Skip to main content
Log in

Improving security of the Internet of Things via RF fingerprinting based device identification system

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The trivial identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil attacks. To counter these attacks, various radio frequency fingerprinting-based solutions are proposed for the identification of the devices. However, these approaches use expansive devices for signal capturing and rely on high sampling rates and large feature sets for analysis. In this paper, we propose a radio frequency fingerprinting-based device identification technique. The proposed technique is tested on 4G-LTE network for combined intra and inter-manufacturer device detection. It uses low-cost software defined radio to capture smartphone emissions at a lower sampling rate, using our proposed preamble threshold-based detection algorithm. The results show that our proposed technique provides classification accuracy of 95.6% at different SNR levels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Reinsel D, Gantz J, Rydning J (2018) The digitization of the world: from edge to core. IDC White Pap. Doc# US44413318. Viewed March

  2. Aijaz A, Dohler M, Hamid Aghvami A, Friderikos V, Frodigh M (2017) Realizing the tactile internet: haptic communications over next generation 5G cellular networks. IEEE Wirel Commun 24(2):82–89

    Article  Google Scholar 

  3. Conti M, Passarella A (2018) The internet of people: a human and data-centric paradigm for the next generation internet. Comput Commun 131:51–65

    Article  Google Scholar 

  4. Lewis J (2018) Economic impact of cybercrime—no slowing down report. McAfee St, Clara, CA, USA

    Google Scholar 

  5. Official Annual Cybercrime Report Announced By Cybersecurity Ventures (2019) [Online]. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/

  6. Douceur JR (2002) The sybil attack. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 429. pp 251–260

  7. Abbas S, Merabti M, Llewellyn-Jones D, Kifayat K (2013) Lightweight sybil attack detection in MANETs. IEEE Syst J 7(2):236–248

    Article  Google Scholar 

  8. Abbas S, Faisal M, Ur Rahman H, Zahid Khan M, Merabti M, Khan AUR (2018) Masquerading attacks detection in mobile Ad Hoc networks. IEEE Access 6:55013–55025

    Article  Google Scholar 

  9. Abbas S (2019) An efficient sybil attack detection for internet of things. In: The 7th World Conference on Information Systems and Technologies (WorldCIST'19), AISC 931. Springer Nature Switzerland, Spain, pp 339–349

  10. Abu Talib M, Abbas S, Nasir Q, Mowakeh MF (2018) Systematic literature review on Internet-of-Vehicles communication security. Int J Distrib Sens Netw 14(12):1–21

    Article  Google Scholar 

  11. Wang X, Hao P, Hanzo L (2016) Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag 54(6):152–158

    Article  Google Scholar 

  12. Suski WC, Temple MA, Mendenhall MJ, Mills RF (2008) Using spectral fingerprints to improve wireless network security. In: GLOBECOM—IEEE global telecommunications conference. pp 2185–2189

  13. Nouichi D, Abdelsalam M, Nasir Q, Abbas S (2019) IoT devices security using RF fingerprinting. In: Advances in science and engineering technology international conferences, ASET 2019. pp 1–7

  14. Kennedy IO, Scanlon P, Buddhikot MM (2008) Passive steady state RF fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. In: IEEE symposium on new Frontiers in dynamic spectrum access networks. DySPAN, pp 377–388

  15. Padilla JL, Padilla P, Valenzuela-Valdés JF, Ramírez J, Górriz JM (2017) RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Meas J Int Meas Confed 103:379

    Article  Google Scholar 

  16. Zanetti D, Danev B, Cǎpkun S (2010) Physical-layer identification of UHF RFID tags. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM. pp 353–364

  17. Danev B, Heydt-Benjamin TS, Capkun S (2009) Physical-layer Identification of RFID devices. In: Proceedings of the 18th conference on USENIX security symposium. pp 199–214

  18. Ellis KJ, Serinken N (2001) Characteristics of radio transmitter fingerprints. Radio Sci 36(4):585–597

    Article  Google Scholar 

  19. Lee YK, Kne M, Verbauwhede IM (2010) Secure integrated circuits and systems. Springer

    Google Scholar 

  20. Majzoobi M, Koushanfar F, Potkonjak M (2009) Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans Reconfig Technol Syst 2(1):5

    Article  Google Scholar 

  21. Dejean G, Kirovski D (2007) RF-DNA: Radio-frequency certificates of authenticity. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 4727, LNCS. pp 346–363

  22. Cobb WE, Laspe ED, Baldwin RO, Temple MA, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7(1):14–24

    Article  Google Scholar 

  23. Scanlon P, Kennedy IO, Liu Y (2010) Feature extraction approaches to RF fingerprinting for device identification in femtocells. Bell Labs Tech J 15(3):141–151

    Article  Google Scholar 

  24. Williams MD, Temple MA, Reising DR (2010) Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: GLOBECOM—IEEE global telecommunications conference. pp 1–6

  25. Demers F, St-Hilaire M (2013) Radiometric identification of LTE transmitters. In: GLOBECOM—IEEE global telecommunications conference. pp 4116–4121

  26. Yuan HL, Hu AQ (2010) Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron Lett 46(16):1165–1167

    Article  Google Scholar 

  27. Klein RW, Temple MA, Mendenhall MJ (2009) Application of wavelet-based RF fingerprinting to enhance wireless network security. J Commun Networks 11(6):544–555

    Article  Google Scholar 

  28. Bassey J, Adesina D, Li X, Qian L, Aved A, Kroecker T (2019) Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 4th International conference on fog and mobile edge computing, FMEC 2019. pp 98–104

  29. Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874

    Article  Google Scholar 

  30. Reising DR, Temple MA, Jackson JA (2015) Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans Inf Forensics Secur 10(6):1180–1192

    Article  Google Scholar 

  31. Uluagac AS, Radhakrishnan SV, Corbett C, Baca A, Beyah R (2013) A passive technique for fingerprinting wireless devices with wired-side observations. In: IEEE conference on communications and network security, CNS 2013. pp 305–313

  32. Xu Q, Zheng R, Saad W, Han Z (2016) Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun Surv Tutorials 18(1):94–104

    Article  Google Scholar 

  33. Patel HJ, Temple MA, Baldwin RO (2015) Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans Reliab 64(1):221–233

    Article  Google Scholar 

  34. Tekbaş ÖH, Serinken N, Üreten O (2004) An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can J Electr Comput Eng 29(3):203–209

    Article  Google Scholar 

  35. Hall J, Barbeau M, Kranakis E (2006) Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In: Proceedings of the third IASTED international conference on communications and computer networks, CCN. pp 108–113

  36. Padilla P, Padilla JL, Valenzuela-Valdés JF (2013) Radiofrequency identification of wireless devices based on RF fingerprinting. Electron Lett 49(22):1409–1410

    Article  Google Scholar 

  37. Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601

    Article  Google Scholar 

  38. Vo-Huu TD, Noubir G (2016) Fingerprinting Wi-Fi devices using software defined radios. In: Proceedings of the 9th ACM conference on security and privacy in wireless and mobile networks. pp 3–13

  39. Samuel JN (2018) Specific emitter identification for GSM cellular telephones. Doctoral Dissertation, University of Pretoria

    Google Scholar 

  40. Ur Rehman S, Sowerby K, Coghill C (2012) RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In: Australian communications theory workshop, AusCTW’12. pp 90–95

  41. Mason A, Reece M, Claude G, Thompson W, Kornegay K (2019) Analysis of wireless signature feature sets for commercial IoT devices: invited presentation. In: 53rd Annual conference on information sciences and systems, CISS. pp 1–4

  42. Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832–844

    Article  Google Scholar 

  43. Hyperparameter Optimization in Classification Learner App. [Online]. Available: https://es.mathworks.com/help/stats/hyperparameter-optimization-in-classification-learner-app.html. Accessed 25 Jul 2020

  44. Zhang T, Yang B (2016) Big data dimension reduction using PCA. In: Proceedings—IEEE international conference on smart cloud, SmartCloud 2016. pp 152–157

  45. Tian Q et al (2019) New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint. IEEE Internet Things J 6(5):7980–7987

    Article  Google Scholar 

Download references

Acknowledgements

This research work is supported by University of Sharjah, UAE, under Grant No. 1702040389-P and 1702141143-P.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohail Abbas.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abbas, S., Nasir, Q., Nouichi, D. et al. Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput & Applic 33, 14753–14769 (2021). https://doi.org/10.1007/s00521-021-06115-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-06115-2

Keywords

Navigation