2015
DOI: 10.1109/twc.2015.2443794
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion

Abstract: Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work [1], [2] we proposed a modelbased approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(12 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…Recently, physical layer authentication techniques, which exploit the intrinsic and unique features of physical layer for authentication, have received significant attention to enhance the conventional cryptography-based authentication solutions [12]- [23]. So far, extensive research efforts have been devoted to the study of effective physical layer authentication methods for non-massive MIMO systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, physical layer authentication techniques, which exploit the intrinsic and unique features of physical layer for authentication, have received significant attention to enhance the conventional cryptography-based authentication solutions [12]- [23]. So far, extensive research efforts have been devoted to the study of effective physical layer authentication methods for non-massive MIMO systems.…”
Section: Introductionmentioning
confidence: 99%
“…The basic principle of fingerprinting authentication is that the radio frequency-distinct native attribute (RF-DNA) can hardly be mimicked after being manufactured, such that RF-DNA can be used to uniquely identify devices. The authors in [12] explore the analysis of distortion signals resulting from hardware impairments to identify wireless devices. Carrier frequency offset caused by hardware impairments is investigated to identify wireless transmitters in [13].…”
Section: Introductionmentioning
confidence: 99%
“…This information is then associated with the individual emitter and its platform and weapon system. The SEI designates the individual emitter by discriminating it from all other emitters [1]- [4]. uch features are extracted from the received signal and termed as radio frequency fingerprints.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [1] explore minor non-ideal hardware parameters to authenticate a message's transmitter-of-origin by accurately analyzing radio-frequency signals. The authors of [8] show that time domain analysis of a pair of distortion signals caused by imperfections of manufacturing processes can be used to discriminate wireless transmitters. It is proved that using hardware fingerprinting could achieve authentication for transmitters based on transmitterspecific hardware features [16,18].…”
Section: Introductionmentioning
confidence: 99%