Discrete-time signal processing (2nd ed.)
Discrete-time signal processing (2nd ed.)
Guide to Biometrics
Identification of the Defective Transmission Devices Using the Wavelet Transform
IEEE Transactions on Pattern Analysis and Machine Intelligence
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Strengthening forensic investigations of child pornography on P2P networks
Proceedings of the 6th International COnference
Non-cryptographic authentication and identification in wireless networks
IEEE Wireless Communications
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Journal of Computer and System Sciences
Hi-index | 0.00 |
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperfections exhibited by its radio transceiver. It can be used to improve access control in wireless networks, revent device cloning and complement message authentication protocols. This paper studies the feasibility of performing impersonation attacks on the modulation-based and transient-based fingerprinting techniques. Both techniques are vulnerable to impersonation attacks; however, transient-based techniques are more difficult to reproduce due to the effects of the wireless channel and antenna in their recording process. We assess the feasibility of performing impersonation attacks by extensive measurements as well as simulations using collected data from wireless devices. We discuss the implications of our findings and how they affect current device identification techniques and related applications.