Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

Loading...
Thumbnail Image
Other Title
Authors
Rehman, Saeed
Sowerby, K.W.
Coghill, Colin
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2014-05
Supervisors
Type
Journal Article
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
radio fingerprinting
impersonation attack
physical layer security
hardware security
ANZSRC Field of Research Code (2020)
Citation
Rehman, S.U., Sowerby, K., and Coghill, C. (2013). Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. Journal of Computer and System Sciences, 80 (3), 591-601.
Abstract
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.
Publisher
Academic Press
Link to ePress publication
DOI
http://dx.doi.org/10.1016/j.jcss.2013.06.013
Copyright holder
Elsevier Inc.
Copyright notice
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright license
This item appears in: