Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion
Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices...
Saved in:
Published in: | IEEE transactions on wireless communications Vol. 14; no. 11; pp. 5889 - 5899 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
New York
IEEE
01-11-2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters. |
---|---|
AbstractList | Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters. |
Author | Polak, Adam C. Goeckel, Dennis L. |
Author_xml | – sequence: 1 givenname: Adam C. surname: Polak fullname: Polak, Adam C. email: apolak@umass.edu organization: Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA – sequence: 2 givenname: Dennis L. surname: Goeckel fullname: Goeckel, Dennis L. email: goeckel@ecs.umass.edu organization: Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA |
BookMark | eNpdkU1LAzEQhoMoWD_ugpeAFy9bk2x2s3ssrdVCQZCWHkOandjUdaNJWvDfm7XFg6cZhmdm3pn3Ap12rgOEbigZUkrqh8VqPGSEFkPGeS5qfoIGtCiqjDFenfZ5XmaUifIcXYSwJYSKsigGKMwa6KI1VqtoXYedwSvroYUQ8AT2VkPoa8sAPuDVxuGRjnYP7TeeqnfAiw1Yj1-neGq7N_Cf3nYxcTZu8Mj_jrWqxRMVFZ7YEJ3vl1yhM6PaANfHeImW08fF-DmbvzzNxqN5pvOyjBkvkkojmqoRleJasAoMcEYprI0WJSFcc8UFKUWjlVlDRXJSct6wtTIN0U1-ie4Pcz-9-9pBiPLDBg1tqzpwuyCpEBUp0rvqhN79Q7du57ukLlF5zmjN6ypR5EBp70LwYGQ6-EP5b0mJ7F2QyQXZuyCPLqSW20OLBYA_XFDG8kT8AFVnhTo |
CODEN | ITWCAX |
CitedBy_id | crossref_primary_10_1109_TIFS_2020_2978620 crossref_primary_10_1016_j_vehcom_2023_100708 crossref_primary_10_1109_TIFS_2015_2464778 crossref_primary_10_1109_JIOT_2020_3018677 crossref_primary_10_1109_TII_2022_3206309 crossref_primary_10_1016_j_sigpro_2022_108685 crossref_primary_10_3390_info14090479 crossref_primary_10_1109_TWC_2019_2955128 crossref_primary_10_1109_TCCN_2020_3024610 crossref_primary_10_1109_JIOT_2021_3099028 crossref_primary_10_1109_TIFS_2016_2552146 crossref_primary_10_1109_TIFS_2020_3045318 crossref_primary_10_1007_s11760_022_02162_x crossref_primary_10_1109_JIOT_2023_3240242 crossref_primary_10_1109_TSP_2021_3054523 crossref_primary_10_1109_LCOMM_2018_2871454 crossref_primary_10_1109_TIFS_2022_3158553 crossref_primary_10_1109_JIOT_2023_3284428 crossref_primary_10_1109_TIFS_2020_3029894 crossref_primary_10_1109_TDSC_2022_3233862 crossref_primary_10_1109_COMST_2020_3042188 crossref_primary_10_1016_j_comcom_2021_04_007 crossref_primary_10_1109_JIOT_2022_3154595 crossref_primary_10_1109_ACCESS_2019_2962626 crossref_primary_10_1109_LCOMM_2022_3173990 crossref_primary_10_1109_TWC_2023_3316286 crossref_primary_10_1109_ACCESS_2019_2906699 crossref_primary_10_1007_s11276_022_02916_y crossref_primary_10_1109_TIFS_2018_2855665 crossref_primary_10_1109_TIM_2023_3338706 |
Cites_doi | 10.1145/1409944.1409959 10.1017/CBO9780511813610 10.1109/CJECE.2004.1532524 10.1109/TIFS.2009.2026454 10.1109/INFOCOM.2008.239 10.1145/1741866.1741882 10.1109/ICC.2007.767 10.1109/VETECF.2008.291 10.1145/1287853.1287867 10.1109/WCC.1997.622254 10.1109/WESCON.1993.488465 10.1109/TMTT.2005.845723 10.1109/TMTT.2005.860500 10.1109/ACSSC.2010.5757798 10.1109/HST.2009.5224969 10.1093/biomet/88.4.1186 10.1109/SECCOM.2007.4550352 10.1109/JSAC.2011.110812 10.1017/CBO9780511619960 10.1109/INFCOM.2011.5934926 10.1029/2000RS002345 10.1109/CJECE.2007.364330 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2015 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2015 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TWC.2015.2443794 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2248 |
EndPage | 5899 |
ExternalDocumentID | 3867337411 10_1109_TWC_2015_2443794 7122344 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Science Foundation grantid: 0905349 funderid: 10.13039/100000001 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AASAJ ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AIBXA AKJIK ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RIG RNS XFK AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c366t-45001f7d8d78a4c728efe4211ebfc76004c4a47067dcafbe8030644d2bafd0cd3 |
IEDL.DBID | RIE |
ISSN | 1536-1276 |
IngestDate | Fri Aug 16 21:53:29 EDT 2024 Thu Oct 10 19:31:09 EDT 2024 Fri Aug 23 01:00:00 EDT 2024 Wed Jun 26 19:28:34 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Keywords | likelihood ratio test wireless security process variations Radiometric identification |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c366t-45001f7d8d78a4c728efe4211ebfc76004c4a47067dcafbe8030644d2bafd0cd3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
OpenAccessLink | https://doi.org/10.1109/twc.2015.2443794 |
PQID | 1733219498 |
PQPubID | 105736 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_1109_TWC_2015_2443794 ieee_primary_7122344 proquest_journals_1733219498 proquest_miscellaneous_1778054439 |
PublicationCentury | 2000 |
PublicationDate | 2015-Nov. 2015-11-00 20151101 |
PublicationDateYYYYMMDD | 2015-11-01 |
PublicationDate_xml | – month: 11 year: 2015 text: 2015-Nov. |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on wireless communications |
PublicationTitleAbbrev | TWC |
PublicationYear | 2015 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 kay (ref28) 1988 ref31 hall (ref14) 0 ref11 hall (ref15) 2006 ref2 ref1 ref17 tang (ref23) 0 ref16 ref19 ref18 (ref3) 0 (ref32) 2008 ref24 ref26 ref25 talbot (ref5) 2003; 11 ref20 ref22 ref21 ureten (ref10) 0 ref27 ref29 ref8 ref7 ref9 ref4 ref6 hall (ref12) 0 trees (ref30) 1968 |
References_xml | – start-page: 201 year: 0 ident: ref14 article-title: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting publication-title: Proc IASTED Int Conf CIIT contributor: fullname: hall – start-page: 830 year: 0 ident: ref10 article-title: Bayesian detection of radio transmitter turn-on transients publication-title: Proc NSIP contributor: fullname: ureten – ident: ref18 doi: 10.1145/1409944.1409959 – ident: ref27 doi: 10.1017/CBO9780511813610 – start-page: 151 year: 0 ident: ref23 article-title: Some physical layer issues of wide-band cognitive radio systems publication-title: Proc IEEE Int Symp New Frontiers DySPAN contributor: fullname: tang – start-page: 13 year: 0 ident: ref12 article-title: Detection of transient in radio frequency fingerprinting using phase characteristics of signals publication-title: Proc 3rd IASTED Int Conf WOC contributor: fullname: hall – ident: ref13 doi: 10.1109/CJECE.2004.1532524 – year: 1968 ident: ref30 publication-title: Detection Estimation and Modulation Theory contributor: fullname: trees – ident: ref9 doi: 10.1109/TIFS.2009.2026454 – ident: ref7 doi: 10.1109/INFOCOM.2008.239 – ident: ref22 doi: 10.1145/1741866.1741882 – ident: ref8 doi: 10.1109/ICC.2007.767 – year: 2006 ident: ref15 publication-title: Detection of Rogue Devices in Wireless Networks contributor: fullname: hall – ident: ref19 doi: 10.1109/VETECF.2008.291 – ident: ref6 doi: 10.1145/1287853.1287867 – volume: 11 start-page: 113 year: 2003 ident: ref5 article-title: Specific emitter identification and verification publication-title: Technol Rev contributor: fullname: talbot – ident: ref31 doi: 10.1109/WCC.1997.622254 – ident: ref4 doi: 10.1109/WESCON.1993.488465 – ident: ref24 doi: 10.1109/TMTT.2005.845723 – ident: ref25 doi: 10.1109/TMTT.2005.860500 – ident: ref1 doi: 10.1109/ACSSC.2010.5757798 – ident: ref20 doi: 10.1109/HST.2009.5224969 – year: 1988 ident: ref28 publication-title: Modern Spectral Estimation Theory and Application contributor: fullname: kay – year: 2008 ident: ref32 publication-title: SKY65006-348LF 2 4?2 5 GHz WLAN/Zigbee Power Amplifier – year: 0 ident: ref3 publication-title: Internet Crime Complaint Center Annual Reports – ident: ref29 doi: 10.1093/biomet/88.4.1186 – ident: ref16 doi: 10.1109/SECCOM.2007.4550352 – ident: ref2 doi: 10.1109/JSAC.2011.110812 – ident: ref26 doi: 10.1017/CBO9780511619960 – ident: ref21 doi: 10.1109/INFCOM.2011.5934926 – ident: ref11 doi: 10.1029/2000RS002345 – ident: ref17 doi: 10.1109/CJECE.2007.364330 |
SSID | ssj0017655 |
Score | 2.4507165 |
Snippet | Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 5889 |
SubjectTerms | Devices Distortion Fingerprints Integrated circuit modeling likelihood ratio test Mathematical models Nonlinear distortion Nonlinearity Polynomials process variations Radio frequency Radio transmitters Radiometric identification Signatures Spectra Symbols Wireless communication wireless security |
Title | Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion |
URI | https://ieeexplore.ieee.org/document/7122344 https://www.proquest.com/docview/1733219498 https://search.proquest.com/docview/1778054439 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLYYJzjwRgwGChIXJLq1a9Y0x4mt4sQBhuBWpYmjIdCKWHfg3xOnpQLBhVvVRkll13b9-GyAiwSdy8V1GhghdcALGZHMYeCcOCGMsFGBBBS-uRe3T-lkSm1yrlosDCL64jPs06XP5ZtSryhUNhCRM2acd6AjZFpjtdqMgUj8hFMnwDRXRrQpyVAOZo_XVMM16jtTFgvJf5ggP1PllyL21iXb_t977cBW8xfJxjXbd2ENF3uw-a234D4sawiubWJyrLSMKl1fnWZjE_T6ge49ENqSPc5LNvaa7_WDZeoF2YwSCOwuY5mP-1H4r3Lrnqu5P7XuO8EmqlJs4juN0CEH8JBNZ9c3QTNhIdBxklQBHznKWWFSI1LFtRimaJE7nxALqyllxzVXXDiLZrSyBabkYXBuhoWyJtQmPoT1RbnAI2AyMaE0ztxLEXHD4yKxUoURqiGhiWLZhcsvoudvdSON3Dsgocwdg3JiUN4wqAv7ROR2XUPfLvS-uJQ3krbMIxHHTutymXbhvH3sZIQSH2qB5YrW0OQGt7c8_nvnE9ig82uMYQ_Wq_cVnkJnaVZn_iv7BL3t0Gc |
link.rule.ids | 315,782,786,798,27933,27934,54768 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9wwDLYGe9j2sA0Y2o1jyyRekCjXXn1N84i4q26C8QCH4K1KE0dMQ9dp13vYv1-cloppvPBWtVES2bUd2_lsgIOMvMuFJo-sVCbCSiUscxR5J05KK11SEQOF51fy4jafzrhMzlGPhSGicPmMjvkx5PJtbdYcKhvJxBszxA14OUF_TG7RWn3OQGahx6kXYe4sI_ukZKxGi5tTvsU1OfbGLJUK_zFCoavKf6o42Jfi3fN29h7edudIcdIyfgte0HIb3jyqLrgDqxaE67qonKid4Luu9163iSkFDcHvrhlvKW7uanESdN_9H1HonyQWnEIQl4UoQuSPA4CNH_ejuQurtpUnxFQ3WkxDrRFe5ANcF7PF6TzqeixEJs2yJsKJp5yTNrcy12jkOCdH6L1CqpzhpB0a1Ci9TbNGu4py9jEQ7bjSzsbGpruwuayX9BGEymysrDf4SiZoMa0yp3SckB4znihVAzh8IHr5qy2lUQYXJFalZ1DJDCo7Bg1gh4ncj-voO4DhA5fKTtZWZSLT1OtdVPkAvvafvZRw6kMvqV7zGO7d4OdWn56e-Qu8mi--n5fn3y7O9uA176VFHA5hs_m9pn3YWNn15_DH_QXfQ9O5 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Identification+of+Wireless+Devices+of+Users+Who+Actively+Fake+Their+RF+Fingerprints+With+Artificial+Data+Distortion&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Polak%2C+Adam+C.&rft.au=Goeckel%2C+Dennis+L.&rft.date=2015-11-01&rft.pub=IEEE&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=14&rft.issue=11&rft.spage=5889&rft.epage=5899&rft_id=info:doi/10.1109%2FTWC.2015.2443794&rft.externalDocID=7122344 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |