• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analysis of Impersonation Attack on RF Fingerprinting

    Rehman, Saeed

    Thumbnail
    Share
    View fulltext online
    saeed_IEEE NZ wireless workshop 2013.pptx (1.694Mb)
    Date
    2013
    Citation:
    Rehman, S.U. (2013). Analysis of Impersonation Attack on RF Fingerprinting. Paper presented at IEEE NZ Wireless Workshop. Victoria University of Wellington, New Zealand
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/2911
    Abstract
    Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its signal. This unique characteristics are due to the imperfections of the analog components present in the transmitter chain. RF fingerprinting is considered a secure and robust technique. However there has been very little reported investigation of the actual performance and robustness of RF fingerprinting techniques in the presence of a malicious user. The two known examples in the literature have shown that modulation-based RF fingerprinting can be easily impersonated with an accuracy of up to 100% while transient based RF fingerprinting is resilient to impersonation attack. However, the analysis was performed with only one high-end receiver and results were not validated with multiple receivers.
    Keywords:
    Radio Frequency (RF) Fingerprinting, computer security, impersonation
    ANZSRC Field of Research:
    080303 Computer System Security
    Copyright Holder:
    The Author

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [150]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga