Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion

Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on wireless communications Vol. 14; no. 11; pp. 5889 - 5899
Main Authors: Polak, Adam C., Goeckel, Dennis L.
Format: Journal Article
Language:English
Published: New York IEEE 01-11-2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters.
AbstractList Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters
Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless devices with a given transmission. In our previous work, we proposed a model-based approach that allows for identification of wireless devices based on signatures obtained with time domain analysis of a pair of received and decoded signals. Here, we consider strong adversaries who intentionally introduce distortions to the data symbols before the symbols are exposed to the transmitter's inherent nonlinearities, with the intention of faking the signatures of their devices while still allowing for proper data decoding. The method proposed in this work is based on spectral analysis and on the observation that nonlinear components cause in-band distortion and spectral regrowth of the signal that is dependent on the parameters of the nonlinearity. Hence, by analysis of the in-band distortion of the spectrum as well as the spectral regrowth, we show that wireless devices can be successfully identified even when the users are digitally modifying their data symbols. The utility of the proposed identification approach is demonstrated with simulations based on parameters obtained from the measurements of commercially employed WLAN RF transmitters.
Author Polak, Adam C.
Goeckel, Dennis L.
Author_xml – sequence: 1
  givenname: Adam C.
  surname: Polak
  fullname: Polak, Adam C.
  email: apolak@umass.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA
– sequence: 2
  givenname: Dennis L.
  surname: Goeckel
  fullname: Goeckel, Dennis L.
  email: goeckel@ecs.umass.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA
BookMark eNpdkU1LAzEQhoMoWD_ugpeAFy9bk2x2s3ssrdVCQZCWHkOandjUdaNJWvDfm7XFg6cZhmdm3pn3Ap12rgOEbigZUkrqh8VqPGSEFkPGeS5qfoIGtCiqjDFenfZ5XmaUifIcXYSwJYSKsigGKMwa6KI1VqtoXYedwSvroYUQ8AT2VkPoa8sAPuDVxuGRjnYP7TeeqnfAiw1Yj1-neGq7N_Cf3nYxcTZu8Mj_jrWqxRMVFZ7YEJ3vl1yhM6PaANfHeImW08fF-DmbvzzNxqN5pvOyjBkvkkojmqoRleJasAoMcEYprI0WJSFcc8UFKUWjlVlDRXJSct6wtTIN0U1-ie4Pcz-9-9pBiPLDBg1tqzpwuyCpEBUp0rvqhN79Q7du57ukLlF5zmjN6ypR5EBp70LwYGQ6-EP5b0mJ7F2QyQXZuyCPLqSW20OLBYA_XFDG8kT8AFVnhTo
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_TIFS_2020_2978620
crossref_primary_10_1016_j_vehcom_2023_100708
crossref_primary_10_1109_TIFS_2015_2464778
crossref_primary_10_1109_JIOT_2020_3018677
crossref_primary_10_1109_TII_2022_3206309
crossref_primary_10_1016_j_sigpro_2022_108685
crossref_primary_10_3390_info14090479
crossref_primary_10_1109_TWC_2019_2955128
crossref_primary_10_1109_TCCN_2020_3024610
crossref_primary_10_1109_JIOT_2021_3099028
crossref_primary_10_1109_TIFS_2016_2552146
crossref_primary_10_1109_TIFS_2020_3045318
crossref_primary_10_1007_s11760_022_02162_x
crossref_primary_10_1109_JIOT_2023_3240242
crossref_primary_10_1109_TSP_2021_3054523
crossref_primary_10_1109_LCOMM_2018_2871454
crossref_primary_10_1109_TIFS_2022_3158553
crossref_primary_10_1109_JIOT_2023_3284428
crossref_primary_10_1109_TIFS_2020_3029894
crossref_primary_10_1109_TDSC_2022_3233862
crossref_primary_10_1109_COMST_2020_3042188
crossref_primary_10_1016_j_comcom_2021_04_007
crossref_primary_10_1109_JIOT_2022_3154595
crossref_primary_10_1109_ACCESS_2019_2962626
crossref_primary_10_1109_LCOMM_2022_3173990
crossref_primary_10_1109_TWC_2023_3316286
crossref_primary_10_1109_ACCESS_2019_2906699
crossref_primary_10_1007_s11276_022_02916_y
crossref_primary_10_1109_TIFS_2018_2855665
crossref_primary_10_1109_TIM_2023_3338706
Cites_doi 10.1145/1409944.1409959
10.1017/CBO9780511813610
10.1109/CJECE.2004.1532524
10.1109/TIFS.2009.2026454
10.1109/INFOCOM.2008.239
10.1145/1741866.1741882
10.1109/ICC.2007.767
10.1109/VETECF.2008.291
10.1145/1287853.1287867
10.1109/WCC.1997.622254
10.1109/WESCON.1993.488465
10.1109/TMTT.2005.845723
10.1109/TMTT.2005.860500
10.1109/ACSSC.2010.5757798
10.1109/HST.2009.5224969
10.1093/biomet/88.4.1186
10.1109/SECCOM.2007.4550352
10.1109/JSAC.2011.110812
10.1017/CBO9780511619960
10.1109/INFCOM.2011.5934926
10.1029/2000RS002345
10.1109/CJECE.2007.364330
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2015
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2015
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TWC.2015.2443794
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 5899
ExternalDocumentID 3867337411
10_1109_TWC_2015_2443794
7122344
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation
  grantid: 0905349
  funderid: 10.13039/100000001
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AASAJ
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AIBXA
AKJIK
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RIG
RNS
XFK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c366t-45001f7d8d78a4c728efe4211ebfc76004c4a47067dcafbe8030644d2bafd0cd3
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Fri Aug 16 21:53:29 EDT 2024
Thu Oct 10 19:31:09 EDT 2024
Fri Aug 23 01:00:00 EDT 2024
Wed Jun 26 19:28:34 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords likelihood ratio test
wireless security
process variations
Radiometric identification
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c366t-45001f7d8d78a4c728efe4211ebfc76004c4a47067dcafbe8030644d2bafd0cd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://doi.org/10.1109/twc.2015.2443794
PQID 1733219498
PQPubID 105736
PageCount 11
ParticipantIDs crossref_primary_10_1109_TWC_2015_2443794
ieee_primary_7122344
proquest_journals_1733219498
proquest_miscellaneous_1778054439
PublicationCentury 2000
PublicationDate 2015-Nov.
2015-11-00
20151101
PublicationDateYYYYMMDD 2015-11-01
PublicationDate_xml – month: 11
  year: 2015
  text: 2015-Nov.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2015
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
kay (ref28) 1988
ref31
hall (ref14) 0
ref11
hall (ref15) 2006
ref2
ref1
ref17
tang (ref23) 0
ref16
ref19
ref18
(ref3) 0
(ref32) 2008
ref24
ref26
ref25
talbot (ref5) 2003; 11
ref20
ref22
ref21
ureten (ref10) 0
ref27
ref29
ref8
ref7
ref9
ref4
ref6
hall (ref12) 0
trees (ref30) 1968
References_xml – start-page: 201
  year: 0
  ident: ref14
  article-title: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
  publication-title: Proc IASTED Int Conf CIIT
  contributor:
    fullname: hall
– start-page: 830
  year: 0
  ident: ref10
  article-title: Bayesian detection of radio transmitter turn-on transients
  publication-title: Proc NSIP
  contributor:
    fullname: ureten
– ident: ref18
  doi: 10.1145/1409944.1409959
– ident: ref27
  doi: 10.1017/CBO9780511813610
– start-page: 151
  year: 0
  ident: ref23
  article-title: Some physical layer issues of wide-band cognitive radio systems
  publication-title: Proc IEEE Int Symp New Frontiers DySPAN
  contributor:
    fullname: tang
– start-page: 13
  year: 0
  ident: ref12
  article-title: Detection of transient in radio frequency fingerprinting using phase characteristics of signals
  publication-title: Proc 3rd IASTED Int Conf WOC
  contributor:
    fullname: hall
– ident: ref13
  doi: 10.1109/CJECE.2004.1532524
– year: 1968
  ident: ref30
  publication-title: Detection Estimation and Modulation Theory
  contributor:
    fullname: trees
– ident: ref9
  doi: 10.1109/TIFS.2009.2026454
– ident: ref7
  doi: 10.1109/INFOCOM.2008.239
– ident: ref22
  doi: 10.1145/1741866.1741882
– ident: ref8
  doi: 10.1109/ICC.2007.767
– year: 2006
  ident: ref15
  publication-title: Detection of Rogue Devices in Wireless Networks
  contributor:
    fullname: hall
– ident: ref19
  doi: 10.1109/VETECF.2008.291
– ident: ref6
  doi: 10.1145/1287853.1287867
– volume: 11
  start-page: 113
  year: 2003
  ident: ref5
  article-title: Specific emitter identification and verification
  publication-title: Technol Rev
  contributor:
    fullname: talbot
– ident: ref31
  doi: 10.1109/WCC.1997.622254
– ident: ref4
  doi: 10.1109/WESCON.1993.488465
– ident: ref24
  doi: 10.1109/TMTT.2005.845723
– ident: ref25
  doi: 10.1109/TMTT.2005.860500
– ident: ref1
  doi: 10.1109/ACSSC.2010.5757798
– ident: ref20
  doi: 10.1109/HST.2009.5224969
– year: 1988
  ident: ref28
  publication-title: Modern Spectral Estimation Theory and Application
  contributor:
    fullname: kay
– year: 2008
  ident: ref32
  publication-title: SKY65006-348LF 2 4?2 5 GHz WLAN/Zigbee Power Amplifier
– year: 0
  ident: ref3
  publication-title: Internet Crime Complaint Center Annual Reports
– ident: ref29
  doi: 10.1093/biomet/88.4.1186
– ident: ref16
  doi: 10.1109/SECCOM.2007.4550352
– ident: ref2
  doi: 10.1109/JSAC.2011.110812
– ident: ref26
  doi: 10.1017/CBO9780511619960
– ident: ref21
  doi: 10.1109/INFCOM.2011.5934926
– ident: ref11
  doi: 10.1029/2000RS002345
– ident: ref17
  doi: 10.1109/CJECE.2007.364330
SSID ssj0017655
Score 2.4507165
Snippet Variations in the RF chain of radio transmitters caused by imperfections of manufacturing processes can be used as a signature to uniquely associate wireless...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 5889
SubjectTerms Devices
Distortion
Fingerprints
Integrated circuit modeling
likelihood ratio test
Mathematical models
Nonlinear distortion
Nonlinearity
Polynomials
process variations
Radio frequency
Radio transmitters
Radiometric identification
Signatures
Spectra
Symbols
Wireless communication
wireless security
Title Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion
URI https://ieeexplore.ieee.org/document/7122344
https://www.proquest.com/docview/1733219498
https://search.proquest.com/docview/1778054439
Volume 14
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLYYJzjwRgwGChIXJLq1a9Y0x4mt4sQBhuBWpYmjIdCKWHfg3xOnpQLBhVvVRkll13b9-GyAiwSdy8V1GhghdcALGZHMYeCcOCGMsFGBBBS-uRe3T-lkSm1yrlosDCL64jPs06XP5ZtSryhUNhCRM2acd6AjZFpjtdqMgUj8hFMnwDRXRrQpyVAOZo_XVMM16jtTFgvJf5ggP1PllyL21iXb_t977cBW8xfJxjXbd2ENF3uw-a234D4sawiubWJyrLSMKl1fnWZjE_T6ge49ENqSPc5LNvaa7_WDZeoF2YwSCOwuY5mP-1H4r3Lrnqu5P7XuO8EmqlJs4juN0CEH8JBNZ9c3QTNhIdBxklQBHznKWWFSI1LFtRimaJE7nxALqyllxzVXXDiLZrSyBabkYXBuhoWyJtQmPoT1RbnAI2AyMaE0ztxLEXHD4yKxUoURqiGhiWLZhcsvoudvdSON3Dsgocwdg3JiUN4wqAv7ROR2XUPfLvS-uJQ3krbMIxHHTutymXbhvH3sZIQSH2qB5YrW0OQGt7c8_nvnE9ig82uMYQ_Wq_cVnkJnaVZn_iv7BL3t0Gc
link.rule.ids 315,782,786,798,27933,27934,54768
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RT9wwDLYGe9j2sA0Y2o1jyyRekCjXXn1N84i4q26C8QCH4K1KE0dMQ9dp13vYv1-cloppvPBWtVES2bUd2_lsgIOMvMuFJo-sVCbCSiUscxR5J05KK11SEQOF51fy4jafzrhMzlGPhSGicPmMjvkx5PJtbdYcKhvJxBszxA14OUF_TG7RWn3OQGahx6kXYe4sI_ukZKxGi5tTvsU1OfbGLJUK_zFCoavKf6o42Jfi3fN29h7edudIcdIyfgte0HIb3jyqLrgDqxaE67qonKid4Luu9163iSkFDcHvrhlvKW7uanESdN_9H1HonyQWnEIQl4UoQuSPA4CNH_ejuQurtpUnxFQ3WkxDrRFe5ANcF7PF6TzqeixEJs2yJsKJp5yTNrcy12jkOCdH6L1CqpzhpB0a1Ci9TbNGu4py9jEQ7bjSzsbGpruwuayX9BGEymysrDf4SiZoMa0yp3SckB4znihVAzh8IHr5qy2lUQYXJFalZ1DJDCo7Bg1gh4ncj-voO4DhA5fKTtZWZSLT1OtdVPkAvvafvZRw6kMvqV7zGO7d4OdWn56e-Qu8mi--n5fn3y7O9uA176VFHA5hs_m9pn3YWNn15_DH_QXfQ9O5
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Identification+of+Wireless+Devices+of+Users+Who+Actively+Fake+Their+RF+Fingerprints+With+Artificial+Data+Distortion&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Polak%2C+Adam+C.&rft.au=Goeckel%2C+Dennis+L.&rft.date=2015-11-01&rft.pub=IEEE&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=14&rft.issue=11&rft.spage=5889&rft.epage=5899&rft_id=info:doi/10.1109%2FTWC.2015.2443794&rft.externalDocID=7122344
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon