Analysis of Impersonation Attack on RF Fingerprinting
No Thumbnail Available
Supplementary material
Other Title
Authors
Rehman, Saeed
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2013
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
Radio Frequency (RF) Fingerprinting
computer security
impersonation
computer security
impersonation
ANZSRC Field of Research Code (2020)
Citation
Rehman, S.U. (2013). Analysis of Impersonation Attack on RF Fingerprinting. Paper presented at IEEE NZ Wireless Workshop. Victoria University of Wellington, New Zealand
Abstract
Radio Frequency (RF) Fingerprinting
Research gaps
Objective
Experiment setup
Results
Conclusion
Radio fingerprinting is the process of identifying a radio transmitter by the unique characteristics present in its signal. This unique characteristics are due to the imperfections of the analog components present in the transmitter chain. RF fingerprinting is considered a secure and robust technique. However there has been very little reported investigation of the actual performance and robustness of RF fingerprinting techniques in the presence of a malicious user. The two known examples in the literature have shown that modulation-based RF fingerprinting can be easily impersonated with an accuracy of up to 100% while transient based RF fingerprinting is resilient to impersonation attack. However, the analysis was performed with only one high-end receiver and results were not validated with multiple receivers.
Publisher
Permanent link
Link to ePress publication
DOI
Copyright holder
The Author
Copyright notice
All rights reserved