Abstract
We present a systematic review of physical-layer identification systems and provide a summary of current state-of-the-art techniques. We further review the types of fingerprints that were discussed in prior work and highlight issues that are still open and need to be addressed in future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This work is largely based on [8].
- 2.
MIMO refers to multiple-input and multiple-output. Such wireless systems use multiple antennas for transmitting and receiving for the purpose of improving communication performance.
References
Bishop, C.: Pattern Recognition and Machine Learning. Springer (2006)
Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer (2003)
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 116–127 (2008)
Choe, H., Poole, C., Yu, A., Szu, H.: Novel identification of intercepted signals for unknown radio transmitters. Proc. SPIE 2491, 504–517 (1995)
Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: Proceeding of ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), pp. 25–36 (2009)
Danev, B., Heydt-Benjamin, T.S., Capkun, S.: Physical-layer identification of RFID devices. In: Proceedings of USENIX Security Symposium, pp. 199–214 (2009)
Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: Proceedings of ACM Conference on Wireless Network Security (WiSec), pp. 89–98 (2010)
Danev, B., Zanetti, D., Capkun, S.: On physical-layer identification of wireless devices. ACM Comput. Surv. 45(1), 6:1–6:29 (2012)
Edman, M., Yener, B.: Active attacks against modulation-based radiometric identification. Technical report 09-02, Rensselaer Institute of Technology (August 2009)
Ellis, K., Serinken, N.: Characteristics of radio transmitter fingerprints. Radio Sci. 36, 585–597 (2001)
EPCglobal: UHF Class 1 Gen 2 standard v. 1.2.0 (2008)
Ettus, M.: Universal software defined radio (USRP) (2007). http://www.ettus.com/
FVC: Fingerprint Verification Competition FVC (2006). http://bias.csr.uni-bo.it/fvc2006/
Hall, J.: Detection of rogue devices in wireless networks. Ph.D. thesis (2006)
Hall, J., Barbeau, M., Kranakis, E.: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In: Proceedings of Communications, Internet, and Information Technology (CIIT), pp. 201–206 (2004)
Hall, J., Barbeau, M., Kranakis, E.: Radio frequency fingerprinting for intrusion detection in wireless networks. Manuscript (2005). http://wiki.uni.lu/secan-lab/Hall2005.html
Hall, J., Barbeau, M., Kranakis, E.: Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting. In: Proceedings of IASTED International Conference on Communications and Computer Networks (CCN), pp. 108–113 (2006)
Hippenstiel, R., Payal, Y.: Wavelet based transmitter identification. In: Proceedings of International Symposium on Signal Processing and Its Applications (ISSPA), pp. 740–742 (1996)
Jain, A., Zongker, D.: Feature selection: evaluation, application, and small sample performance. IEEE Trans. Pattern Anal. Mach. Intell. 19(2), 153–158 (1997)
Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: a review. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 4–37 (2000)
Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 104–115 (2008)
Jones, R.: Most Secret War: British Scientific Intelligence 1939–1945. Hamish Hamilton (1978)
Kaplan, D., Stanhope, D.: Waveform collection for use in wireless telephone identification. US Patent 5999806 (1999)
Kittler, J., Hatef, M., Duin, R., Matas, J.: On combining classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 20(3), 226–239 (1998)
Klein, R.W., Temple, A., Mendenhall, M.J.: Application of wavelet-based RF fingerprinting to enhance wireless network security. Secur. Commun. Netw. 11(6), 544–555 (2009)
Klein, R.W., Temple, M.A., Mendenhall, M.J.: Application of wavelet denoising to improve OFDM-based signal detection and classification. Secur. Commun. Netw. 3(1), 71–82 (2010)
Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)
Margerum, D.: Pinpointing Location Of Hostile Radars. Microwaves (1969)
Mitra, M.: Privacy for RFID systems to prevent tracking and cloning. Int. J. Comput. Sci. Netw. Secur. 8(1), 1–5 (2008)
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 99–110 (2007)
Periaswamy, S.C.G., Thompson, D., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable Secure Comput. 8(6), 938–943 (2011)
Periaswamy, S.C.G., Thompson, D.R., Romero, H.P.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proceedings of Workshop on RFID Security (RFIDSec Asia) (2010)
Rasmussen, K., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of International ICST Conference on Security and Privacy in Communication Networks (SecureComm) (2007)
Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improved wireless security for GMSK-based devices using RF fingerprinting. Int. J. Electron. Secur. Digit. Forensics 3(1), 41–59 (2010)
Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improving intra-cellular security using air monitoring with RF fingerprints. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC) (2010)
Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microwave Theory Tech. 57(5), 1383–1387 (2009)
Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Microw. Theory Tech. 58(7), 1758–1765 (2010)
Ross, A., Jain, A.: Multimodal biometrics: an overview. In: Proceedings of European Signal Processing Conference (EUSIPCO), pp. 1221–1224 (2004)
Shaw, D., Kinsner, W.: Multifractal modeling of radio transmitter transients for classification. In: Proceedings of IEEE Conference on Communications, Power and Computing (WESCANEX), pp. 306–312 (1997)
Suski, W., Temple, M., Mendenhall, M., Mills, R.: Using spectral fingerprints to improve wireless network security. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–5 (2008)
Suski, W.C., Temple, M.A., Mendenhall, M.J., Mills, R.F.: Radio frequency fingerprinting commercial communication devices to enhance electronic security. Int. J. Electron. Secur. Digital Forensics 1(3), 301–322 (2008)
Tekbas, O., Ureten, O., Serinken, N.: An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can. J. Electr. Comput. Eng. 29(3), 203–209 (2004)
Tekbas, O., Ureten, O., Serinken, N.: Improvement of transmitter identification system for low SNR transients. Electron. Lett. 40(3), 182–183 (2004)
Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., Capkun, S.: Attacks on public WLAN-based positioning. In: Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 29–40 (2009)
Toonstra, J., Kinsner, W.: Transient analysis and genetic algorithms for classification. In: Proceedings of IEEE Conference on Communications, Power, and Computing (WESCANEX), pp. 432–437, vol. 2 (1995)
Toonstra, J., Kinsner, W.: A radio transmitter fingerprinting system ODO-1. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, pp. 60–63, vol. 1 (1996)
Ureten, O., Serinken, N.: Detection of radio transmitter turn-on transients. Electron. Lett. 35, 1996–1997 (2007)
Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Can. J. Electr. Comput. Eng. 32(1), 27–33 (2007)
Wang, B., Omatu, S., Abe, T.: Identification of the defective transmission devices using the wavelet transform. IEEE Trans. Pattern Anal. Mach. Intell. 27(6), 696–710 (2005)
Williams, M., Temple, M., Reising, D.: Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (2010)
Zanetti, D., Danev, B., Capkun, S.: Physical-layer identification of UHF RFID tags. In: Proceedings of ACM Conference on Mobile Computing and Networking (MOBICOM), pp. 353–364 (2010)
Zanetti, D., Sachs, P., Capkun, S.: On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem? In: Proceedings of Privacy Enhancing Technologies Symposium (PETS), pp. 97–116 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media New York
About this chapter
Cite this chapter
Zanetti, D., Capkun, S., Danev, B. (2016). Types and Origins of Fingerprints. In: Wang, C., Gerdes, R., Guan, Y., Kasera, S. (eds) Digital Fingerprinting. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-6601-1_2
Download citation
DOI: https://doi.org/10.1007/978-1-4939-6601-1_2
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-6599-1
Online ISBN: 978-1-4939-6601-1
eBook Packages: Computer ScienceComputer Science (R0)