Abstract
Traditional methods of improving wireless network security are through software-level device identification, such as IP or MAC addresses. However, these identifiers can be easily changed by software, making wireless network communication a high risk. In response to these risks, radio frequency fingerprinting technology has been proposed. Since the radio frequency fingerprint is an essential feature of the physical layer of the wireless communication device and is difficult to be tampered with, it is widely used to improve the security of the wireless network. Based on the physical layer characteristics of the communication system, this paper has established a relatively complete RF fingerprint identification system to realize the identification and classification of the devices. Two signal starting point detection methods and two RF fingerprint feature extraction methods are studied in this paper. The detailed results are obtained by combining the dimensionality reduction and classification methods. Finally, an optimal identification scheme was found to achieve a classification accuracy of more than 90% when the signal-to-noise ratio is greater than 15 dB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Szu, H.H.: Novel identification of intercepted signals from unknown radio transmitters. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 2491, no. 1, pp. 504–517 (1995)
Toonstra, J., Kinsner, W.: Transient analysis and genetic algorithms for classification. In: Conference Proceedings of the IEEE Communications, Power, and Computing IEEE 1995, WESCANEX 95, vol. 2, pp. 432–437. IEEE (1995)
Desmond, L.C.C., Yuan, C.C., Tan, C.P., et al.: Identifying unique devices through wireless fingerprinting. In: ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, 31 March–April, pp. 46–55. DBLP (2008)
Gao, K., Corbett, C., Beyah, R.: A passive approach to wireless device fingerprinting. In: IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE 2010, pp. 383–392. IEEE (2010)
Gard, K.G., Larson, L.E., Steer, M.B.: The impact of RF front-end characteristics on the spectral regrowth of communications signals. IEEE Trans. Microw. Theory Tech. 53(6), 2179–2186 (2005)
Polak, A.C., Dolatshahi, S., Goeckel, D.L.: Identifying wireless users via transmitter imperfections. IEEE J. Sel. Areas Commun. 29(7), 1469–1479 (2011)
Polak, A.C., Goeckel, D.L.: RF fingerprinting of users who actively mask their identities with artificial distortion. In: Signals, Systems and Computers, IEEE 2013, pp. 270–274. IEEE (2013)
Zhao, N., Yu, F.R., Sun, H., et al.: Adaptive power allocation schemes for spectrum sharing in interference-alignment-based cognitive radio networks. IEEE Trans. Veh. Technol. 65(5), 3700–3714 (2016)
Nguyen, N.T., Zheng, G., Han, Z., et al.: Device fingerprinting to enhance wireless security using nonparametric Bayesian method. In: Proceedings IEEE, INFOCOM 2011, IEEE 2011, vol. 34, pp. 1404–1412. IEEE (2011)
Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: International Conference on Information Processing in Sensor Networks IEEE 2009, pp. 25–36. IEEE (2009)
Polak, A.C., Goeckel, D.L.: Wireless device identification based on RF oscillator imperfections. In: IEEE International Conference on Acoustics, Speech and Signal Processing IEEE, vol. 10, pp. 2492–2501. IEEE (2014)
Merchant, K., Revay, S., Stantchev, G., et al.: Deep learning for RF device fingerprinting in cognitive communication networks. IEEE J. Sel. Top. Signal Process. 12(1), 160–167 (2018)
Li, Z., Xu, W., Miller, R., et al.: Securing wireless systems via lower layer enforcements. In: ACM Workshop on Wireless Security ACM, pp. 33–42. ACM (2006)
Liang, X., Greenstein, L., Mandayam, N., et al.: Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE International Conference on Communications IEEE, pp. 4646–4651. IEEE (2009)
Tu, Y., Lin, Y., Wang, J., et al.: Semi-supervised learning with generative adversarial networks on digital signal modulation classification. CMC-Comput. Mater. Continua 55(2), 243–254 (2018)
Zhou, J.T., Zhao, H., Peng, X., et al.: Transfer hashing: from shallow to deep. IEEE Trans. Neural Netw. Learn. Syst. 29(12), 6191–6201 (2018)
Zheng, Z., Sangaiah, A.K., Wang, T.: Adaptive communication protocols in flying Ad Hoc network. IEEE Commun. Mag. 56(1), 136–142 (2018)
Acknowledgment
This work is supported by the National Natural Science Foundation of China (61771154) and the Fundamental Research Funds for the Central Universities (HEUCFG201830).
This paper is also funded by the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation.
Meantime, all the authors declare that there is no conflict of interests regarding the publication of this article.
We gratefully thank of very useful discussions of reviewers.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, Y., Chen, X., Chang, J., Lin, Y. (2019). The Physical Layer Identification of Communication Devices Based on RF-DNA. In: Liu, S., Yang, G. (eds) Advanced Hybrid Information Processing. ADHIP 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 279. Springer, Cham. https://doi.org/10.1007/978-3-030-19086-6_50
Download citation
DOI: https://doi.org/10.1007/978-3-030-19086-6_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19085-9
Online ISBN: 978-3-030-19086-6
eBook Packages: Computer ScienceComputer Science (R0)