Wireless security through RF fingerprinting

The process of identifying radio transmitters by examining their unique transient characteristics at the beginning of transmission is called RF fingerprinting. The security of wireless networks can be enhanced by challenging a user to prove its identity if the fingerprint of a network device is unidentified or deemed to be a threat. This paper addresses the problem of identifying an individual node in a wireless network by means of its RF fingerprint. A complete identification system is presented, including data acquisition, transient detection, RF fingerprint extraction, and classification subsystems. The classification performance of the proposed system has been evaluated from experimental data. It is demonstrated that the RF fingerprinting technique can be used as an additional tool to enhance the security of wireless networks.

[1]  Donald F. Specht,et al.  Probabilistic neural networks , 1990, Neural Networks.

[2]  Boualem Boashash,et al.  Estimating and interpreting the instantaneous frequency of a signal. I. Fundamentals , 1992, Proc. IEEE.

[3]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[4]  马克斯·B·弗雷德里克 Cellular telephone anti-fraud system , 1994 .

[5]  Harold H. Szu,et al.  Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.

[6]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[7]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.

[8]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[9]  Oktay Üreten,et al.  Bayesian detection of radio transmitter turn-on transients , 1999, NSIP.

[10]  A. M. Murray Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[11]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[12]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[13]  O. Ureten,et al.  Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .

[14]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[15]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[16]  N. Serinken,et al.  DETECTION. CHARACTERIZATION AND CLASSIFICATION OF RADIO TRANSMITTER TURN-ON TRANSIENTS , 2002 .

[17]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[18]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[19]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .