Abstract
Mobile phone proliferation and increasing broadband penetration presents the possibility of placing small cellular base stations within homes to act as local access points. This can potentially lead to a very large increase in authentication requests hitting the centralized authentication infrastructure unless access is mediated at a lower protocol level. A study was carried out to examine the effectiveness of using Support Vector Machines to accurately identify if a mobile phone should be allowed access to a local cellular base station using differences imbued upon the signal as it passes through the analogue stages of its radio transmitter. Whilst allowing prohibited transmitters to gain access at the local level is undesirable and costly, denying service to a permitted transmitter is simply unacceptable. Two different learning approaches were employed, the first using One Class Classifiers (OCCs) and the second using customized ensemble classifiers. OCCs were found to perform poorly, with a true positive (TP) rate of only 50% (where TP refers to correctly identifying a permitted transmitter) and a true negative (TN) rate of 98% (where TN refers to correctly identifying a prohibited transmitter). The customized ensemble classifier approach was found to considerably outperform the OCCs with a 97% TP rate and an 80% TN rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ho, L., Claussen, H.: Effects of user-deployed, co-channel femtocells on the call drop probability in a residential scenario. In: IEEE International Symposium on Personal (September 2007)
O‘Mahony Zamora, G., Bergin, S., Kennedy, I.O.: Using support vector machines for passive steady state rf fingerprinting. In: International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (2008)
Kennedy, I.O., Scanlon, P., Buddhikiot, M.: Passive steady state rf fingerprinting: A cognitive technique for scalable deployment of co-channel femto cell underlays. In: Proceedings IEEE Conference on Dynamic Spectrum Access Networks (October 2008)
Gerdes, R., Daniels, T., Mina, M., Russell, S.: Identification via analog signal fingerprinting: A matched filter approach. In: ISOC Network and Distributed System Security Symposium (2006)
Burges, C.: A tutorial on support vector machines for pattern recognition. Knowledge Discovery and Data Mining 2(2), 121–167 (1998)
ScholKopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge (2002)
Knerr, S., Personnaz, L., Dreyfus, G.: Single-layer learning revisited: a stepwise procedure for building and training a neural network. Neurocomputing: Algorithms, Architectures and Applications (1990)
Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Transactions on Neural Networks 13(2), 415–425 (2002)
Milgram, J., Cheriet, M., Sabourin, R.: ‘one against one’ or ‘one against all’: Which one is better for handwriting recognition with svms? In: Tenth International Workshop on Frontiers in Handwriting Recognition (2006)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001), Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
Platt, J.: Probabilistic outputs for support vector machines and comparison to regularized likelihood methods. In: Advances in Large Margin Classifiers, pp. 61–74 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kroon, B., Bergin, S., Kennedy, I.O., O’Mahony Zamora, G. (2010). Steady State RF Fingerprinting for Identity Verification: One Class Classifier versus Customized Ensemble. In: Coyle, L., Freyne, J. (eds) Artificial Intelligence and Cognitive Science. AICS 2009. Lecture Notes in Computer Science(), vol 6206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17080-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-17080-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17079-9
Online ISBN: 978-3-642-17080-5
eBook Packages: Computer ScienceComputer Science (R0)