Abstract
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The trivial identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil attacks. To counter these attacks, various radio frequency fingerprinting-based solutions are proposed for the identification of the devices. However, these approaches use expansive devices for signal capturing and rely on high sampling rates and large feature sets for analysis. In this paper, we propose a radio frequency fingerprinting-based device identification technique. The proposed technique is tested on 4G-LTE network for combined intra and inter-manufacturer device detection. It uses low-cost software defined radio to capture smartphone emissions at a lower sampling rate, using our proposed preamble threshold-based detection algorithm. The results show that our proposed technique provides classification accuracy of 95.6% at different SNR levels.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Reinsel D, Gantz J, Rydning J (2018) The digitization of the world: from edge to core. IDC White Pap. Doc# US44413318. Viewed March
Aijaz A, Dohler M, Hamid Aghvami A, Friderikos V, Frodigh M (2017) Realizing the tactile internet: haptic communications over next generation 5G cellular networks. IEEE Wirel Commun 24(2):82–89
Conti M, Passarella A (2018) The internet of people: a human and data-centric paradigm for the next generation internet. Comput Commun 131:51–65
Lewis J (2018) Economic impact of cybercrime—no slowing down report. McAfee St, Clara, CA, USA
Official Annual Cybercrime Report Announced By Cybersecurity Ventures (2019) [Online]. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/
Douceur JR (2002) The sybil attack. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 429. pp 251–260
Abbas S, Merabti M, Llewellyn-Jones D, Kifayat K (2013) Lightweight sybil attack detection in MANETs. IEEE Syst J 7(2):236–248
Abbas S, Faisal M, Ur Rahman H, Zahid Khan M, Merabti M, Khan AUR (2018) Masquerading attacks detection in mobile Ad Hoc networks. IEEE Access 6:55013–55025
Abbas S (2019) An efficient sybil attack detection for internet of things. In: The 7th World Conference on Information Systems and Technologies (WorldCIST'19), AISC 931. Springer Nature Switzerland, Spain, pp 339–349
Abu Talib M, Abbas S, Nasir Q, Mowakeh MF (2018) Systematic literature review on Internet-of-Vehicles communication security. Int J Distrib Sens Netw 14(12):1–21
Wang X, Hao P, Hanzo L (2016) Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag 54(6):152–158
Suski WC, Temple MA, Mendenhall MJ, Mills RF (2008) Using spectral fingerprints to improve wireless network security. In: GLOBECOM—IEEE global telecommunications conference. pp 2185–2189
Nouichi D, Abdelsalam M, Nasir Q, Abbas S (2019) IoT devices security using RF fingerprinting. In: Advances in science and engineering technology international conferences, ASET 2019. pp 1–7
Kennedy IO, Scanlon P, Buddhikot MM (2008) Passive steady state RF fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. In: IEEE symposium on new Frontiers in dynamic spectrum access networks. DySPAN, pp 377–388
Padilla JL, Padilla P, Valenzuela-Valdés JF, Ramírez J, Górriz JM (2017) RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Meas J Int Meas Confed 103:379
Zanetti D, Danev B, Cǎpkun S (2010) Physical-layer identification of UHF RFID tags. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM. pp 353–364
Danev B, Heydt-Benjamin TS, Capkun S (2009) Physical-layer Identification of RFID devices. In: Proceedings of the 18th conference on USENIX security symposium. pp 199–214
Ellis KJ, Serinken N (2001) Characteristics of radio transmitter fingerprints. Radio Sci 36(4):585–597
Lee YK, Kne M, Verbauwhede IM (2010) Secure integrated circuits and systems. Springer
Majzoobi M, Koushanfar F, Potkonjak M (2009) Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans Reconfig Technol Syst 2(1):5
Dejean G, Kirovski D (2007) RF-DNA: Radio-frequency certificates of authenticity. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 4727, LNCS. pp 346–363
Cobb WE, Laspe ED, Baldwin RO, Temple MA, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7(1):14–24
Scanlon P, Kennedy IO, Liu Y (2010) Feature extraction approaches to RF fingerprinting for device identification in femtocells. Bell Labs Tech J 15(3):141–151
Williams MD, Temple MA, Reising DR (2010) Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: GLOBECOM—IEEE global telecommunications conference. pp 1–6
Demers F, St-Hilaire M (2013) Radiometric identification of LTE transmitters. In: GLOBECOM—IEEE global telecommunications conference. pp 4116–4121
Yuan HL, Hu AQ (2010) Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron Lett 46(16):1165–1167
Klein RW, Temple MA, Mendenhall MJ (2009) Application of wavelet-based RF fingerprinting to enhance wireless network security. J Commun Networks 11(6):544–555
Bassey J, Adesina D, Li X, Qian L, Aved A, Kroecker T (2019) Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 4th International conference on fog and mobile edge computing, FMEC 2019. pp 98–104
Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874
Reising DR, Temple MA, Jackson JA (2015) Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans Inf Forensics Secur 10(6):1180–1192
Uluagac AS, Radhakrishnan SV, Corbett C, Baca A, Beyah R (2013) A passive technique for fingerprinting wireless devices with wired-side observations. In: IEEE conference on communications and network security, CNS 2013. pp 305–313
Xu Q, Zheng R, Saad W, Han Z (2016) Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun Surv Tutorials 18(1):94–104
Patel HJ, Temple MA, Baldwin RO (2015) Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans Reliab 64(1):221–233
Tekbaş ÖH, Serinken N, Üreten O (2004) An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can J Electr Comput Eng 29(3):203–209
Hall J, Barbeau M, Kranakis E (2006) Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In: Proceedings of the third IASTED international conference on communications and computer networks, CCN. pp 108–113
Padilla P, Padilla JL, Valenzuela-Valdés JF (2013) Radiofrequency identification of wireless devices based on RF fingerprinting. Electron Lett 49(22):1409–1410
Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601
Vo-Huu TD, Noubir G (2016) Fingerprinting Wi-Fi devices using software defined radios. In: Proceedings of the 9th ACM conference on security and privacy in wireless and mobile networks. pp 3–13
Samuel JN (2018) Specific emitter identification for GSM cellular telephones. Doctoral Dissertation, University of Pretoria
Ur Rehman S, Sowerby K, Coghill C (2012) RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In: Australian communications theory workshop, AusCTW’12. pp 90–95
Mason A, Reece M, Claude G, Thompson W, Kornegay K (2019) Analysis of wireless signature feature sets for commercial IoT devices: invited presentation. In: 53rd Annual conference on information sciences and systems, CISS. pp 1–4
Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832–844
Hyperparameter Optimization in Classification Learner App. [Online]. Available: https://es.mathworks.com/help/stats/hyperparameter-optimization-in-classification-learner-app.html. Accessed 25 Jul 2020
Zhang T, Yang B (2016) Big data dimension reduction using PCA. In: Proceedings—IEEE international conference on smart cloud, SmartCloud 2016. pp 152–157
Tian Q et al (2019) New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint. IEEE Internet Things J 6(5):7980–7987
Acknowledgements
This research work is supported by University of Sharjah, UAE, under Grant No. 1702040389-P and 1702141143-P.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abbas, S., Nasir, Q., Nouichi, D. et al. Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput & Applic 33, 14753–14769 (2021). https://doi.org/10.1007/s00521-021-06115-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06115-2