Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Radio-Frequency Fingerprinting-Based Physical Layer Identification

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_295-1

Synonyms

Definitions

Physical layer identification (PLI) is the user device identification strategy based on the physical features of the wireless device. Radio-frequency fingerprinting is one of the most important PLI techniques that utilize the uniqueness in the waveform of the wireless signals emitted by the device to be identified.

Background

The wireless access to restricted networks, such as in enterprise or government, can grant great convenience and efficiency to the employees and visitors. However, the broadcasting nature of wireless communications brings significant secure risks, especially in the networks with sensitive data. Without the binding of wired connections, it is much easier for adversary to obtain security credentials from legitimate users through the wireless channel. Therefore, it is important to authenticate users not only by what they hold (e.g., logical level ID or pre-shared key) but also by what they are,...

This is a preview of subscription content, log in to check access.

References

  1. Brik V, Banerjee S, Gruteser M, Oh S (2008) Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM international conference on mobile computing and networking, ACM, pp 116–127Google Scholar
  2. D’Apuzzo M, D’Arco M, Liccardo A, Vadursi M (2010) Modeling DAC output waveforms. IEEE Trans Instrum Meas 59(11):2854–2862CrossRefGoogle Scholar
  3. Danev B, Capkun S (2009) Transient-based identification of wireless sensor nodes. In: Proceedings of the 2009 international conference on information processing in sensor networks, IEEE Computer Society, pp 25–36Google Scholar
  4. Danev B, Heydt-Benjamin TS, Capkun S (2009) Physical-layer identification of RFID devices. In: Usenix security symposium, pp 199–214Google Scholar
  5. Danev B, Zanetti D, Capkun S (2012) On physical-layer identification of wireless devices. ACM Comput Surv (CSUR) 45(1):6CrossRefGoogle Scholar
  6. Gharaibeh KM (2011) Nonlinear distortion in wireless systems: modeling and simulation with Matlab. WileyGoogle Scholar
  7. Hall J, Barbeau M, Kranakis E (2004) Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In: Communications, internet, and information technology, pp 201–206Google Scholar
  8. Jana S, Kasera SK (2010) On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans Mob Comput 9(3):449–462CrossRefGoogle Scholar
  9. Klein RW, Temple MA, Mendenhall MJ, Reising DR (2009) Sensitivity analysis of burst detection and RF fingerprinting classification performance. In: Communications, 2009. ICC’09. IEEE international conference on, IEEE, pp 1–5Google Scholar
  10. Levine RY, Khuon TS (1992) Training-set-based performance measures for data-adaptive decisioning systems. In: San Diego’92, International society for optics and photonics, pp 518–528Google Scholar
  11. Li Z, Xu W, Miller R, Trappe W (2006) Securing wireless systems via lower layer enforcements. In: Proceedings of the 5th ACM workshop on wireless security, ACM, pp 33–42Google Scholar
  12. Liu MW, Doherty JF (2008) Specific emitter identification using nonlinear device estimation. In: Sarnoff symposium, 2008 IEEE, IEEE, pp 1–5Google Scholar
  13. Polak AC, Goeckel DL (2011) RF fingerprinting of users who actively mask their identities with artificial distortion. In: Signals, systems and computers (ASILOMAR), 2011 conference record of the forty fifth asilomar conference on, IEEE, pp 270–274Google Scholar
  14. Polak AC, Dolatshahi S, Goeckel DL (2011) Identifying wireless users via transmitter imperfections. IEEE J Sel Areas Commun 29(7):1469–1479CrossRefGoogle Scholar
  15. Rehman SU, Sowerby K, Coghill C (2012a) RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In: Communications theory workshop (AusCTW), 2012 Australian, IEEE, pp 90–95Google Scholar
  16. Rehman SU, Sowerby K, Coghill C, Holmes W (2012b) The analysis of RF fingerprinting for low- end wireless receivers with application to IEEE 802.11 a. In: Mobile and wireless networking (iCOST), 2012 international conference on selected topics in, IEEE, pp 24–29Google Scholar
  17. Suski WC, Temple MA, Mendenhall MJ, Mills RF (2008) Using spectral fingerprints to improve wireless network security. In: Global telecommunications conference, 2008. IEEE GLOBE-COM 2008. IEEE, IEEE, pp 1–5Google Scholar
  18. Toonstra J, Kinsner W (1995) Transient analysis and genetic algorithms for classification. In: WES- CANEX 95. Communications, power, and computing. Conference proceedings., IEEE, IEEE, vol 2, pp 432–437Google Scholar
  19. Toonstra J, Kinsner W (1996) A radio transmitter fingerprinting system odo-1. In: Electrical and computer engineering, 1996. Canadian conference on, IEEE, vol 1, pp 60–63Google Scholar
  20. Xiao L, Greenstein L, Mandayam N, Trappe W (2007) Fingerprints in the ether: Using the physical layer for wireless authentication. In: Communications, 2007. ICC’07. IEEE international conference on, IEEE, pp 4646–4651Google Scholar
  21. Zanetti D, Danev B, et al (2010) Physical-layer identification of uhf RFID tags. In: Proceedings of the sixteenth annual international conference on mobile computing and networking, ACM, pp 353–364Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Electrical EngineeringUniversity at Buffalo, The State University of New YorkBuffaloUSA

Section editors and affiliations

  • Kui Ren

There are no affiliations available