Skip to main content
Top
Published in: Neural Computing and Applications 21/2021

25-05-2021 | Original Article

Improving security of the Internet of Things via RF fingerprinting based device identification system

Authors: Sohail Abbas, Qassim Nasir, Douae Nouichi, Mohamed Abdelsalam, Manar Abu Talib, Omnia Abu Waraga, Atta ur Rehman Khan

Published in: Neural Computing and Applications | Issue 21/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The trivial identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil attacks. To counter these attacks, various radio frequency fingerprinting-based solutions are proposed for the identification of the devices. However, these approaches use expansive devices for signal capturing and rely on high sampling rates and large feature sets for analysis. In this paper, we propose a radio frequency fingerprinting-based device identification technique. The proposed technique is tested on 4G-LTE network for combined intra and inter-manufacturer device detection. It uses low-cost software defined radio to capture smartphone emissions at a lower sampling rate, using our proposed preamble threshold-based detection algorithm. The results show that our proposed technique provides classification accuracy of 95.6% at different SNR levels.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Reinsel D, Gantz J, Rydning J (2018) The digitization of the world: from edge to core. IDC White Pap. Doc# US44413318. Viewed March Reinsel D, Gantz J, Rydning J (2018) The digitization of the world: from edge to core. IDC White Pap. Doc# US44413318. Viewed March
2.
go back to reference Aijaz A, Dohler M, Hamid Aghvami A, Friderikos V, Frodigh M (2017) Realizing the tactile internet: haptic communications over next generation 5G cellular networks. IEEE Wirel Commun 24(2):82–89CrossRef Aijaz A, Dohler M, Hamid Aghvami A, Friderikos V, Frodigh M (2017) Realizing the tactile internet: haptic communications over next generation 5G cellular networks. IEEE Wirel Commun 24(2):82–89CrossRef
3.
go back to reference Conti M, Passarella A (2018) The internet of people: a human and data-centric paradigm for the next generation internet. Comput Commun 131:51–65CrossRef Conti M, Passarella A (2018) The internet of people: a human and data-centric paradigm for the next generation internet. Comput Commun 131:51–65CrossRef
4.
go back to reference Lewis J (2018) Economic impact of cybercrime—no slowing down report. McAfee St, Clara, CA, USA Lewis J (2018) Economic impact of cybercrime—no slowing down report. McAfee St, Clara, CA, USA
6.
go back to reference Douceur JR (2002) The sybil attack. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 429. pp 251–260 Douceur JR (2002) The sybil attack. In: Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 429. pp 251–260
7.
go back to reference Abbas S, Merabti M, Llewellyn-Jones D, Kifayat K (2013) Lightweight sybil attack detection in MANETs. IEEE Syst J 7(2):236–248CrossRef Abbas S, Merabti M, Llewellyn-Jones D, Kifayat K (2013) Lightweight sybil attack detection in MANETs. IEEE Syst J 7(2):236–248CrossRef
8.
go back to reference Abbas S, Faisal M, Ur Rahman H, Zahid Khan M, Merabti M, Khan AUR (2018) Masquerading attacks detection in mobile Ad Hoc networks. IEEE Access 6:55013–55025CrossRef Abbas S, Faisal M, Ur Rahman H, Zahid Khan M, Merabti M, Khan AUR (2018) Masquerading attacks detection in mobile Ad Hoc networks. IEEE Access 6:55013–55025CrossRef
9.
go back to reference Abbas S (2019) An efficient sybil attack detection for internet of things. In: The 7th World Conference on Information Systems and Technologies (WorldCIST'19), AISC 931. Springer Nature Switzerland, Spain, pp 339–349 Abbas S (2019) An efficient sybil attack detection for internet of things. In: The 7th World Conference on Information Systems and Technologies (WorldCIST'19), AISC 931. Springer Nature Switzerland, Spain, pp 339–349
10.
go back to reference Abu Talib M, Abbas S, Nasir Q, Mowakeh MF (2018) Systematic literature review on Internet-of-Vehicles communication security. Int J Distrib Sens Netw 14(12):1–21CrossRef Abu Talib M, Abbas S, Nasir Q, Mowakeh MF (2018) Systematic literature review on Internet-of-Vehicles communication security. Int J Distrib Sens Netw 14(12):1–21CrossRef
11.
go back to reference Wang X, Hao P, Hanzo L (2016) Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag 54(6):152–158CrossRef Wang X, Hao P, Hanzo L (2016) Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag 54(6):152–158CrossRef
12.
go back to reference Suski WC, Temple MA, Mendenhall MJ, Mills RF (2008) Using spectral fingerprints to improve wireless network security. In: GLOBECOM—IEEE global telecommunications conference. pp 2185–2189 Suski WC, Temple MA, Mendenhall MJ, Mills RF (2008) Using spectral fingerprints to improve wireless network security. In: GLOBECOM—IEEE global telecommunications conference. pp 2185–2189
13.
go back to reference Nouichi D, Abdelsalam M, Nasir Q, Abbas S (2019) IoT devices security using RF fingerprinting. In: Advances in science and engineering technology international conferences, ASET 2019. pp 1–7 Nouichi D, Abdelsalam M, Nasir Q, Abbas S (2019) IoT devices security using RF fingerprinting. In: Advances in science and engineering technology international conferences, ASET 2019. pp 1–7
14.
go back to reference Kennedy IO, Scanlon P, Buddhikot MM (2008) Passive steady state RF fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. In: IEEE symposium on new Frontiers in dynamic spectrum access networks. DySPAN, pp 377–388 Kennedy IO, Scanlon P, Buddhikot MM (2008) Passive steady state RF fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. In: IEEE symposium on new Frontiers in dynamic spectrum access networks. DySPAN, pp 377–388
15.
go back to reference Padilla JL, Padilla P, Valenzuela-Valdés JF, Ramírez J, Górriz JM (2017) RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Meas J Int Meas Confed 103:379CrossRef Padilla JL, Padilla P, Valenzuela-Valdés JF, Ramírez J, Górriz JM (2017) RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Meas J Int Meas Confed 103:379CrossRef
16.
go back to reference Zanetti D, Danev B, Cǎpkun S (2010) Physical-layer identification of UHF RFID tags. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM. pp 353–364 Zanetti D, Danev B, Cǎpkun S (2010) Physical-layer identification of UHF RFID tags. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM. pp 353–364
17.
go back to reference Danev B, Heydt-Benjamin TS, Capkun S (2009) Physical-layer Identification of RFID devices. In: Proceedings of the 18th conference on USENIX security symposium. pp 199–214 Danev B, Heydt-Benjamin TS, Capkun S (2009) Physical-layer Identification of RFID devices. In: Proceedings of the 18th conference on USENIX security symposium. pp 199–214
18.
go back to reference Ellis KJ, Serinken N (2001) Characteristics of radio transmitter fingerprints. Radio Sci 36(4):585–597CrossRef Ellis KJ, Serinken N (2001) Characteristics of radio transmitter fingerprints. Radio Sci 36(4):585–597CrossRef
19.
go back to reference Lee YK, Kne M, Verbauwhede IM (2010) Secure integrated circuits and systems. Springer Lee YK, Kne M, Verbauwhede IM (2010) Secure integrated circuits and systems. Springer
20.
go back to reference Majzoobi M, Koushanfar F, Potkonjak M (2009) Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans Reconfig Technol Syst 2(1):5CrossRef Majzoobi M, Koushanfar F, Potkonjak M (2009) Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans Reconfig Technol Syst 2(1):5CrossRef
21.
go back to reference Dejean G, Kirovski D (2007) RF-DNA: Radio-frequency certificates of authenticity. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 4727, LNCS. pp 346–363 Dejean G, Kirovski D (2007) RF-DNA: Radio-frequency certificates of authenticity. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 4727, LNCS. pp 346–363
22.
go back to reference Cobb WE, Laspe ED, Baldwin RO, Temple MA, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7(1):14–24CrossRef Cobb WE, Laspe ED, Baldwin RO, Temple MA, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7(1):14–24CrossRef
23.
go back to reference Scanlon P, Kennedy IO, Liu Y (2010) Feature extraction approaches to RF fingerprinting for device identification in femtocells. Bell Labs Tech J 15(3):141–151CrossRef Scanlon P, Kennedy IO, Liu Y (2010) Feature extraction approaches to RF fingerprinting for device identification in femtocells. Bell Labs Tech J 15(3):141–151CrossRef
24.
go back to reference Williams MD, Temple MA, Reising DR (2010) Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: GLOBECOM—IEEE global telecommunications conference. pp 1–6 Williams MD, Temple MA, Reising DR (2010) Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In: GLOBECOM—IEEE global telecommunications conference. pp 1–6
25.
go back to reference Demers F, St-Hilaire M (2013) Radiometric identification of LTE transmitters. In: GLOBECOM—IEEE global telecommunications conference. pp 4116–4121 Demers F, St-Hilaire M (2013) Radiometric identification of LTE transmitters. In: GLOBECOM—IEEE global telecommunications conference. pp 4116–4121
26.
go back to reference Yuan HL, Hu AQ (2010) Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron Lett 46(16):1165–1167CrossRef Yuan HL, Hu AQ (2010) Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron Lett 46(16):1165–1167CrossRef
27.
go back to reference Klein RW, Temple MA, Mendenhall MJ (2009) Application of wavelet-based RF fingerprinting to enhance wireless network security. J Commun Networks 11(6):544–555CrossRef Klein RW, Temple MA, Mendenhall MJ (2009) Application of wavelet-based RF fingerprinting to enhance wireless network security. J Commun Networks 11(6):544–555CrossRef
28.
go back to reference Bassey J, Adesina D, Li X, Qian L, Aved A, Kroecker T (2019) Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 4th International conference on fog and mobile edge computing, FMEC 2019. pp 98–104 Bassey J, Adesina D, Li X, Qian L, Aved A, Kroecker T (2019) Intrusion detection for IoT devices based on RF fingerprinting using deep learning. In: 4th International conference on fog and mobile edge computing, FMEC 2019. pp 98–104
29.
go back to reference Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874CrossRef Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874CrossRef
30.
go back to reference Reising DR, Temple MA, Jackson JA (2015) Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans Inf Forensics Secur 10(6):1180–1192CrossRef Reising DR, Temple MA, Jackson JA (2015) Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans Inf Forensics Secur 10(6):1180–1192CrossRef
31.
go back to reference Uluagac AS, Radhakrishnan SV, Corbett C, Baca A, Beyah R (2013) A passive technique for fingerprinting wireless devices with wired-side observations. In: IEEE conference on communications and network security, CNS 2013. pp 305–313 Uluagac AS, Radhakrishnan SV, Corbett C, Baca A, Beyah R (2013) A passive technique for fingerprinting wireless devices with wired-side observations. In: IEEE conference on communications and network security, CNS 2013. pp 305–313
32.
go back to reference Xu Q, Zheng R, Saad W, Han Z (2016) Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun Surv Tutorials 18(1):94–104CrossRef Xu Q, Zheng R, Saad W, Han Z (2016) Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun Surv Tutorials 18(1):94–104CrossRef
33.
go back to reference Patel HJ, Temple MA, Baldwin RO (2015) Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans Reliab 64(1):221–233CrossRef Patel HJ, Temple MA, Baldwin RO (2015) Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans Reliab 64(1):221–233CrossRef
34.
go back to reference Tekbaş ÖH, Serinken N, Üreten O (2004) An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can J Electr Comput Eng 29(3):203–209CrossRef Tekbaş ÖH, Serinken N, Üreten O (2004) An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can J Electr Comput Eng 29(3):203–209CrossRef
35.
go back to reference Hall J, Barbeau M, Kranakis E (2006) Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In: Proceedings of the third IASTED international conference on communications and computer networks, CCN. pp 108–113 Hall J, Barbeau M, Kranakis E (2006) Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In: Proceedings of the third IASTED international conference on communications and computer networks, CCN. pp 108–113
36.
go back to reference Padilla P, Padilla JL, Valenzuela-Valdés JF (2013) Radiofrequency identification of wireless devices based on RF fingerprinting. Electron Lett 49(22):1409–1410CrossRef Padilla P, Padilla JL, Valenzuela-Valdés JF (2013) Radiofrequency identification of wireless devices based on RF fingerprinting. Electron Lett 49(22):1409–1410CrossRef
37.
go back to reference Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601CrossRef Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601CrossRef
38.
go back to reference Vo-Huu TD, Noubir G (2016) Fingerprinting Wi-Fi devices using software defined radios. In: Proceedings of the 9th ACM conference on security and privacy in wireless and mobile networks. pp 3–13 Vo-Huu TD, Noubir G (2016) Fingerprinting Wi-Fi devices using software defined radios. In: Proceedings of the 9th ACM conference on security and privacy in wireless and mobile networks. pp 3–13
39.
go back to reference Samuel JN (2018) Specific emitter identification for GSM cellular telephones. Doctoral Dissertation, University of Pretoria Samuel JN (2018) Specific emitter identification for GSM cellular telephones. Doctoral Dissertation, University of Pretoria
40.
go back to reference Ur Rehman S, Sowerby K, Coghill C (2012) RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In: Australian communications theory workshop, AusCTW’12. pp 90–95 Ur Rehman S, Sowerby K, Coghill C (2012) RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In: Australian communications theory workshop, AusCTW’12. pp 90–95
41.
go back to reference Mason A, Reece M, Claude G, Thompson W, Kornegay K (2019) Analysis of wireless signature feature sets for commercial IoT devices: invited presentation. In: 53rd Annual conference on information sciences and systems, CISS. pp 1–4 Mason A, Reece M, Claude G, Thompson W, Kornegay K (2019) Analysis of wireless signature feature sets for commercial IoT devices: invited presentation. In: 53rd Annual conference on information sciences and systems, CISS. pp 1–4
42.
go back to reference Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832–844CrossRef Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8):832–844CrossRef
44.
go back to reference Zhang T, Yang B (2016) Big data dimension reduction using PCA. In: Proceedings—IEEE international conference on smart cloud, SmartCloud 2016. pp 152–157 Zhang T, Yang B (2016) Big data dimension reduction using PCA. In: Proceedings—IEEE international conference on smart cloud, SmartCloud 2016. pp 152–157
45.
go back to reference Tian Q et al (2019) New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint. IEEE Internet Things J 6(5):7980–7987CrossRef Tian Q et al (2019) New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint. IEEE Internet Things J 6(5):7980–7987CrossRef
Metadata
Title
Improving security of the Internet of Things via RF fingerprinting based device identification system
Authors
Sohail Abbas
Qassim Nasir
Douae Nouichi
Mohamed Abdelsalam
Manar Abu Talib
Omnia Abu Waraga
Atta ur Rehman Khan
Publication date
25-05-2021
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 21/2021
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-021-06115-2

Other articles of this Issue 21/2021

Neural Computing and Applications 21/2021 Go to the issue

Premium Partner