The Physical Layer Identification of Communication Devices Based on RF-DNA

Traditional methods of improving wireless network security are through software-level device identification, such as IP or MAC addresses. However, these identifiers can be easily changed by software, making wireless network communication a high risk. In response to these risks, radio frequency fingerprinting technology has been proposed. Since the radio frequency fingerprint is an essential feature of the physical layer of the wireless communication device and is difficult to be tampered with, it is widely used to improve the security of the wireless network. Based on the physical layer characteristics of the communication system, this paper has established a relatively complete RF fingerprint identification system to realize the identification and classification of the devices. Two signal starting point detection methods and two RF fingerprint feature extraction methods are studied in this paper. The detailed results are obtained by combining the dimensionality reduction and classification methods. Finally, an optimal identification scheme was found to achieve a classification accuracy of more than 90% when the signal-to-noise ratio is greater than 15 dB.

[1]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Dennis Goeckel,et al.  Wireless Device Identification Based on RF Oscillator Imperfections , 2015, IEEE Trans. Inf. Forensics Secur..

[3]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[4]  Dennis Goeckel,et al.  RF fingerprinting of users who actively mask their identities with artificial distortion , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[5]  Tao Wang,et al.  Adaptive Communication Protocols in Flying Ad Hoc Network , 2018, IEEE Communications Magazine.

[6]  Shauna Revay,et al.  Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks , 2018, IEEE Journal of Selected Topics in Signal Processing.

[7]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[8]  Nan Zhao,et al.  Adaptive Power Allocation Schemes for Spectrum Sharing in Interference-Alignment-Based Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[9]  Harold H. Szu,et al.  Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.

[10]  Desmond Loh Chin Choong,et al.  Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.

[11]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[12]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[13]  Jin Wang,et al.  Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Mod-ulation Classification , 2018 .

[14]  Ke Gao,et al.  A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[15]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[16]  Rick Siow Mong Goh,et al.  Transfer Hashing: From Shallow to Deep , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[17]  M. Steer,et al.  The impact of RF front-end characteristics on the spectral regrowth of communications signals , 2005, IEEE Transactions on Microwave Theory and Techniques.