Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3317549.3323405acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Crowdsourced measurements for device fingerprinting

Published: 15 May 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Physical layer identification allows verifying a user's identity based on their transmitter hardware. In contrast with digital identifiers at higher protocol layers, physical layer identification or device fingerprinting can identify unique signal characteristics at the physical layer introduced by manufacturing variability specific to each device. Recently, dynamic spectrum access has been proposed to allow a larger number of devices to efficiently access wireless spectrum. In such a system many low-cost devices may be distributed over a large area with spectrum allocated and managed by a central authority. Traditional authentication methods may not be secure, or adequate to identify existing users in a backwards compatible way: Identifiers such as MAC addresses can be impersonated, and the number of devices and their distributed nature may make key distribution and revocation difficult. Consequently, physical layer identification can be used to augment other security measures.
    We consider a crowdsourced scenario where individual users observe a signal using their own receiver and report their measurements to an enforcement authority which then identifies malicious users. Three types of measurements that can be crowdsourced are considered: actual signal observations, feature values, and fingerprinter output. Several methods for combining these measurements are considered. Performance is demonstrated on data collected from three wireless channels, used to simulate multiple receivers, from a total of twelve transmitters. The methods are evaluated in terms of required computational resources, bandwidth to report measurements, and how they are affected by mismatch in receiver characteristics. It is found that the crowdsourcing measurements can provide an improvement over individual receivers, with the best method dependent on the features and receivers used.

    References

    [1]
    Seth Andrews, Ryan M Gerdes, and Ming Li. 2017. Towards physical layer identification of cognitive radio devices. In Conference on Communications and Network Security (CNS). IEEE.
    [2]
    Andrea Candore, Ovunc Kocabas, and Farinaz Koushanfar. 2009. Robust stable radiometric fingerprinting for wireless devices. In International Workshop on Hardware-Oriented Security and Trust (HOST). IEEE, 43--49.
    [3]
    T Charles Clancy and Nathan Goergen. 2008. Security in cognitive radio networks: Threats and mitigation. In 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. IEEE, 1--8.
    [4]
    Boris Danev and Srdjan Capkun. 2009. Transient-based identification of wireless sensor nodes. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. IEEE Computer Society, 25--36.
    [5]
    Boris Danev, Davide Zanetti, and Srdjan Capkun. 2016. Types and Origins of Fingerprints. In Digital Fingerprinting, Cliff Wang, Ryan M Gerdes, Yong Guan, and Sneha Kumar Kasera (Eds.). Springer, Chapter 1, 5--29.
    [6]
    Aveek Dutta and Mung Chiang. 2016. âĂIJSee Something, Say SomethingâĂİ Crowdsourced Enforcement of Spectrum Policies. IEEE Transactions on Wireless Communications 15, 1 (2016), 67--80.
    [7]
    Ettus Research. 2017. USRP B200/B210 Specification Sheet. (2017). Datasheet.
    [8]
    Hans G Feichtinger, Karlheinz Gr, and Thomas Strohmer. 1995. Efficient numerical methods in non-uniform sampling theory. Numer. Math. 69, 4 (1995), 423--440.
    [9]
    Hans G Feichtinger and Karlheinz Gröchenig. 1994. Theory and practice of irregular sampling. In Wavelets: mathematics and applications. 305--363.
    [10]
    Jeffrey A Fessler and Bradley P Sutton. 2003. Nonuniform fast Fourier transforms using min-max interpolation. IEEE Trans. on Signal Process. 51, 2 (2003), 560--574.
    [11]
    Isabelle Guyon and André Elisseeff. 2003. An introduction to variable and feature selection. Journal of machine learning research 3, Mar (2003), 1157--1182.
    [12]
    Mojgan Khaledi, Mehrdad Khaledi, Shamik Sarkar, Sneha Kasera, Neal Patwari, Kurt Derr, and Samuel Ramirez. 2017. Simultaneous Power-Based Localization of Transmitters for Crowdsourced Spectrum Monitoring. In Proc. 23rd International Conf. on Mobile Computing and Networking. ACM, 235--247.
    [13]
    Vireshwar Kumar, He Li, Jung-Min Jerry Park, and Kaigui Bian. 2018. Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 1--10.
    [14]
    Naoki Kurosawa, Haruo Kobayashi, Kaoru Maruyama, Hidetake Sugawara, and Kensuke Kobayashi. 2001. Explicit analysis of channel mismatch effects in time-interleaved ADC systems. IEEE Transactions on Circuits and Systems---Part I: Fundamental Theory and Applications 48, 3 (2001), 261--271.
    [15]
    Ming Li, Dejun Yang, Jian Lin, and Jian Tang. 2018. SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics. Computer Networks 143 (2018), 176--190.
    [16]
    Kevin Merchant, Shauna Revay, George Stantchev, and Bryan Nousain. 2018. Deep learning for RF device fingerprinting in cognitive communication networks. IEEE Journal of Selected Topics in Signal Processing 12, 1 (2018), 160--167.
    [17]
    Sung-Won Park, Wei-Da Hao, and Chung S Leung. 2012. Reconstruction of uniformly sampled sequence from nonuniformly sampled transient sequence using symmetric extension. IEEE Trans. on Signal Process. 60, 3 (2012), 1498--1501.
    [18]
    Saeed Ur Rehman, Kevin W Sowerby, and Colin Coghill. 2014. Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios. IET Communications 8, 8 (2014), 1274--1284.
    [19]
    Ahmed M Salama, Ming Li, and Dejun Yang. 2017. Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks. In GLOBECOM. IEEE, 1--6.
    [20]
    Tektronix, Inc. 2017. DPO7000 Series Datasheet. (2017). Datasheet.
    [21]
    Ralf van Otten. 2009. Timing correction of time-interleaved ADCs. Master's thesis. Eindhoven University of Technology, Eindhoven, Netherlands.
    [22]
    Rodney G Vaughan, Neil L Scott, and D Rod White. 1991. The theory of bandpass sampling. IEEE Transactions on Signal Processing 39, 9 (1991), 1973--1984.
    [23]
    Q. Xu, R. Zheng, W. Saad, and Z. Han. 2016. Device Fingerprinting in Wireless Networks: Challenges and Opportunities. IEEE Communications Surveys and Tutorials 18, 1 (Firstquarter 2016), 94--104.
    [24]
    Dejun Yang, Guoliang Xue, Xi Fang, and Jian Tang. 2012. Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In Proc. 18th International Conference on Mobile Computing and Networking. ACM, 173--184.
    [25]
    J Yen. 1956. On nonuniform sampling of bandwidth-limited signals. IRE Transactions on circuit theory 3, 4 (1956), 251--257.
    [26]
    Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, and Mohsen Guizani. 2015. Securing cognitive radio networks against primary user emulation attacks. IEEE Network 29, 4 (2015), 68--74.
    [27]
    Tevfik Yucek and Huseyin Arslan. 2009. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Comm. Surveys Tut. 11, 1 (2009), 116--130.
    [28]
    Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang. 2013. Secure crowdsourcing-based cooperative pectrum sensing. In 2013 Proceedings IEEE INFOCOM. IEEE, 2526--2534.
    [29]
    Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, and Yunhao Liu. {n. d.}. FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. In Proc. 2018 Asia Conf. on Computer and Communications Security (ASIA CCS). ACM, 261--272.

    Cited By

    View all
    • (2024)Towards Receiver-Agnostic and Collaborative Radio Frequency Fingerprint IdentificationIEEE Transactions on Mobile Computing10.1109/TMC.2023.334003923:7(7618-7634)Online publication date: Jul-2024
    • (2024)GAN-RXA: A Practical Scalable Solution to Receiver-Agnostic Transmitter FingerprintingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.332901210:2(403-416)Online publication date: Apr-2024
    • (2023)Receiver-Agnostic Radio Frequency Fingerprinting Based on Two-stage Unsupervised Domain Adaptation and Fine-tuningGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437074(6085-6090)Online publication date: 4-Dec-2023
    • Show More Cited By
    1. Crowdsourced measurements for device fingerprinting

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
        May 2019
        359 pages
        ISBN:9781450367264
        DOI:10.1145/3317549
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 May 2019

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article

        Funding Sources

        • http://dx.doi.org/10.13039/100000001

        Conference

        WiSec '19
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 98 of 338 submissions, 29%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)21
        • Downloads (Last 6 weeks)2

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Towards Receiver-Agnostic and Collaborative Radio Frequency Fingerprint IdentificationIEEE Transactions on Mobile Computing10.1109/TMC.2023.334003923:7(7618-7634)Online publication date: Jul-2024
        • (2024)GAN-RXA: A Practical Scalable Solution to Receiver-Agnostic Transmitter FingerprintingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2023.332901210:2(403-416)Online publication date: Apr-2024
        • (2023)Receiver-Agnostic Radio Frequency Fingerprinting Based on Two-stage Unsupervised Domain Adaptation and Fine-tuningGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437074(6085-6090)Online publication date: 4-Dec-2023
        • (2022)Mobile Device Fingerprinting Recognition using Insensitive Information2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML)10.1109/ICICML57342.2022.10009697(1-6)Online publication date: 28-Oct-2022
        • (2021)A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device RecognitionIEEE Internet of Things Journal10.1109/JIOT.2021.30514028:14(11276-11289)Online publication date: 15-Jul-2021
        • (2021)Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVMIEEE Internet of Things Journal10.1109/JIOT.2020.30453058:10(8356-8371)Online publication date: 15-May-2021

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media