian Fager,et al.  Successive Cancellation of Power Amplifier Distortion for Multiuser Detection , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[30]  Kevin W. Sowerby,et al.  RF fingerprint extraction from the energy envelope of an instantaneous transient signal , 2012, 2012 Australian Communications Theory Workshop (AusCTW).

[31]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[32]  Ravi Kishore Kodali,et al.  DDC and DUC filters in SDR platforms , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).

[33]  Chin-Liang Wang,et al.  Receiver Cancellation of Nonlinear Power Amplifier Distortion in SDMA-OFDM Systems , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[34]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[35]  K. M. Gharaibeh,et al.  Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB , 2011 .

[36]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.

[37]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[38]  Rong Zheng,et al.  On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.

[39]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[40]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.