Skip to main content
Erschienen in: International Journal of Information Security 2/2024

28.12.2023 | Regular Contribution

Radio frequency fingerprinting techniques for device identification: a survey

verfasst von: Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam Alaboudi, Ali Mohamed

Erschienen in: International Journal of Information Security | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) paradigm and the advanced wireless technologies of 5G and beyond are expected to enable diverse applications such as autonomous driving, industrial automation, and smart cities. These applications bring together a vast and diverse IoT device population that occupy radio frequency spectrum. Such a large number of wireless devices expose previously unheard-of threat surfaces in addition to the bandwidth shortage and throughput issues. Device identification is crucial in such scenarios not only to authenticate and authorize nodes, but also to employ different network services. One of the promising solutions for device identification is the use of radio frequency (RF) fingerprinting. Recently, wireless device identification using RF fingerprinting along with machine learning and deep learning technologies showed outstanding results in the recent contemporary domains. This paper presents a systematic literature review of RF fingerprinting identification of wireless devices by presenting the results as a graphical and tabular representation of statistical data obtained. Only experimental research papers were considered of over 130 journals and international conference papers that have been classified and evaluated from the year 2010 till date. This survey focuses on exploring the commonly used RF fingerprinting approaches, feature extraction and filtration techniques, and classification algorithm used in the device identification. Finally, open issues and challenges along with future directions have presented which were discovered during the process of analyzing the literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Leo M., Battisti F., Carli M., Neri A.: A federated architecture approach for Internet of Things security. in 2014 Euro Med Telco Conference—From Network Infrastructures to Network Fabric: Revolution at the Edges, EMTC 2014, pp. 1–5, (2014), https://doi.org/10.1109/EMTC.2014.6996632 Leo M., Battisti F., Carli M., Neri A.: A federated architecture approach for Internet of Things security. in 2014 Euro Med Telco Conference—From Network Infrastructures to Network Fabric: Revolution at the Edges, EMTC 2014, pp. 1–5, (2014), https://​doi.​org/​10.​1109/​EMTC.​2014.​6996632
3.
Zurück zum Zitat Lewis, J.: Economic Impact of Cybercrime—No Slowing Down Report”, McAfee: Santa Clara. CA, USA (2018) Lewis, J.: Economic Impact of Cybercrime—No Slowing Down Report”, McAfee: Santa Clara. CA, USA (2018)
5.
Zurück zum Zitat Mahmoud R., Yousuf T., Aloul F., Zualkernan I.: Internet of things (IoT) security: current status, challenges and prospective measures. in 10th International Conference for Internet Technology and Secured Transactions, ICITST, pp. 336–341, (2016), doi: https://doi.org/10.1109/ICITST.2015.7412116. Mahmoud R., Yousuf T., Aloul F., Zualkernan I.: Internet of things (IoT) security: current status, challenges and prospective measures. in 10th International Conference for Internet Technology and Secured Transactions, ICITST, pp. 336–341, (2016), doi: https://​doi.​org/​10.​1109/​ICITST.​2015.​7412116.
8.
10.
Zurück zum Zitat Bhaskar N.: A survey of techniques in passive identification of wireless personal devices and the implications on user tracking. Tecnical Report, Department of Computer Science, University of California San Diego, (2019). Bhaskar N.: A survey of techniques in passive identification of wireless personal devices and the implications on user tracking. Tecnical Report, Department of Computer Science, University of California San Diego, (2019).
12.
Zurück zum Zitat Chen Y., Kleisouris K., Li X., Trappe W., Martin R. P.: The robustness of localization algorithms to signal strength attacks: a comparative study. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2006, pp. 546–563. doi: https://doi.org/10.1007/11776178_33. Chen Y., Kleisouris K., Li X., Trappe W., Martin R. P.: The robustness of localization algorithms to signal strength attacks: a comparative study. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 2006, pp. 546–563. doi: https://​doi.​org/​10.​1007/​11776178_​33.
17.
Zurück zum Zitat Bai, L., Zhu, L., Liu, J., Choi, J., Zhang, W.: Physical layer authentication in wireless communication networks: a survey. J. Commun. Inf. Netw. 5(3), 237–264 (2020)CrossRef Bai, L., Zhu, L., Liu, J., Choi, J., Zhang, W.: Physical layer authentication in wireless communication networks: a survey. J. Commun. Inf. Netw. 5(3), 237–264 (2020)CrossRef
18.
Zurück zum Zitat Jagannath, A., Jagannath, J., Kumar, P.S.P.V.: A comprehensive survey on radio frequency (rf) fingerprinting: traditional approaches, deep learning, and open challenges. Comput. Netw. 219, 109455 (2022)CrossRef Jagannath, A., Jagannath, J., Kumar, P.S.P.V.: A comprehensive survey on radio frequency (rf) fingerprinting: traditional approaches, deep learning, and open challenges. Comput. Netw. 219, 109455 (2022)CrossRef
20.
Zurück zum Zitat Kumar, V., Paul, K.: Device fingerprinting for cyber-physical systems: a survey. ACM Comput. Surv. 55(14s), 1–41 (2023)CrossRef Kumar, V., Paul, K.: Device fingerprinting for cyber-physical systems: a survey. ACM Comput. Surv. 55(14s), 1–41 (2023)CrossRef
22.
Zurück zum Zitat Shan, D., Zeng, K., Xiang, W., Richardson, P., Dong, Y.: PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks. IEEE J. Sel. Areas Commun. 31(9), 1817–1827 (2013)CrossRef Shan, D., Zeng, K., Xiang, W., Richardson, P., Dong, Y.: PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks. IEEE J. Sel. Areas Commun. 31(9), 1817–1827 (2013)CrossRef
23.
Zurück zum Zitat Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 806–815 (2009)CrossRef Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 806–815 (2009)CrossRef
24.
Zurück zum Zitat Ibrahim, M., Youssef, M.: CellSense: an accurate energy-efficient GSM positioning system. IEEE Trans. Veh. Technol. 61(1), 286–296 (2011)CrossRef Ibrahim, M., Youssef, M.: CellSense: an accurate energy-efficient GSM positioning system. IEEE Trans. Veh. Technol. 61(1), 286–296 (2011)CrossRef
25.
Zurück zum Zitat Hunag J.-S., Harwahyu R., Cheng R.-G.: Study of low cost mobile phone tracking system. in 2015 International Symposium on Next-Generation Electronics (ISNE), IEEE, pp. 1–4, (2015) Hunag J.-S., Harwahyu R., Cheng R.-G.: Study of low cost mobile phone tracking system. in 2015 International Symposium on Next-Generation Electronics (ISNE), IEEE, pp. 1–4, (2015)
26.
Zurück zum Zitat Porambage, P., Gür, G., Osorio, D.P.M., Liyanage, M., Gurtov, A., Ylianttila, M.: The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2, 1094–1122 (2021)CrossRef Porambage, P., Gür, G., Osorio, D.P.M., Liyanage, M., Gurtov, A., Ylianttila, M.: The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2, 1094–1122 (2021)CrossRef
27.
Zurück zum Zitat Kishk, M., Bader, A., Alouini, M.-S.: Aerial base station deployment in 6G cellular networks using tethered drones: the mobility and endurance tradeoff. IEEE Veh. Technol. Mag. 15(4), 103–111 (2020)CrossRef Kishk, M., Bader, A., Alouini, M.-S.: Aerial base station deployment in 6G cellular networks using tethered drones: the mobility and endurance tradeoff. IEEE Veh. Technol. Mag. 15(4), 103–111 (2020)CrossRef
28.
Zurück zum Zitat Keele, S.: Guidelines for performing systematic literature reviews in software engineering. Technical Report 2016, EBSE: Durham, UK, (2007) Keele, S.: Guidelines for performing systematic literature reviews in software engineering. Technical Report 2016, EBSE: Durham, UK, (2007)
36.
39.
Zurück zum Zitat Dubendorfer C., Ramsey B., Temple M.: ZigBee device verification for securing industrial control and building automation systems. in IFIP Advances in Information and Communication Technology, J. Butts, S. Shenoi, J. Butts, and S. Shenoi, Eds., Berlin, Heidelberg, pp. 47–62 (2013) https://doi.org/10.1007/978-3-642-45330-4_4. Dubendorfer C., Ramsey B., Temple M.: ZigBee device verification for securing industrial control and building automation systems. in IFIP Advances in Information and Communication Technology, J. Butts, S. Shenoi, J. Butts, and S. Shenoi, Eds., Berlin, Heidelberg, pp. 47–62 (2013) https://​doi.​org/​10.​1007/​978-3-642-45330-4_​4.
41.
Zurück zum Zitat Tascioglu S., Kose M., Telatar Z.: Effect of sampling rate on transient based RF fingerprinting. in 10th International Conference on Electrical and Electronics Engineering, pp. 1156–1160, (2018) Tascioglu S., Kose M., Telatar Z.: Effect of sampling rate on transient based RF fingerprinting. in 10th International Conference on Electrical and Electronics Engineering, pp. 1156–1160, (2018)
43.
Zurück zum Zitat Baldini G., Giuliani R., Steri G., Sanchez I., Gentile C.: The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. in IEEE Symposium on Communications and Vehicular Technology (SCVT), IEEE, pp. 1–6. (2017), https://doi.org/10.1109/SCVT.2017.8240312. Baldini G., Giuliani R., Steri G., Sanchez I., Gentile C.: The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. in IEEE Symposium on Communications and Vehicular Technology (SCVT), IEEE, pp. 1–6. (2017), https://​doi.​org/​10.​1109/​SCVT.​2017.​8240312.
46.
Zurück zum Zitat Goldberger, J., Roweis, S., Hinton, G., Salakhutdinov, R.: Neighbourhood components analysis. Adv. Neural Inf. Process Syst. (NIPS) 17, 513–520 (2004) Goldberger, J., Roweis, S., Hinton, G., Salakhutdinov, R.: Neighbourhood components analysis. Adv. Neural Inf. Process Syst. (NIPS) 17, 513–520 (2004)
61.
Zurück zum Zitat Wang H., Raj B.: On the origin of deep learning. ArXiv, pp. 1–72, Feb. (2017) Wang H., Raj B.: On the origin of deep learning. ArXiv, pp. 1–72, Feb. (2017)
62.
Zurück zum Zitat LeCun, Y., Bengio, Y., Courville, A.: Deep learning. Nature 29(7553), 1–73 (2016) LeCun, Y., Bengio, Y., Courville, A.: Deep learning. Nature 29(7553), 1–73 (2016)
69.
Zurück zum Zitat Madry A., Makelov A., Schmidt L., Tsipras D., Vladu A.: Towards deep learning models resistant to adversarial attacks. 6th International Conference on Learning Representations, ICLR 2018–Conference Track Proceedings, (2018) Madry A., Makelov A., Schmidt L., Tsipras D., Vladu A.: Towards deep learning models resistant to adversarial attacks. 6th International Conference on Learning Representations, ICLR 2018–Conference Track Proceedings, (2018)
70.
Zurück zum Zitat Andriushchenko M., Croce F., Flammarion N., Hein M.: Square attack: a query-efficient black-box adversarial attack via random search. in European Conference on Computer Vision, Springer, pp. 484–501, (2020) Andriushchenko M., Croce F., Flammarion N., Hein M.: Square attack: a query-efficient black-box adversarial attack via random search. in European Conference on Computer Vision, Springer, pp. 484–501, (2020)
71.
Zurück zum Zitat Carlini N., Wagner D.: Towards evaluating the robustness of neural networks. in ieee symposium on security and privacy (sp), IEEE, pp 39–57, (2017) Carlini N., Wagner D.: Towards evaluating the robustness of neural networks. in ieee symposium on security and privacy (sp), IEEE, pp 39–57, (2017)
73.
Zurück zum Zitat Karunaratne S., Krijestorac E., Cabric D.: Penetrating RF fingerprinting-based authentication with a generative adversarial attack. in ICC IEEE International Conference on Communications, IEEE, 2021, pp. 1–6, (2021) Karunaratne S., Krijestorac E., Cabric D.: Penetrating RF fingerprinting-based authentication with a generative adversarial attack. in ICC IEEE International Conference on Communications, IEEE, 2021, pp. 1–6, (2021)
74.
Zurück zum Zitat Kim, B., Sagduyu, Y.E., Davaslioglu, K., Erpek, T., Ulukus, S.: Channel-aware adversarial attacks against deep learning-based wireless signal classifiers. IEEE Trans. Wirel. Commun. 21(6), 3868–3880 (2021)CrossRef Kim, B., Sagduyu, Y.E., Davaslioglu, K., Erpek, T., Ulukus, S.: Channel-aware adversarial attacks against deep learning-based wireless signal classifiers. IEEE Trans. Wirel. Commun. 21(6), 3868–3880 (2021)CrossRef
75.
Zurück zum Zitat Ye, Y., Chen, Y., Liu, M.: Multiuser adversarial attack on deep learning for OFDM detection. IEEE Wireless Communications Letters 11(12), 2527–2531 (2022)CrossRef Ye, Y., Chen, Y., Liu, M.: Multiuser adversarial attack on deep learning for OFDM detection. IEEE Wireless Communications Letters 11(12), 2527–2531 (2022)CrossRef
76.
Zurück zum Zitat Shi, Y., Davaslioglu, K., Sagduyu, Y.E.: Generative adversarial network in the air: deep adversarial learning for wireless signal spoofing. IEEE Trans. Cogn. Commun. Netw. 7(1), 294–303 (2020)CrossRef Shi, Y., Davaslioglu, K., Sagduyu, Y.E.: Generative adversarial network in the air: deep adversarial learning for wireless signal spoofing. IEEE Trans. Cogn. Commun. Netw. 7(1), 294–303 (2020)CrossRef
77.
Zurück zum Zitat Bahramali A., Nasr M., Houmansadr A., Goeckel D., Towsley D.: Robust adversarial attacks against DNN-based wireless communication systems. in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 126–140 Bahramali A., Nasr M., Houmansadr A., Goeckel D., Towsley D.: Robust adversarial attacks against DNN-based wireless communication systems. in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 126–140
78.
Zurück zum Zitat de Araujo-Filho, P.F., Kaddoum, G., Naili, M., Fapi, E.T., Zhu, Z.: Multi-objective GAN-based adversarial attack technique for modulation classifiers. IEEE Commun. Lett. 26(7), 1583–1587 (2022)CrossRef de Araujo-Filho, P.F., Kaddoum, G., Naili, M., Fapi, E.T., Zhu, Z.: Multi-objective GAN-based adversarial attack technique for modulation classifiers. IEEE Commun. Lett. 26(7), 1583–1587 (2022)CrossRef
79.
Zurück zum Zitat Durbha K. S., Amuru S.: AutoML models for wireless signals classification and their effectiveness against adversarial attacks,” in 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, 2022, pp. 265–269. (2022) Durbha K. S., Amuru S.: AutoML models for wireless signals classification and their effectiveness against adversarial attacks,” in 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, 2022, pp. 265–269. (2022)
80.
Zurück zum Zitat Kim B., Sagduyu Y. E., Erpek , K. Davaslioglu T., Ulukus S.: Channel effects on surrogate models of adversarial attacks against wireless signal classifiers. in ICC 2021-IEEE International Conference on Communications, IEEE, 2021, pp. 1–6. Kim B., Sagduyu Y. E., Erpek , K. Davaslioglu T., Ulukus S.: Channel effects on surrogate models of adversarial attacks against wireless signal classifiers. in ICC 2021-IEEE International Conference on Communications, IEEE, 2021, pp. 1–6.
82.
Zurück zum Zitat Xu, D., Yang, H., Gu, C., Chen, Z., Xuan, Q., Yang, X.: Adversarial examples detection of radio signals based on multifeature fusion. IEEE Trans. Circuits Syst. II Express Briefs 68(12), 3607–3611 (2021) Xu, D., Yang, H., Gu, C., Chen, Z., Xuan, Q., Yang, X.: Adversarial examples detection of radio signals based on multifeature fusion. IEEE Trans. Circuits Syst. II Express Briefs 68(12), 3607–3611 (2021)
83.
Zurück zum Zitat Sahay, R., Brinton, C.G., Love, D.J.: A deep ensemble-based wireless receiver architecture for mitigating adversarial attacks in automatic modulation classification. IEEE Trans Cogn Commun Netw 8(1), 71–85 (2021)CrossRef Sahay, R., Brinton, C.G., Love, D.J.: A deep ensemble-based wireless receiver architecture for mitigating adversarial attacks in automatic modulation classification. IEEE Trans Cogn Commun Netw 8(1), 71–85 (2021)CrossRef
85.
Zurück zum Zitat Zhang, L., Lambotharan, S., Zheng, G., Liao, G., Demontis, A., Roli, F.: A hybrid training-time and run-time defense against adversarial attacks in modulation classification. IEEE Wireless Commun. Lett. 11(6), 1161–1165 (2022)CrossRef Zhang, L., Lambotharan, S., Zheng, G., Liao, G., Demontis, A., Roli, F.: A hybrid training-time and run-time defense against adversarial attacks in modulation classification. IEEE Wireless Commun. Lett. 11(6), 1161–1165 (2022)CrossRef
86.
Zurück zum Zitat Wang, Z., Liu, W., Wang, H.-M.: Gan against adversarial attacks in radio signal classification. IEEE Commun. Lett. 26(12), 2851–2854 (2022)CrossRef Wang, Z., Liu, W., Wang, H.-M.: Gan against adversarial attacks in radio signal classification. IEEE Commun. Lett. 26(12), 2851–2854 (2022)CrossRef
88.
Zurück zum Zitat Gul, O.M., Kulhandjian, M., Kantarci, B., Touazi, A., Ellement, C., D’amours, C.: Secure Industrial IoT Systems via RF Fingerprinting Under Impaired Channels With Interference and Noise. IEEE Access 11, 26289–26307 (2023)CrossRef Gul, O.M., Kulhandjian, M., Kantarci, B., Touazi, A., Ellement, C., D’amours, C.: Secure Industrial IoT Systems via RF Fingerprinting Under Impaired Channels With Interference and Noise. IEEE Access 11, 26289–26307 (2023)CrossRef
89.
Zurück zum Zitat F. Lemic, A. Behboodi, V. Handziski, and A. Wolisz, “Increasing interference robustness of wifi fingerprinting by leveraging spectrum information,” in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, 2015, pp. 1200–1208. F. Lemic, A. Behboodi, V. Handziski, and A. Wolisz, “Increasing interference robustness of wifi fingerprinting by leveraging spectrum information,” in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, IEEE, 2015, pp. 1200–1208.
91.
Zurück zum Zitat L. Peng, A. Hu, Y. Jiang, Y. Yan, and C. Zhu, “A differential constellation trace figure based device identification method for ZigBee nodes,” 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016, no. 61571110, 2016, doi: https://doi.org/10.1109/WCSP.2016.7752534. L. Peng, A. Hu, Y. Jiang, Y. Yan, and C. Zhu, “A differential constellation trace figure based device identification method for ZigBee nodes,” 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016, no. 61571110, 2016, doi: https://​doi.​org/​10.​1109/​WCSP.​2016.​7752534.
98.
Zurück zum Zitat K. S. Kuciapinski, M. A. Temple, and R. W. Klein, “Anova-based RF DNA analysis: Identifying significant parameters for device classification,” in WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, 2010, pp. 47–52. K. S. Kuciapinski, M. A. Temple, and R. W. Klein, “Anova-based RF DNA analysis: Identifying significant parameters for device classification,” in WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, 2010, pp. 47–52.
101.
Zurück zum Zitat L. Smith et al., “Classifying WiFi ‘physical fingerprints’ using complex deep learning,” in Automatic Target Recognition XXX, T. L. Overman, R. I. Hammoud, and A. Mahalanobis, Eds., SPIE, Apr. 2020, p. 22. doi: https://doi.org/10.1117/12.2557933. L. Smith et al., “Classifying WiFi ‘physical fingerprints’ using complex deep learning,” in Automatic Target Recognition XXX, T. L. Overman, R. I. Hammoud, and A. Mahalanobis, Eds., SPIE, Apr. 2020, p. 22. doi: https://​doi.​org/​10.​1117/​12.​2557933.
103.
106.
Zurück zum Zitat Hanna S.S., Cabric D.: Deep learning based transmitter identification using power amplifier nonlinearity. ArXiv, pp. 674–680, (2018). Hanna S.S., Cabric D.: Deep learning based transmitter identification using power amplifier nonlinearity. ArXiv, pp. 674–680, (2018).
110.
Zurück zum Zitat Lukacs M., Collins P., Temple M.: Device identification using active noise interrogation and RF-DNA ‘Fingerprinting’ for non-destructive amplifier acceptance testing. in 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON), pp. 1–6, (2016) https://doi.org/10.1109/WAMICON.2016.7483856. Lukacs M., Collins P., Temple M.: Device identification using active noise interrogation and RF-DNA ‘Fingerprinting’ for non-destructive amplifier acceptance testing. in 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON), pp. 1–6, (2016) https://​doi.​org/​10.​1109/​WAMICON.​2016.​7483856.
113.
115.
Zurück zum Zitat Gritsenko A., Wang Z., Jian J. Dy, K. Chowdhury, Ioannidis S.: Finding a ‘New’ Needle in the Haystack: Unseen Radio Detection in Large Populations Using Deep Learning. IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019, pp. 1–10, (2019), doi: https://doi.org/10.1109/DySPAN.2019.8935862 Gritsenko A., Wang Z., Jian J. Dy, K. Chowdhury, Ioannidis S.: Finding a ‘New’ Needle in the Haystack: Unseen Radio Detection in Large Populations Using Deep Learning. IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN 2019, pp. 1–10, (2019), doi: https://​doi.​org/​10.​1109/​DySPAN.​2019.​8935862
118.
Zurück zum Zitat Chen S., Xie F., Chen Y., Song H., Wen H.: Identification of wireless transceiver devices using radio frequency (RF) fingerprinting based on STFT analysis to enhance authentication security. in 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing), (2017), pp. 1–5. doi: https://doi.org/10.1109/EMC-B.2017.8260381. Chen S., Xie F., Chen Y., Song H., Wen H.: Identification of wireless transceiver devices using radio frequency (RF) fingerprinting based on STFT analysis to enhance authentication security. in 2017 IEEE 5th International Symposium on Electromagnetic Compatibility (EMC-Beijing), (2017), pp. 1–5. doi: https://​doi.​org/​10.​1109/​EMC-B.​2017.​8260381.
120.
Zurück zum Zitat Lin Y., Chang J.: Improving wireless network security based on radio fingerprinting. Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019, pp. 375–379, (2019), doi: https://doi.org/10.1109/QRS-C.2019.00076. Lin Y., Chang J.: Improving wireless network security based on radio fingerprinting. Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019, pp. 375–379, (2019), doi: https://​doi.​org/​10.​1109/​QRS-C.​2019.​00076.
124.
Zurück zum Zitat Bassey J., Adesina D., Li X., Qian L., Aved A., Kroecker T.: Intrusion detection for IoT devices based on RF fingerprinting using deep learning. in 2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019, IEEE, pp. 98–104. (2019), https://doi.org/10.1109/FMEC.2019.8795319. Bassey J., Adesina D., Li X., Qian L., Aved A., Kroecker T.: Intrusion detection for IoT devices based on RF fingerprinting using deep learning. in 2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019, IEEE, pp. 98–104. (2019), https://​doi.​org/​10.​1109/​FMEC.​2019.​8795319.
128.
Zurück zum Zitat Baldini G., Giuliani R., Gentile C., Steri G.: Measures to address the lack of portability of the RF fingerprints for radiometric identification. in 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, vol. 2018-Janua, pp. 1–5, (2018), doi: https://doi.org/10.1109/NTMS.2018.8328703. Baldini G., Giuliani R., Gentile C., Steri G.: Measures to address the lack of portability of the RF fingerprints for radiometric identification. in 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, vol. 2018-Janua, pp. 1–5, (2018), doi: https://​doi.​org/​10.​1109/​NTMS.​2018.​8328703.
138.
Zurück zum Zitat Ding G., Huang Z., Wang X.: Radio frequency fingerprint extraction based on singular values and singular vectors of time-frequency spectrum. in 2018 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2018, pp. 1–6, (2018), https://doi.org/10.1109/ICSPCC.2018.8567765. Ding G., Huang Z., Wang X.: Radio frequency fingerprint extraction based on singular values and singular vectors of time-frequency spectrum. in 2018 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2018, pp. 1–6, (2018), https://​doi.​org/​10.​1109/​ICSPCC.​2018.​8567765.
139.
Zurück zum Zitat Yu et al., J. Radio frequency fingerprint identification based on denoising autoencoders. ArXiv, (2019). Yu et al., J. Radio frequency fingerprint identification based on denoising autoencoders. ArXiv, (2019).
142.
Zurück zum Zitat Guo X., and S. Liu, Research on communication individual identification method based on PCA-NCA and CV-SVM. in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, (2019), pp. 12–19. https://doi.org/10.1007/978-3-030-36402-1_2. Guo X., and S. Liu, Research on communication individual identification method based on PCA-NCA and CV-SVM. in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Springer, (2019), pp. 12–19. https://​doi.​org/​10.​1007/​978-3-030-36402-1_​2.
144.
147.
Zurück zum Zitat Roy D., Mukherjee T., Chatterjee M., Pasiliao E.: RF transmitter fingerprinting exploiting spatio-temporal properties in raw signal data. Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019, pp. 89–96, (2019), doi: https://doi.org/10.1109/ICMLA.2019.00023. Roy D., Mukherjee T., Chatterjee M., Pasiliao E.: RF transmitter fingerprinting exploiting spatio-temporal properties in raw signal data. Proceedings - 18th IEEE International Conference on Machine Learning and Applications, ICMLA 2019, pp. 89–96, (2019), doi: https://​doi.​org/​10.​1109/​ICMLA.​2019.​00023.
148.
149.
Zurück zum Zitat Williams M.D., Munns S.A., Temple M.A., Mendenhall M.J.: RF-DNA fingerprinting for airport WiMax communications security. Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, pp. 32–39, 2010, https://doi.org/10.1109/NSS.2010.21. Williams M.D., Munns S.A., Temple M.A., Mendenhall M.J.: RF-DNA fingerprinting for airport WiMax communications security. Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010, pp. 32–39, 2010, https://​doi.​org/​10.​1109/​NSS.​2010.​21.
151.
Zurück zum Zitat Talbot C., Temple M., Carbino T.: Securing insteon home automation systems using radio frequency distinct native attribute (RF-DNA) fingerprints. in Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS), , pp. 497–505, (2017) Talbot C., Temple M., Carbino T.: Securing insteon home automation systems using radio frequency distinct native attribute (RF-DNA) fingerprints. in Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS), , pp. 497–505, (2017)
156.
Zurück zum Zitat Kroon, B., Bergin, S., Kennedy, I.O., Zamora, G.O.’M.: Steady state RF fingerprinting for identity verification: one class classifier versus customized ensemble. In: Coyle, L., Freyne, J. (eds.) Artificial Intelligence and Cognitive Science, pp. 198–206. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17080-5_22CrossRef Kroon, B., Bergin, S., Kennedy, I.O., Zamora, G.O.’M.: Steady state RF fingerprinting for identity verification: one class classifier versus customized ensemble. In: Coyle, L., Freyne, J. (eds.) Artificial Intelligence and Cognitive Science, pp. 198–206. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https://​doi.​org/​10.​1007/​978-3-642-17080-5_​22CrossRef
157.
Zurück zum Zitat Ur Rehman S., Sowerby K., Coghill C., Holmes W.: The analysis of RF fingerprinting for low-end wireless receivers with application to IEEE 802.11a. 2012 International Conference on Selected Topics in Mobile and Wireless Networking, ICOST pp. 24–29, (2012), https://doi.org/10.1109/iCOST.2012.6271285. Ur Rehman S., Sowerby K., Coghill C., Holmes W.: The analysis of RF fingerprinting for low-end wireless receivers with application to IEEE 802.11a. 2012 International Conference on Selected Topics in Mobile and Wireless Networking, ICOST pp. 24–29, (2012), https://​doi.​org/​10.​1109/​iCOST.​2012.​6271285.
158.
Zurück zum Zitat Baldini G., Giuliani R., Steri G., Sanchez I., Gentile C.: The application of the symbolic aggregate approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. in 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), pp. 1–6. (2017), https://doi.org/10.1109/SCVT.2017.8240312. Baldini G., Giuliani R., Steri G., Sanchez I., Gentile C.: The application of the symbolic aggregate approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. in 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), pp. 1–6. (2017), https://​doi.​org/​10.​1109/​SCVT.​2017.​8240312.
160.
Zurück zum Zitat Li Y., Chen X., Chang J., Lin Y.: The physical layer identification of communication devices based on RF-DNA. in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 279, Springer International Publishing, pp. 452–460. 2019, https://doi.org/10.1007/978-3-030-19086-6_50. Li Y., Chen X., Chang J., Lin Y.: The physical layer identification of communication devices based on RF-DNA. in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 279, Springer International Publishing, pp. 452–460. 2019, https://​doi.​org/​10.​1007/​978-3-030-19086-6_​50.
163.
Zurück zum Zitat Zamora, G.O.’M., Bergin, S., Kennedy, I.O.: Using support vector machines for passive steady state RF fingerprinting. In: Sobh, T., Elleithy, K., Mahmood, A. (eds.) Novel algorithms and techniques in telecommunications and networking, pp. 183–188. Springer Netherlands, Dordrecht (2010). https://doi.org/10.1007/978-90-481-3662-9_31CrossRef Zamora, G.O.’M., Bergin, S., Kennedy, I.O.: Using support vector machines for passive steady state RF fingerprinting. In: Sobh, T., Elleithy, K., Mahmood, A. (eds.) Novel algorithms and techniques in telecommunications and networking, pp. 183–188. Springer Netherlands, Dordrecht (2010). https://​doi.​org/​10.​1007/​978-90-481-3662-9_​31CrossRef
172.
Zurück zum Zitat Wang, W., Sanchez, I.A., Caparra, G., McKeown, A., Whitworth, T., Lohan, E.S.: A survey of spoofer detection techniques via radio frequency fingerprinting with focus on the GNSS pre-correlation sampled data. Sensors 21(9), 3012 (2021). https://doi.org/10.3390/s21093012CrossRef Wang, W., Sanchez, I.A., Caparra, G., McKeown, A., Whitworth, T., Lohan, E.S.: A survey of spoofer detection techniques via radio frequency fingerprinting with focus on the GNSS pre-correlation sampled data. Sensors 21(9), 3012 (2021). https://​doi.​org/​10.​3390/​s21093012CrossRef
173.
Zurück zum Zitat Li Q., Jin Y., Yan S., Han S.: Emitter identification based on improved variational modal decomposition at low SNR. in Proceedings - 2021 International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021, Institute of Electrical and Electronics Engineers Inc., pp. 152–156. (2021), https://doi.org/10.1109/AIEA53260.2021.00040 Li Q., Jin Y., Yan S., Han S.: Emitter identification based on improved variational modal decomposition at low SNR. in Proceedings - 2021 International Conference on Artificial Intelligence and Electromechanical Automation, AIEA 2021, Institute of Electrical and Electronics Engineers Inc., pp. 152–156. (2021), https://​doi.​org/​10.​1109/​AIEA53260.​2021.​00040
175.
Zurück zum Zitat Li Y., Ding Y., Goussetis G., Zhang J.: Power amplifier enabled RF fingerprint identification. in Proceedings of the 2021 IEEE Texas Symposium on Wireless and Microwave Circuits and Systems: Making Waves in Texas, WMCS 2021, Institute of Electrical and Electronics Engineers Inc., (2021). doi: https://doi.org/10.1109/WMCS52222.2021.9493272. Li Y., Ding Y., Goussetis G., Zhang J.: Power amplifier enabled RF fingerprint identification. in Proceedings of the 2021 IEEE Texas Symposium on Wireless and Microwave Circuits and Systems: Making Waves in Texas, WMCS 2021, Institute of Electrical and Electronics Engineers Inc., (2021). doi: https://​doi.​org/​10.​1109/​WMCS52222.​2021.​9493272.
176.
Zurück zum Zitat Lin Y., Li J., Chen L., Zhang G.: Power spectrum based Wi-Fi RF fingerprint extraction method. in Proceedings–2021 13th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 105–109. doi: https://doi.org/10.1109/ICMTMA52658.2021.00033. Lin Y., Li J., Chen L., Zhang G.: Power spectrum based Wi-Fi RF fingerprint extraction method. in Proceedings–2021 13th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2021, Institute of Electrical and Electronics Engineers Inc., 2021, pp. 105–109. doi: https://​doi.​org/​10.​1109/​ICMTMA52658.​2021.​00033.
178.
190.
Zurück zum Zitat Shi J. et al.: A radio frequency fingerprint identification method for wireless devices based on ShuffleNet-SVM. in 2022 IEEE 8th International Conference on Computer and Communications, ICCC 2022, Institute of Electrical and Electronics Engineers Inc., (2022), pp. 1794–1800. https://doi.org/10.1109/ICCC56324.2022.10065708. Shi J. et al.: A radio frequency fingerprint identification method for wireless devices based on ShuffleNet-SVM. in 2022 IEEE 8th International Conference on Computer and Communications, ICCC 2022, Institute of Electrical and Electronics Engineers Inc., (2022), pp. 1794–1800. https://​doi.​org/​10.​1109/​ICCC56324.​2022.​10065708.
Metadaten
Titel
Radio frequency fingerprinting techniques for device identification: a survey
verfasst von
Sohail Abbas
Manar Abu Talib
Qassim Nasir
Sally Idhis
Mariam Alaboudi
Ali Mohamed
Publikationsdatum
28.12.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 2/2024
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-023-00801-z

Weitere Artikel der Ausgabe 2/2024

International Journal of Information Security 2/2024 Zur Ausgabe

Premium Partner