Skip to main content
Erschienen in: The Journal of Supercomputing 6/2019

15.12.2017

The individual identification method of wireless device based on dimensionality reduction and machine learning

verfasst von: Yun Lin, Xiaolei Zhu, Zhigao Zheng, Zheng Dou, Ruolin Zhou

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The access security of wireless devices is a serious challenge in present wireless network security. Radio frequency (RF) fingerprint recognition technology as an important non-password authentication technology attracts more and more attention, because of its full use of radio frequency characteristics that cannot be imitated to achieve certification. In this paper, a RF fingerprint identification method based on dimensional reduction and machine learning is proposed as a component of intrusion detection for resolving authentication security issues. We compare three kinds of dimensional reduction methods, which are the traditional PCA, RPCA and KPCA. And we take random forests, support vector machine, artificial neural network and grey correlation analysis into consideration to make decisions on the dimensional reduction data. Finally, we obtain the recognition system with the best performance. Using a combination of RPCA and random forests, we achieve 90% classification accuracy is achieved at SNR \(\ge \) 10 dB when reduced dimension is 76. The proposed method improves wireless device authentication and improves security protection due to the introduction of RF fingerprinting.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Benitez D, Gaydecki P, Zaidi A, Fitzpatrick A (2001) The use of the hilbert transform in ecg signal analysis. Comput Biol Med 31(5):399–406 Benitez D, Gaydecki P, Zaidi A, Fitzpatrick A (2001) The use of the hilbert transform in ecg signal analysis. Comput Biol Med 31(5):399–406
2.
Zurück zum Zitat Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for rf fingerprinting with multiple discriminant analysis and using zigbee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874 Bihl TJ, Bauer KW, Temple MA (2016) Feature selection for rf fingerprinting with multiple discriminant analysis and using zigbee device emissions. IEEE Trans Inf Forensics Secur 11(8):1862–1874
3.
Zurück zum Zitat Breiman L (2001) Random forests. Mach Learn 45(1):5–32MATH Breiman L (2001) Random forests. Mach Learn 45(1):5–32MATH
4.
Zurück zum Zitat Campbell-Washburn AE, Atkinson D, Nagy Z, Chan RW, Josephs O, Lythgoe MF, Ordidge RJ, Thomas DL (2016) Using the robust principal component analysis algorithm to remove rf spike artifacts from mr images. Magn Reson Med 75(6):2517–2525 Campbell-Washburn AE, Atkinson D, Nagy Z, Chan RW, Josephs O, Lythgoe MF, Ordidge RJ, Thomas DL (2016) Using the robust principal component analysis algorithm to remove rf spike artifacts from mr images. Magn Reson Med 75(6):2517–2525
5.
6.
Zurück zum Zitat Chen Y, Trappe W, Martin RP (2007) Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp 193–202 Chen Y, Trappe W, Martin RP (2007) Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp 193–202
7.
Zurück zum Zitat Cobb WE, Garcia EW, Temple MA, Baldwin RO, Kim YC (2010) Physical layer identification of embedded devices using rf-dna fingerprinting. In: Military Communications Conference, 2010-MILCOM 2010. IEEE, pp 2168–2173 Cobb WE, Garcia EW, Temple MA, Baldwin RO, Kim YC (2010) Physical layer identification of embedded devices using rf-dna fingerprinting. In: Military Communications Conference, 2010-MILCOM 2010. IEEE, pp 2168–2173
8.
Zurück zum Zitat Danev B, Luecken H, Capkun S, El Defrawy K (2010) Attacks on physical-layer identification. In: Proceedings of the Third ACM Conference on Wireless Network Security. ACM, pp 89–98 Danev B, Luecken H, Capkun S, El Defrawy K (2010) Attacks on physical-layer identification. In: Proceedings of the Third ACM Conference on Wireless Network Security. ACM, pp 89–98
9.
Zurück zum Zitat Dener M (2014) Security analysis in wireless sensor networks. Int J Distrib Sens Netw 10(10):303,501 Dener M (2014) Security analysis in wireless sensor networks. Int J Distrib Sens Netw 10(10):303,501
10.
Zurück zum Zitat Deng S, Huang Z, Wang X, Huang G (2017) Radio frequency fingerprint extraction based on multidimension permutation entropy. Int J Antennas Propag 2017:1–6 Deng S, Huang Z, Wang X, Huang G (2017) Radio frequency fingerprint extraction based on multidimension permutation entropy. Int J Antennas Propag 2017:1–6
11.
Zurück zum Zitat Ding G, Wang J, Wu Q, Yao YD, Song F, Tsiftsis TA (2015) Cellular-base-station-assisted device-to-device communications in tv white space. IEEE J Sel Areas Commun 34(1):107–121 Ding G, Wang J, Wu Q, Yao YD, Song F, Tsiftsis TA (2015) Cellular-base-station-assisted device-to-device communications in tv white space. IEEE J Sel Areas Commun 34(1):107–121
12.
Zurück zum Zitat Hall J, Barbeau M, Kranakis E (2005) Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Trans Defendable Secur Comput 12:1–35 Hall J, Barbeau M, Kranakis E (2005) Radio frequency fingerprinting for intrusion detection in wireless networks. IEEE Trans Defendable Secur Comput 12:1–35
13.
Zurück zum Zitat Hall J, Barbeau M, Kranakis E (2003) Detection of transient in radio frequency fingerprinting using signal phase. Wirel Opt Commun, pp 13–18 Hall J, Barbeau M, Kranakis E (2003) Detection of transient in radio frequency fingerprinting using signal phase. Wirel Opt Commun, pp 13–18
14.
Zurück zum Zitat Ho CY, Lin ZC (2003) Analysis and application of grey relation and anova in chemical-mechanical polishing process parameters. Int J Adv Manuf Technol 21(1):10–14 Ho CY, Lin ZC (2003) Analysis and application of grey relation and anova in chemical-mechanical polishing process parameters. Int J Adv Manuf Technol 21(1):10–14
15.
Zurück zum Zitat Hsu KI, Gupta HV, Sorooshian S (1995) Artificial neural network modeling of the rainfall-runoff process. Water Resour Res 31(10):2517–2530 Hsu KI, Gupta HV, Sorooshian S (1995) Artificial neural network modeling of the rainfall-runoff process. Water Resour Res 31(10):2517–2530
16.
Zurück zum Zitat Huang PS, Chen SD, Smaragdis P, Hasegawa-Johnson M (2012) Singing-voice separation from monaural recordings using robust principal component analysis. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 57–60 Huang PS, Chen SD, Smaragdis P, Hasegawa-Johnson M (2012) Singing-voice separation from monaural recordings using robust principal component analysis. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 57–60
17.
Zurück zum Zitat Jana S, Kasera SK (2010) On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans Mob Comput 9(3):449–462 Jana S, Kasera SK (2010) On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans Mob Comput 9(3):449–462
18.
Zurück zum Zitat Jia-Bao YU, Ai-Qun HU, Zhu CM, Peng LN, Jiang Y (2016) Rf fingerprinting extraction and identification of wireless communication devices. J Cryptol Res 3(5):433–446 Jia-Bao YU, Ai-Qun HU, Zhu CM, Peng LN, Jiang Y (2016) Rf fingerprinting extraction and identification of wireless communication devices. J Cryptol Res 3(5):433–446
19.
Zurück zum Zitat Kim KI, Jung K, Kim HJ (2002) Face recognition using kernel principal component analysis. IEEE Signal Process Lett 9(2):40–42 Kim KI, Jung K, Kim HJ (2002) Face recognition using kernel principal component analysis. IEEE Signal Process Lett 9(2):40–42
20.
Zurück zum Zitat Konar P, Chattopadhyay P (2015) Multi-class fault diagnosis of induction motor using hilbert and wavelet transform. Appl Soft Comput 30:341–352 Konar P, Chattopadhyay P (2015) Multi-class fault diagnosis of induction motor using hilbert and wavelet transform. Appl Soft Comput 30:341–352
21.
Zurück zum Zitat Kou G, Lu Y, Peng Y, Shi Y (2012) Evaluation of classification algorithms using mcdm and rank correlation. Int J Inf Technol Decision Mak 11(01):197–225 Kou G, Lu Y, Peng Y, Shi Y (2012) Evaluation of classification algorithms using mcdm and rank correlation. Int J Inf Technol Decision Mak 11(01):197–225
22.
Zurück zum Zitat Kuklik P, Zeemering S, Maesen B, Maessen J, Crijns HJ, Verheule S, Ganesan AN, Schotten U (2015) Reconstruction of instantaneous phase of unipolar atrial contact electrogram using a concept of sinusoidal recomposition and hilbert transform. IEEE Trans Biomed Eng 62(1):296–302 Kuklik P, Zeemering S, Maesen B, Maessen J, Crijns HJ, Verheule S, Ganesan AN, Schotten U (2015) Reconstruction of instantaneous phase of unipolar atrial contact electrogram using a concept of sinusoidal recomposition and hilbert transform. IEEE Trans Biomed Eng 62(1):296–302
23.
Zurück zum Zitat Lee JM, Yoo C, Choi SW, Vanrolleghem PA, Lee IB (2004) Nonlinear process monitoring using kernel principal component analysis. Chem Eng Sci 59(1):223–234 Lee JM, Yoo C, Choi SW, Vanrolleghem PA, Lee IB (2004) Nonlinear process monitoring using kernel principal component analysis. Chem Eng Sci 59(1):223–234
24.
Zurück zum Zitat Li J (2015) A new robust signal recognition approach based on holder cloud features under varying snr environment. Ksii Trans Internet Inf Syst 9(12):4934–4949 Li J (2015) A new robust signal recognition approach based on holder cloud features under varying snr environment. Ksii Trans Internet Inf Syst 9(12):4934–4949
25.
Zurück zum Zitat Liang RH (1999) Application of grey relation analysis to hydroelectric generation scheduling. Int J Electr Power Energy Syst 21(5):357–364 Liang RH (1999) Application of grey relation analysis to hydroelectric generation scheduling. Int J Electr Power Energy Syst 21(5):357–364
26.
Zurück zum Zitat Liaw A, Wiener M et al (2002) Classification and regression by randomforest. R News 2(3):18–22 Liaw A, Wiener M et al (2002) Classification and regression by randomforest. R News 2(3):18–22
27.
Zurück zum Zitat Lin SJ, Lu I, Lewis C (2007) Grey relation performance correlations among economics, energy use and carbon dioxide emission in taiwan. Energy Policy 35(3):1948–1955 Lin SJ, Lu I, Lewis C (2007) Grey relation performance correlations among economics, energy use and carbon dioxide emission in taiwan. Energy Policy 35(3):1948–1955
28.
Zurück zum Zitat Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126–143 Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng 58:126–143
29.
Zurück zum Zitat Patel H (2015) Non-parametric feature generation for rf-fingerprinting on zigbee devices, pp 1–5 Patel H (2015) Non-parametric feature generation for rf-fingerprinting on zigbee devices, pp 1–5
30.
31.
Zurück zum Zitat Qiu T, Zhang Y, Qiao D, Zhang X, Wymore ML, Sangaiah AK (2017) A robust time synchronization scheme for industrial internet of things. IEEE Trans Ind Inform 99:1 Qiu T, Zhang Y, Qiao D, Zhang X, Wymore ML, Sangaiah AK (2017) A robust time synchronization scheme for industrial internet of things. IEEE Trans Ind Inform 99:1
32.
Zurück zum Zitat Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using rf fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601MATH Rehman SU, Sowerby KW, Coghill C (2014) Analysis of impersonation attacks on systems using rf fingerprinting and low-end receivers. J Comput Syst Sci 80(3):591–601MATH
33.
Zurück zum Zitat Rodriguez-Galiano V, Chica-Olmo M, Abarca-Hernandez F, Atkinson PM, Jeganathan C (2012) Random forest classification of mediterranean land cover using multi-seasonal imagery and multi-seasonal texture. Remote Sens Environ 121:93–107 Rodriguez-Galiano V, Chica-Olmo M, Abarca-Hernandez F, Atkinson PM, Jeganathan C (2012) Random forest classification of mediterranean land cover using multi-seasonal imagery and multi-seasonal texture. Remote Sens Environ 121:93–107
34.
Zurück zum Zitat Rostami AS, Badkoobe M, Mohanna F, Keshavarz H, Hosseinabadi AAR, Sangaiah AK (2017) Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J Supercomput 13:1–47 Rostami AS, Badkoobe M, Mohanna F, Keshavarz H, Hosseinabadi AAR, Sangaiah AK (2017) Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J Supercomput 13:1–47
35.
Zurück zum Zitat Rostami H, Blue J, Yugma C (2017) Equipment condition diagnosis and fault fingerprint extraction in semiconductor manufacturing. In: IEEE International Conference on Machine Learning and Applications. IEEE, pp 534–539 Rostami H, Blue J, Yugma C (2017) Equipment condition diagnosis and fault fingerprint extraction in semiconductor manufacturing. In: IEEE International Conference on Machine Learning and Applications. IEEE, pp 534–539
36.
Zurück zum Zitat Schölkopf B, Smola A, Müller KR (1997) Kernel principal component analysis. In: International Conference on Artificial Neural Networks. Springer, pp 583–588 Schölkopf B, Smola A, Müller KR (1997) Kernel principal component analysis. In: International Conference on Artificial Neural Networks. Springer, pp 583–588
37.
Zurück zum Zitat Shahid N, Kalofolias V, Bresson X, Bronstein M, Vandergheynst P (2016) Robust principal component analysis? In: IEEE International Conference on Computer Vision. IEEE, pp 2812–2820 Shahid N, Kalofolias V, Bresson X, Bronstein M, Vandergheynst P (2016) Robust principal component analysis? In: IEEE International Conference on Computer Vision. IEEE, pp 2812–2820
38.
Zurück zum Zitat Sheng Y, Tan K, Chen G, Kotz D, Campbell A (2008) Detecting 802.11 mac layer spoofing using received signal strength. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp 1768–1776 Sheng Y, Tan K, Chen G, Kotz D, Campbell A (2008) Detecting 802.11 mac layer spoofing using received signal strength. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp 1768–1776
39.
Zurück zum Zitat Shifei D, Bingjuan Q, Hongyan T et al (2011) An overview on theory and algorithm of support vector machines. J Univ Electron Sci Technol China 40(1):2–10 Shifei D, Bingjuan Q, Hongyan T et al (2011) An overview on theory and algorithm of support vector machines. J Univ Electron Sci Technol China 40(1):2–10
40.
Zurück zum Zitat Sun M, Zhang L, Bao J, Yan Y (2017) Rf fingerprint extraction for GNSS anti-spoofing using axial integrated wigner bispectrum. J Inf Secur Appl 35:51–54 Sun M, Zhang L, Bao J, Yan Y (2017) Rf fingerprint extraction for GNSS anti-spoofing using axial integrated wigner bispectrum. J Inf Secur Appl 35:51–54
41.
Zurück zum Zitat Tang G, Nehorai A (2011) Constrained cramrrao bound on robust principal component analysis. IEEE Trans Signal Process 59(10):5070–5076MathSciNetMATH Tang G, Nehorai A (2011) Constrained cramrrao bound on robust principal component analysis. IEEE Trans Signal Process 59(10):5070–5076MathSciNetMATH
42.
Zurück zum Zitat Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2(Nov):45–66MATH Tong S, Koller D (2001) Support vector machine active learning with applications to text classification. J Mach Learn Res 2(Nov):45–66MATH
43.
Zurück zum Zitat Toonstra J, Kinsner W (1995) Transient analysis and genetic algorithms for classification. In: IEEE WESCANEX 95: Communications, Power, and Computing: Conference Proceedings. IEEE, vol 2, pp 432–437 Toonstra J, Kinsner W (1995) Transient analysis and genetic algorithms for classification. In: IEEE WESCANEX 95: Communications, Power, and Computing: Conference Proceedings. IEEE, vol 2, pp 432–437
44.
Zurück zum Zitat Ureten O, Serinken N (2007) Wireless security through rf fingerprinting. Can J Electr Comput Eng 32(1):27–33 Ureten O, Serinken N (2007) Wireless security through rf fingerprinting. Can J Electr Comput Eng 32(1):27–33
45.
Zurück zum Zitat Uzundurukan E, Ali AM, Kara A (2017) Design of low-cost modular rf front end for rf fingerprinting of bluetooth signals. In: Signal Processing and Communications Applications Conference. IEEE, pp 1–4 Uzundurukan E, Ali AM, Kara A (2017) Design of low-cost modular rf front end for rf fingerprinting of bluetooth signals. In: Signal Processing and Communications Applications Conference. IEEE, pp 1–4
46.
Zurück zum Zitat Vishwasrao MD, Sangaiah AK (2017) Escape: effective scalable clustering approach for parallel execution of continuous position-based queries in position monitoring applications. IEEE Trans Sustain Comput 2(2):49–61 Vishwasrao MD, Sangaiah AK (2017) Escape: effective scalable clustering approach for parallel execution of continuous position-based queries in position monitoring applications. IEEE Trans Sustain Comput 2(2):49–61
47.
Zurück zum Zitat Wang SC (2003) Artificial neural network. In: Interdisciplinary computing in java programming. Springer, pp 81–100 Wang SC (2003) Artificial neural network. In: Interdisciplinary computing in java programming. Springer, pp 81–100
48.
Zurück zum Zitat Wang W, Sun Z, Piao S, Zhu B, Ren K (2016) Wireless physical-layer identification: modeling and validation. IEEE Trans Inf Forensics Secur 11(9):2091–2106 Wang W, Sun Z, Piao S, Zhu B, Ren K (2016) Wireless physical-layer identification: modeling and validation. IEEE Trans Inf Forensics Secur 11(9):2091–2106
49.
Zurück zum Zitat Xie FY, Cheng W, Chen Y, Wen H (2017) An optimized algorithm for the feature extraction and recognition of rf fingerprint based on signal amplitude ranking. Cyberspace Secur 1:85–87 Xie FY, Cheng W, Chen Y, Wen H (2017) An optimized algorithm for the feature extraction and recognition of rf fingerprint based on signal amplitude ranking. Cyberspace Secur 1:85–87
50.
Zurück zum Zitat Yuan HL (2011) Research on physical-layer authentication of wireless network based on rf fingerprinting. PhD thesis, Southeast University Yuan HL (2011) Research on physical-layer authentication of wireless network based on rf fingerprinting. PhD thesis, Southeast University
51.
Zurück zum Zitat Zhang G, Xia L, Jia S, Ji Y (2017) Identification of cloned HF RFID proximity cards based on rf fingerprinting. In: Trustcom/bigdatase/ispa, pp 292–300 Zhang G, Xia L, Jia S, Ji Y (2017) Identification of cloned HF RFID proximity cards based on rf fingerprinting. In: Trustcom/bigdatase/ispa, pp 292–300
Metadaten
Titel
The individual identification method of wireless device based on dimensionality reduction and machine learning
verfasst von
Yun Lin
Xiaolei Zhu
Zhigao Zheng
Zheng Dou
Ruolin Zhou
Publikationsdatum
15.12.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2216-2

Weitere Artikel der Ausgabe 6/2019

The Journal of Supercomputing 6/2019 Zur Ausgabe

Premium Partner