Using Spectral Fingerprints to Improve Wireless Network Security

The proliferation of affordable RF communication devices has given every individual the capability to communicate voice and/or data worldwide. This has increased wireless user exposure and driven the need for improved security measures. While earlier works have primarily focused on detecting and mitigating spoofing at the MAC layer, there has been a shift toward providing protection at the PHY layer by exploiting RF characteristics that are difficult to mimic. This research investigates the use of RF "fingerprints" for classifying emissions by exploiting transient signal features to provide hardware-specific identification. Reliable transient detection is the most important step in the process and is addressed here using variance trajectory of instantaneous amplitude and instantaneous phase responses. Following transient detection performance characterization, power spectral density fingerprints are extracted and spectral correlation used for classification. For proof-of-concept demonstration, the overall detection and classification process is evaluated using experimentally collected 802.11a OFDM signals. Results show that amplitude-based transient detection is most effective. Classification performance is demonstrated using three devices with overall classification accuracy approaching 80% for 802.11a signals at SNRs greater than 6 dB.

[1]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[2]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[3]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[4]  J. Dudczyk,et al.  Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).

[5]  O. Ureten,et al.  Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .

[6]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[8]  R.T. Johnk,et al.  Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[9]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  J. Dudczyk,et al.  Mixed Method Based on Intrapulse Data and Radiated Emission to Emitter Sources Recognition , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.

[11]  L. E. Langley,et al.  Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.

[12]  John G. Proakis,et al.  Digital Communications , 1983 .