Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion

Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters.

[1]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[2]  Steven Kay,et al.  Modern Spectral Estimation: Theory and Application , 1988 .

[3]  Sepideh Dolatshahi,et al.  Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[4]  Dominique Schreurs,et al.  RF Power Amplifier Behavioral Modeling: Preface , 2008 .

[5]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[6]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[7]  H. Tang,et al.  Some physical layer issues of wide-band cognitive radio systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[8]  J. Raz,et al.  A simple generalised crossvalidation method of span selection for periodogram smoothing , 2001 .

[9]  Dominique Schreurs,et al.  RF Power Amplifier Behavioral Modeling: Contents , 2008 .

[10]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[11]  L. E. Langley,et al.  Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.

[12]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[13]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[14]  Keith E. Nolan,et al.  Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[15]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[16]  R. Hassun,et al.  Effective evaluation of link quality using error vector magnitude techniques , 1997, Proceedings of 1997 Wireless Communications Conference.

[17]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[18]  Farinaz Koushanfar,et al.  Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[19]  Jeyanthi Hall,et al.  Detection of rogue devices in wireless networks , 2006 .

[20]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[21]  M. Isaksson,et al.  A comparative analysis of behavioral models for RF power amplifiers , 2006, IEEE Transactions on Microwave Theory and Techniques.

[22]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.

[23]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[24]  Charles W. Therrien,et al.  Probability and Random Processes for Electrical and Computer Engineers , 2011 .

[25]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[26]  J.C. Pedro,et al.  A comparative overview of microwave and wireless power-amplifier behavioral modeling approaches , 2005, IEEE Transactions on Microwave Theory and Techniques.

[27]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[28]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[29]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.