Wireless Device Identification Based on RF Oscillator Imperfections

The exploitation of slight imperfections of transmitters' hardware for identification of wireless devices has recently emerged as an effective method for security enhancement in wireless access networks. Previously, we introduced a model-based approach for device identification based on the imperfections of two main wireless transmitter components: 1) the digital-to-analog converter and 2) the power amplifier. Here, motivated by applications with transmit power control mechanisms, we analyze the degree to which a device can be identified from the unique, power mode independent characteristics of a third main component: the RF oscillator. The model-based device identification method introduced here allows for effective device identification even from short time records at relatively low signal-to-noise ratios when exploiting imperfections of commercially used RF oscillators.

[1]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[2]  A.A. Tomko,et al.  Physical-Layer Intrusion Detection in Wireless Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[3]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[4]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[5]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[6]  Keith E. Nolan,et al.  Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[7]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[8]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[9]  Jeyanthi Hall,et al.  Detection of rogue devices in wireless networks , 2006 .

[10]  Amit Mehrotra,et al.  Noise analysis of phase-locked loops , 2000, IEEE/ACM International Conference on Computer Aided Design. ICCAD - 2000. IEEE/ACM Digest of Technical Papers (Cat. No.00CH37140).

[11]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[12]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[13]  Steffen Bittner,et al.  Tutorial on Discrete Time Phase Noise Modeling for Phase Locked Loops , 2008 .

[14]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[15]  A. Demir,et al.  Phase noise in oscillators: a unifying theory and numerical methods for characterization , 2000 .

[16]  L. E. Langley,et al.  Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.

[17]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[18]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[19]  Mohamed El-Tanany,et al.  Analytical modeling and simulation of phase noise interference in OFDM-based digital television terrestrial broadcasting systems , 2001, IEEE Trans. Broadcast..

[20]  A. Gualtierotti H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .

[21]  M.M. Buddhikot,et al.  Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-Channel Femto Cell Underlays , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[22]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[23]  Tim Schenk,et al.  RF Imperfections in High-rate Wireless Systems , 2008 .

[24]  Tim Schenk,et al.  RF Imperfections in High-rate Wireless Systems: Impact and Digital Compensation , 2008 .

[25]  T. W. Anderson,et al.  On the Asymptotic Distribution of the Autocorrelations of a Sample from a Linear Stochastic Process , 1964 .

[26]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[27]  Sepideh Dolatshahi,et al.  Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[28]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[29]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[30]  Farinaz Koushanfar,et al.  Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[31]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[32]  Aftab Ahmad Data Communication Principles , 2002, Springer US.

[33]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[34]  Oktay Üreten,et al.  Bayesian detection of radio transmitter turn-on transients , 1999, NSIP.

[35]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.