Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Wireless Fingerprints Inside a Wireless Sensor Network

Published: 02 March 2015 Publication History
  • Get Citation Alerts
  • Abstract

    We discriminate between different SiLabs IEEE 802.15.4 2.4GHz RF sources using the Ettus Labs USRP1 Software-Defined Radio. The wireless fingerprinting method implemented on the USRP1 device exploits differences in the phase attributes of demodulated data samples. The method does not require the use of expensive spectrum analyzer equipment and the associated high sampling and processing rates with such equipment. Instead, data sample inputs are used, sampled at a rate of 4MHz. This makes implementation using real Wireless Sensor Network nodes feasible and allows wireless fingerprints to be gathered inside each node in a network. This is important since wireless fingerprints degrade over distance, making distributed implementations more attractive. With our method, the USRP1 classifies accurately over a wide range of network conditions, including time and transmission distance. Performance is also stable for different receiving devices. We achieve average classification accuracies of 99.6% at short range, 95.3% at medium range, and 81.9% at long range when classifying a limited sample of five devices from the same manufacturer.

    References

    [1]
    Colin Boyd and Anish Mathuri. 2003. Protocols for Authentication and Key Establishment. Springer-Verlag.
    [2]
    Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sango Oh. 2008. Wireless device identification with radiometric signatures. In Proceedings of Mobicom 2008. 116--127.
    [3]
    Chen Chan and M. A. Jensen. 2010. Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Transactions on Mobile Computing 10, 2 (2011), 205--215.
    [4]
    Hao Chen and Yajun Guo. 2009. A key agreement scheme based on bilinear pairing for wireless sensor network. In Proceedings of IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’09). 384--388.
    [5]
    Taehwan Choi, H. B. Acharya, and Mohamed G. Gouda. 2011. The best keying protocol for sensor networks. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM’11). 1--6.
    [6]
    William E. Cobb, Eric D. Lapse, Rusty O. Baldwin, Michael A. Temple, and Yong C. Kim. 2012. Intrinsic physical layer authentication of integrated circuits. IEEE Transactions on Information Forensics and Security 7, 1, 14--24.
    [7]
    Boris Danev, Davide Zanetti, and Srdjan Capkun. 2012. On physical-layer identification of wireless devices. ACM Computing Surveys, 45, 1 (Nov. 2012), Article 6, 31 pages.
    [8]
    Ettus Research. 2007. USRP1 Software-Defined Radio. Retrieved December 1, 2007, from http://www.ettus.com/downloads/ettus_ds_usrp_v7.pdf.
    [9]
    Ettus Research. 2014. RFX2400 2.3--2.9 GHz Rx/Tx. Retrieved October 20, 2014, from https://www.ettus.com/product/details/RFX2400.
    [10]
    Floyd M. Gardner. 1986. A BPSK/QPSK timing error detector for sampling receivers. IEEE Transactions on Communications, COM-34, 5, 423--429.
    [11]
    GNU Radio User Community. 2014. GNU Radio. Retrieved October 10, 2012, from http://www.gnuradio.org.
    [12]
    Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. 2003. Detection of transient in radio frequency fingerprinting using signal phase. In Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications. 13--18.
    [13]
    Simon Haykin and Michael Moher. 2004. Modern Wireless Communications. Pearson Prentice Hall, Upper Saddle River, New Jersey.
    [14]
    A. K. M. Mahtab Hossain, Yunye Jin, Wee-Seng Soh, and Hien Nguyen Van. 2011. SSD: A robust RF location fingerprint addressing mobile devices’ heterogeneity. IEEE Transactions on Mobile Computing 12, 1, 65--77.
    [15]
    IEEE Computer Society. 2006. IEEE Std 802.15.4--2006. New York, NY.
    [16]
    Haley M. Jones, Anindita Saha, and Thushara D. Abhayapala. 2003. The effect of finite antenna separation on the performance of spatial diversity receivers. In Proceedings of 7th International Symposium on Signal Processing and Its Applications, 2, 515--518.
    [17]
    David A. Knox. 2013. Measuring Wireless Fingerprints Inside a Wireless Sensor Network. Doctoral Thesis, Carleton University, Ottawa, Canada.
    [18]
    Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. 2007. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In Proceedings of ACM International Conference on Embedded Networked Sensor Systems (SENSYS’07). 233--246.
    [19]
    Ming Li, Shucheng Yu, Wenjing Lou, and Kui Ren. 2010. Group device pairing based secure sensor association and key management for body area networks. In Proceedings of IEEE Conference on Information Communications (INFOCOM’10). 2651--2659.
    [20]
    Xiao Liang, Larry J. Greenstein, Narayan B. Mandayam, and Wade Trappe. 2008. Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 7, 7, 2571--2579.
    [21]
    Wenbo Mao. 2004. Modern Cryptography Theory and Practice (4th ed.). Prentice Hall, Upper Saddle River, New Jersey.
    [22]
    Rene Mayrhofer and Hans Gellersen. 2007. “Shake Well Before Use”: Authentication based on accelerometer data. In Pervasive Computing 2007. LNCS 4480. 144--161.
    [23]
    Kurt H. Mueller and Markus S. Müller. 1976. Timing recovery in digital synchronous data receivers. IEEE Transactions on Communications, COM-24, 5, 516--531.
    [24]
    Elizabeth D. Mynatt, Anne-Sophie Melenhorst, Arthur D. Fisk, and Wendy A. Rogers. 2004. Aware technologies for aging in place: Understanding user needs and attitudes. IEEE Pervasive Computing 3, 2, 36--41.
    [25]
    Rohan Nanda, Shobhit Tiwari, and P. Venkata Krishna. 2011. Secure and efficient key management scheme for wireless sensor networks. In Proceedings of the IEEE Conference on Electronics Computer Technology (ICECT), 58--61. Kanyakumari, India.
    [26]
    National Aging in Place Council. National Aging in Place Council. 2010. Retrieved January 3 2010, from http://www.ageinplace.org/.
    [27]
    George Nychis. 2009. Comprehensive GNU Radio Archive Network: CMU_MACS. Retrieved November 12, 2009, from https://www.cgran.org/wiki/CMUmacs.
    [28]
    Neal Patwari, Jessica Croft, Suman Jana, and Sneha K. Kasera. 2010. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Communications 9, 1, 17--30.
    [29]
    Qiang Qiu, Tieyan Li, and Jit Biswas. 2005. Improving sensor network security with information quality. ESAS 2005. LNCS 3813, 68--79.
    [30]
    Kasper Bonne Rasmussen and Srdjan Capkun. 2007. Implications of radio fingerprinting on the security of sensor networks. In Proceedings of Security and Privacy in Communications Networks. 1--10.
    [31]
    Saeed Ur Rehman, Kevin Sowerby, and Colin Coghill. 2012. RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In Proceedings of Australian Communications Theory Workshop 2012. 90--95.
    [32]
    Kui Ren, Hai Su, and Qian Wang. 2011. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications 18, 4, 6--12.
    [33]
    Paul C. A. Roberts. 2008. Understanding phase noise in RF and microwave calibration applications. NCSL International Workshop and Symposium. 1--8. Retrieved October 12, 2014, from http://support.fluke.com/calibration-sales/Download/Asset/9010168_ENG_A_W.PDF.
    [34]
    Thomas Schmid and George Nychis. 2011. The comprehensive GNU radio archive network: UCLA zigbee phy. Retrieved January 5, 2011, from https://www.cgran.org/wiki/UCLAZigBee.
    [35]
    Bartlomiej Sieka. 2006. Active fingerprinting of 802.11 devices by timing analysis. In Proceedings of IEEE Consumer Communications and Networking Conference. 15--19.
    [36]
    Frank Stajano and Ross Anderson. 1999. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols. 172--194.
    [37]
    William C. Suski, Michael A. Temple, Michael J. Mendenhall, and Robert F. Mills. 2008. Using spectral fingerprints to improve wireless network security. In Proceedings of IEEE Globecom. 2185--2189.
    [38]
    Önder H. Tekbas, Oktay Üreten, and Nur Serinken. 2004. Improvement of transmitter identification system for low snr transients. Electronics Letters 40, 3, 1--2.
    [39]
    Texas Instruments Semiconductor. 2008. Single-Chip 2.4 GHz IEEE 802.15.4 Compliant and ZigBee™ Ready RF Transceiver. Retrieved March 20, 2008, from http://www.ti.com/product/cc2420
    [40]
    McKay D. Williams, Michael A. Temple, and Donald R. Reising. 2010. Augmenting bit-level network security using physical layer RF-DNA fingerprinting. In Proceedings of IEEE Global Telecommunications Conference (IEEE Globecom). Miami, FL, 1--6.

    Cited By

    View all
    • (2024)Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based FingerprintingACM Transactions on Sensor Networks10.1145/358269120:2(1-27)Online publication date: 9-Jan-2024
    • (2024)Radio frequency fingerprinting techniques for device identification: a surveyInternational Journal of Information Security10.1007/s10207-023-00801-z23:2(1389-1427)Online publication date: 1-Apr-2024
    • (2023)Hardware feature extraction technology for resource aggregation control communication channel and signal sourceSixth International Conference on Intelligent Computing, Communication, and Devices (ICCD 2023)10.1117/12.2682862(30)Online publication date: 16-Jun-2023
    • Show More Cited By

    Index Terms

    1. Wireless Fingerprints Inside a Wireless Sensor Network

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 11, Issue 2
      February 2015
      563 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/2656931
      • Editor:
      • Chenyang Lu
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 02 March 2015
      Accepted: 01 July 2014
      Revised: 01 June 2014
      Received: 01 June 2013
      Published in TOSN Volume 11, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Wireless fingerprints
      2. software-defined radio

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)26
      • Downloads (Last 6 weeks)4

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based FingerprintingACM Transactions on Sensor Networks10.1145/358269120:2(1-27)Online publication date: 9-Jan-2024
      • (2024)Radio frequency fingerprinting techniques for device identification: a surveyInternational Journal of Information Security10.1007/s10207-023-00801-z23:2(1389-1427)Online publication date: 1-Apr-2024
      • (2023)Hardware feature extraction technology for resource aggregation control communication channel and signal sourceSixth International Conference on Intelligent Computing, Communication, and Devices (ICCD 2023)10.1117/12.2682862(30)Online publication date: 16-Jun-2023
      • (2023)Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial ScenariosIEEE Transactions on Vehicular Technology10.1109/TVT.2022.323163372:5(6154-6164)Online publication date: May-2023
      • (2023)Comparison of Receiver Front-end Differences for RF Fingerprint based IoT Device Identification2023 8th International Conference on Signal and Image Processing (ICSIP)10.1109/ICSIP57908.2023.10271025(979-984)Online publication date: 8-Jul-2023
      • (2023)Performance Analysis of User Authentication Schemes in Wireless Sensor NetworksProceedings of International Conference on Recent Innovations in Computing10.1007/978-981-19-9876-8_43(571-583)Online publication date: 3-May-2023
      • (2022)Mobile Device Identification Based on Two-dimensional Representation of RF Fingerprint with Deep Learning2022 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC55528.2022.9913038(1-6)Online publication date: 30-Jun-2022
      • (2022)An All-data-segment Radio Frequency Fingerprint Extraction Method Based on Cross-power Spectrum2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE)10.1109/ICCECE54139.2022.9712663(384-388)Online publication date: 14-Jan-2022
      • (2021)NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor NetworksIEEE Transactions on Communications10.1109/TCOMM.2021.307144869:7(4691-4703)Online publication date: Jul-2021
      • (2021)A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device RecognitionIEEE Internet of Things Journal10.1109/JIOT.2021.30514028:14(11276-11289)Online publication date: 15-Jul-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media