Skip to main content

Types and Origins of Fingerprints

  • Chapter
  • First Online:
Digital Fingerprinting

Abstract

We present a systematic review of physical-layer identification systems and provide a summary of current state-of-the-art techniques. We further review the types of fingerprints that were discussed in prior work and highlight issues that are still open and need to be addressed in future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This work is largely based on [8].

  2. 2.

    MIMO refers to multiple-input and multiple-output. Such wireless systems use multiple antennas for transmitting and receiving for the purpose of improving communication performance.

References

  1. Bishop, C.: Pattern Recognition and Machine Learning. Springer (2006)

    Google Scholar 

  2. Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer (2003)

    Google Scholar 

  3. Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 116–127 (2008)

    Google Scholar 

  4. Choe, H., Poole, C., Yu, A., Szu, H.: Novel identification of intercepted signals for unknown radio transmitters. Proc. SPIE 2491, 504–517 (1995)

    Article  Google Scholar 

  5. Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: Proceeding of ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), pp. 25–36 (2009)

    Google Scholar 

  6. Danev, B., Heydt-Benjamin, T.S., Capkun, S.: Physical-layer identification of RFID devices. In: Proceedings of USENIX Security Symposium, pp. 199–214 (2009)

    Google Scholar 

  7. Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: Proceedings of ACM Conference on Wireless Network Security (WiSec), pp. 89–98 (2010)

    Google Scholar 

  8. Danev, B., Zanetti, D., Capkun, S.: On physical-layer identification of wireless devices. ACM Comput. Surv. 45(1), 6:1–6:29 (2012)

    Google Scholar 

  9. Edman, M., Yener, B.: Active attacks against modulation-based radiometric identification. Technical report 09-02, Rensselaer Institute of Technology (August 2009)

    Google Scholar 

  10. Ellis, K., Serinken, N.: Characteristics of radio transmitter fingerprints. Radio Sci. 36, 585–597 (2001)

    Article  Google Scholar 

  11. EPCglobal: UHF Class 1 Gen 2 standard v. 1.2.0 (2008)

    Google Scholar 

  12. Ettus, M.: Universal software defined radio (USRP) (2007). http://www.ettus.com/

  13. FVC: Fingerprint Verification Competition FVC (2006). http://bias.csr.uni-bo.it/fvc2006/

  14. Hall, J.: Detection of rogue devices in wireless networks. Ph.D. thesis (2006)

    Google Scholar 

  15. Hall, J., Barbeau, M., Kranakis, E.: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In: Proceedings of Communications, Internet, and Information Technology (CIIT), pp. 201–206 (2004)

    Google Scholar 

  16. Hall, J., Barbeau, M., Kranakis, E.: Radio frequency fingerprinting for intrusion detection in wireless networks. Manuscript (2005). http://wiki.uni.lu/secan-lab/Hall2005.html

  17. Hall, J., Barbeau, M., Kranakis, E.: Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting. In: Proceedings of IASTED International Conference on Communications and Computer Networks (CCN), pp. 108–113 (2006)

    Google Scholar 

  18. Hippenstiel, R., Payal, Y.: Wavelet based transmitter identification. In: Proceedings of International Symposium on Signal Processing and Its Applications (ISSPA), pp. 740–742 (1996)

    Google Scholar 

  19. Jain, A., Zongker, D.: Feature selection: evaluation, application, and small sample performance. IEEE Trans. Pattern Anal. Mach. Intell. 19(2), 153–158 (1997)

    Article  Google Scholar 

  20. Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: a review. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 4–37 (2000)

    Article  Google Scholar 

  21. Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 104–115 (2008)

    Google Scholar 

  22. Jones, R.: Most Secret War: British Scientific Intelligence 1939–1945. Hamish Hamilton (1978)

    Google Scholar 

  23. Kaplan, D., Stanhope, D.: Waveform collection for use in wireless telephone identification. US Patent 5999806 (1999)

    Google Scholar 

  24. Kittler, J., Hatef, M., Duin, R., Matas, J.: On combining classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 20(3), 226–239 (1998)

    Article  Google Scholar 

  25. Klein, R.W., Temple, A., Mendenhall, M.J.: Application of wavelet-based RF fingerprinting to enhance wireless network security. Secur. Commun. Netw. 11(6), 544–555 (2009)

    Article  Google Scholar 

  26. Klein, R.W., Temple, M.A., Mendenhall, M.J.: Application of wavelet denoising to improve OFDM-based signal detection and classification. Secur. Commun. Netw. 3(1), 71–82 (2010)

    Google Scholar 

  27. Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  28. Margerum, D.: Pinpointing Location Of Hostile Radars. Microwaves (1969)

    Google Scholar 

  29. Mitra, M.: Privacy for RFID systems to prevent tracking and cloning. Int. J. Comput. Sci. Netw. Secur. 8(1), 1–5 (2008)

    Google Scholar 

  30. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 99–110 (2007)

    Google Scholar 

  31. Periaswamy, S.C.G., Thompson, D., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable Secure Comput. 8(6), 938–943 (2011)

    Article  Google Scholar 

  32. Periaswamy, S.C.G., Thompson, D.R., Romero, H.P.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proceedings of Workshop on RFID Security (RFIDSec Asia) (2010)

    Google Scholar 

  33. Rasmussen, K., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of International ICST Conference on Security and Privacy in Communication Networks (SecureComm) (2007)

    Google Scholar 

  34. Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improved wireless security for GMSK-based devices using RF fingerprinting. Int. J. Electron. Secur. Digit. Forensics 3(1), 41–59 (2010)

    Article  Google Scholar 

  35. Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improving intra-cellular security using air monitoring with RF fingerprints. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC) (2010)

    Google Scholar 

  36. Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microwave Theory Tech. 57(5), 1383–1387 (2009)

    Article  Google Scholar 

  37. Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Microw. Theory Tech. 58(7), 1758–1765 (2010)

    Article  Google Scholar 

  38. Ross, A., Jain, A.: Multimodal biometrics: an overview. In: Proceedings of European Signal Processing Conference (EUSIPCO), pp. 1221–1224 (2004)

    Google Scholar 

  39. Shaw, D., Kinsner, W.: Multifractal modeling of radio transmitter transients for classification. In: Proceedings of IEEE Conference on Communications, Power and Computing (WESCANEX), pp. 306–312 (1997)

    Google Scholar 

  40. Suski, W., Temple, M., Mendenhall, M., Mills, R.: Using spectral fingerprints to improve wireless network security. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–5 (2008)

    Google Scholar 

  41. Suski, W.C., Temple, M.A., Mendenhall, M.J., Mills, R.F.: Radio frequency fingerprinting commercial communication devices to enhance electronic security. Int. J. Electron. Secur. Digital Forensics 1(3), 301–322 (2008)

    Article  Google Scholar 

  42. Tekbas, O., Ureten, O., Serinken, N.: An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can. J. Electr. Comput. Eng. 29(3), 203–209 (2004)

    Article  Google Scholar 

  43. Tekbas, O., Ureten, O., Serinken, N.: Improvement of transmitter identification system for low SNR transients. Electron. Lett. 40(3), 182–183 (2004)

    Article  Google Scholar 

  44. Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., Capkun, S.: Attacks on public WLAN-based positioning. In: Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 29–40 (2009)

    Google Scholar 

  45. Toonstra, J., Kinsner, W.: Transient analysis and genetic algorithms for classification. In: Proceedings of IEEE Conference on Communications, Power, and Computing (WESCANEX), pp. 432–437, vol. 2 (1995)

    Google Scholar 

  46. Toonstra, J., Kinsner, W.: A radio transmitter fingerprinting system ODO-1. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 60–63, vol. 1 (1996)

    Google Scholar 

  47. Ureten, O., Serinken, N.: Detection of radio transmitter turn-on transients. Electron. Lett. 35, 1996–1997 (2007)

    Article  Google Scholar 

  48. Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Can. J. Electr. Comput. Eng. 32(1), 27–33 (2007)

    Article  Google Scholar 

  49. Wang, B., Omatu, S., Abe, T.: Identification of the defective transmission devices using the wavelet transform. IEEE Trans. Pattern Anal. Mach. Intell. 27(6), 696–710 (2005)

    Article  Google Scholar 

  50. Williams, M., Temple, M., Reising, D.: Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (2010)

    Google Scholar 

  51. Zanetti, D., Danev, B., Capkun, S.: Physical-layer identification of UHF RFID tags. In: Proceedings of ACM Conference on Mobile Computing and Networking (MOBICOM), pp. 353–364 (2010)

    Google Scholar 

  52. Zanetti, D., Sachs, P., Capkun, S.: On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem? In: Proceedings of Privacy Enhancing Technologies Symposium (PETS), pp. 97–116 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Davide Zanetti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media New York

About this chapter

Cite this chapter

Zanetti, D., Capkun, S., Danev, B. (2016). Types and Origins of Fingerprints. In: Wang, C., Gerdes, R., Guan, Y., Kasera, S. (eds) Digital Fingerprinting. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-6601-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-6601-1_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-6599-1

  • Online ISBN: 978-1-4939-6601-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics