2014
DOI: 10.4018/ijmcmc.2014070101
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Radio Frequency Fingerprinting for Low-End Devices

Abstract: RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. A masquerading or impersonation attacks can be prevented by establishing the identity of wireless transmitter using unique transmitter RF fingerprint. Unique RF fingerprints are attributable to the analog components (digital-to-analog converters, band-pass filters, frequency mixers and power amplifiers) present in the RF front ends of transmitters. Most of the previous researches have reported promising … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 54 publications
(66 reference statements)
0
4
0
Order By: Relevance
“…While the cross‐device uniqueness of electronic device fingerprints may not be totally on par with cross‐human fingerprint uniqueness, results such as provided in Deng et al (), Hall et al (), Huang and Zheng (); Lopez Jr. et al, ; Mirowski et al, ; Rehman et al, ; Reising et al, ; Rondeau et al, ; Suski et al, ; Talbot et al, ; Zhuo et al, ) routinely demonstrate near 100% discrimination for selected scenarios and have been sufficiently promising to sustain progressive RDD over the past 10 years. Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ).…”
Section: Lowest‐layer Phymentioning
confidence: 99%
See 2 more Smart Citations
“…While the cross‐device uniqueness of electronic device fingerprints may not be totally on par with cross‐human fingerprint uniqueness, results such as provided in Deng et al (), Hall et al (), Huang and Zheng (); Lopez Jr. et al, ; Mirowski et al, ; Rehman et al, ; Reising et al, ; Rondeau et al, ; Suski et al, ; Talbot et al, ; Zhuo et al, ) routinely demonstrate near 100% discrimination for selected scenarios and have been sufficiently promising to sustain progressive RDD over the past 10 years. Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ).…”
Section: Lowest‐layer Phymentioning
confidence: 99%
“…Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ). A majority of RFF works available for forensic consideration are based on burst‐type communications, which when used for committing a cyberattack or electronic crime, may leave behind (1) only a single fingerprint—this may occur for a simple attack against a ZigBee control element that is designed to respond to a single command burst or (b) 10s–1000s of fingerprints—this may occur for a progressive multinode WiFi network attack with the actual number of fingerprints “left behind” by the perpetrator(s) depending on the extent and duration of the attack.…”
Section: Lowest‐layer Phymentioning
confidence: 99%
See 1 more Smart Citation
“…Feature extraction determines the quality of RFF and directly affects classification accuracy. Many studies have explored the characteristics of different electronic components to extract effective RFF features-for example, in-phase and quadrature offset (Brik et al, 2008), phase offset (Nguyen et al, 2011), carrier frequency offset (Wheeler et al, 2017), differential constellation trace figure , and signal spectrum (Rehman et al, 2014). Recently, Wang et al (2016) built a theoretical model for the entire wireless communication link to analyze the effectiveness of different RFF features.…”
Section: Introductionmentioning
confidence: 99%