Advertisement

Research on RF Fingerprinting Extraction of Power Amplifier Based on Multi-domain RF-DNA Fingerprint

  • Yihan XiaoEmail author
  • Xinyu Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 301)

Abstract

The uniqueness of the RF signal is caused by the difference in the hardware structure of the transmitter and the differences between the different devices. Among them, RF power amplifier is one of the key components of RF fingerprinting of wireless transmitter. It is an important breakthrough for RF fingerprint generation mechanism and individual identification. This paper proposes a new identification method of power amplifier based on new intelligent feature set, firstly, processing the received signal. The time domain, frequency domain, time-frequency domain, fractal domain transformation and feature extraction are performed. Secondly, the new intelligent feature set of each power amplifier individual can be characterized, and the RF-DNA fingerprint is visualized. Finally, the support vector machine is used to realize the individual recognition by selecting the optimal RBF kernel function. By simulating and verifying the eight power amplifier signals, a new intelligent feature set can be used to uniquely characterize the power amplifier. Under low SNR, the power amplifier individual can be quickly and effectively identified. The recognition rate of more than 80% can be achieved above the −5 dB signal-to-noise ratio.

Keywords

Individual identification RF-DNA SVM 

Notes

Acknowledgment

The authors would like to thank State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Director Fund (CEMEE2019K0101A).

References

  1. 1.
    Hall, J., Barbeau, M., Kranakis, E.: Detection of transient in radio frequency fingerprinting using signal phase. In: IASTED International Multi-conference on Wireless and Optical Communications (2003)Google Scholar
  2. 2.
    Yu, J.-B., Hu, A.-Q., Zhu, C.-M., Peng, L.-N., Jiang, Y.: RF fingerprinting extraction and identification of wireless communication devices. J. Cryptologic Res. 3(5), 433–446 (2016)Google Scholar
  3. 3.
    Toonstra, J., Nsner, W.: Transient analysis and genetic algorithms for classification. In: Communications, Power, and Computing, pp. 432–437 (1995)Google Scholar
  4. 4.
    Choe, H.C., Poole, C.E., Andrea, M.Y., et al.: Novel identification of intercepted signals from unknown radio transmitters. In: SPIE’s 1995 Symposium on OE/Aerospace Sensing and Dual Use Photonics. International Society for Optics and Photonics, pp. 504–517 (1995)Google Scholar
  5. 5.
    Kennedy, I.O., et al.: Radio transmitter fingerprinting: a steady state frequency domain approach. In: Vehicular Technology Conference, VTC 2008-Fall, pp. 1–5. IEEE (2008)Google Scholar
  6. 6.
    Klein, R.W., Temple, M.A., Mendenhall, M.J.: Application of wavelet-based RF fingerprinting to enhance wireless network security. J. Commun. Netw. 11(6), 544–555 (2012)CrossRefGoogle Scholar
  7. 7.
    Williams, M.K.D., et al.: RF-DNA fingerprinting for airport WiMax communications security. In: International Conference on Network and System Security, pp. 32–39. IEEE (2010)Google Scholar
  8. 8.
    Reising, D.R, Temple, M.A., Oxley, M.E.: Gabor-based RF-DNA fingerprinting for classifying 802.16e WiMAX mobile subscribers. In: International Conference on Computing, Networking and Communications, pp. 7–13. IEEE (2012)Google Scholar
  9. 9.
    Reising, D.R., Temple, M.A., Jackson, J.A.: Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans. Inf. Forensics Secur. 10(6), 1180–1192 (2015)CrossRefGoogle Scholar
  10. 10.
    Ru, X., Huang, Z., Liu, Z., et al.: Frequency-domain distribution and band-width of unintentional modulation on pulse. Electron. Lett. 52(22), 1853–1855 (2016)CrossRefGoogle Scholar
  11. 11.
    Ru, X.H., Liu, Z., Huang, Z.T., et al.: Evaluation of unintentional modulation for pulse compression signals based on spectrum asymmetry. IET Radar Sonar Navig. 11(4), 656–663 (2017)CrossRefGoogle Scholar
  12. 12.
    Dubendorfer, C.K., Ramsey, B.W., Temple, M.A.: An RF-DNA verification process for ZigBee networks. In: Military Communications Conference, Milcom – 2012, pp. 1–6. IEEE (2013)Google Scholar
  13. 13.
    Chen, Y., et al.: Detecting and localizing wireless spoofing attacks. In: Securing Emerging Wireless Systems, pp. 1–18. Springer, Boston (2009).  https://doi.org/10.1007/978-0-387-88491-2_8Google Scholar
  14. 14.
    Yuan, H.L.: Research on physical-layer authentication of wireless network based on RF fingerprinting. Southeast University (2011)Google Scholar
  15. 15.
    Bihl, T.J., Bauer, K.W., Temple, M.A.: Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions. IEEE Trans. Inf. Forensics Secur. 11(8), 1862–1874 (2016)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.College of Information and Communication EngineeringHarbin Engineering UniversityHarbinChina

Personalised recommendations