Using DE-Optimized LFS Processing to Enhance 4G Communication Security

Wireless communication networks remain under attack with ill- intentioned "hackers" routinely gaining unauthorized access through Wireless Access Points-one of the most vulnerable points in an Information Technology (IT) system. The goal here is to demonstrate the feasibility of using Radio Frequency (RF) air monitoring to augment conventional bit-level security at WAPs. The specific networks of interest include those based on Orthogonal Frequency Division Multiplexing (OFDM), to include 802.11a/g WiFi and 4G 802.16 WiMAX. Proof-of-concept results are presented to demonstrate the effectiveness of a "Learning from Signals" (LFS) classifier with Gaussian kernel bandwidth parameters optimally determined using Differential Evolution (DE). The resultant DE- optimized LFS classifier is implemented within an RF "Distinct Native Attribute" (RF-DNA) fingerprinting process with both Time Domain (TD) and Spectral Domain (SD) features input to the classifier. The RF-DNA is used for intra-manufacturer (like-model devices from a given manufacturer) discrimination of IEEE compliant 802.11a WiFi devices and 802.16e WiMAX devices. A comparative performance assessment is provided using results from the proposed DE-optimized LFS classifier and a Bayesian-based Multiple Discriminant Analysis/Maximum Likelihood (MDA/ML) classifier as used in previous demonstrations. The assessment is performed using identical TD and SD fingerprint features for both classifiers. Preliminary results of the DE-optimized classifier are very promising, with correct classification improvement of 15% to 40% realized over the range of signal to noise ratios considered.

[1]  Michael A. Temple,et al.  Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[2]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[3]  Jennifer C. Hou,et al.  Proceedings of the 13th annual ACM international conference on Mobile computing and networking , 2007, MobiCom 2007.

[4]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[5]  Robert A. Lordo,et al.  Learning from Data: Concepts, Theory, and Methods , 2001, Technometrics.

[6]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[7]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[8]  Thomas D. Tarman,et al.  Intrusion detection considerations for switched networks , 2001, SPIE Optics East.

[9]  Sheldon A. Munns,et al.  RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.

[10]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[11]  Robert E. Uhrig,et al.  Learning from data with localized regression and differential evolution , 2003 .

[12]  Michael A. Temple,et al.  Using differential evolution to optimize 'learning from signals' and enhance network security , 2011, GECCO '11.

[13]  D. Ruppert The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .

[14]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.

[15]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[16]  Michael A. Temple,et al.  Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.

[17]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[18]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[19]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[20]  Michael A. Temple,et al.  Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.

[21]  Vladimir Cherkassky,et al.  Learning from Data: Concepts, Theory, and Methods , 1998 .

[22]  Robert F. Mills,et al.  Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.

[23]  R. Storn,et al.  Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series) , 2005 .

[24]  Michael A. Temple,et al.  Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[25]  Andrei V. Gribok,et al.  APPLICATION OF LOCALIZED REGULARIZATION METHODS FOR NUCLEAR POWER PLANT SENSOR CALIBRATION MONITORING , 2002 .

[26]  Daisuke Takahashi,et al.  IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..

[27]  David G. Stork,et al.  Pattern Classification , 1973 .