Towards Safer Connections: Secure Authentication in 5G Networks Leveraging Radio Frequency Fingerprinting

被引:0
作者
Hou, Namin [1 ]
Cheng, Yushi [2 ]
Ji, Xiaoyu [1 ]
Xu, Wenyuan [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
[2] Zhejiang Univ Univ Illinois Urbana Champaign Inst, Hangzhou, Peoples R China
来源
2024 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS, ICCCS 2024 | 2024年
基金
中国国家自然科学基金;
关键词
radio frequency fingerprinting; wireless security; mobile communication; machine learning;
D O I
10.1109/ICCCS61882.2024.10603286
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The advancement of Fifth-Generation (5G) technology has greatly enriched individuals' access to a broad array of convenient services, offering significant benefits in mobile communications, autonomous driving, smart homes, and the Internet of Things. However, with the increase in the number of network access devices, large and frequent data interactions have brought potential security risks to wireless networks, which are related to user privacy security, traffic safety, and even social security. Malicious intrusions targeting wireless communications have resulted in significant disruptions and incurred substantial losses. Presently, user identities in wireless communications rely on software-based data identifiers, which can be forged easily. This paper proposes a hardware-level device authentication mechanism that uses the intrinsic hardware characteristics of the transmitter (shown as impairments in the radio signal of the transmission link) for identity authentication. The resulting fingerprint is naturally distinctive and highly resistant to counterfeiting attempts. We use 5 devices across different models and 10 devices of the same model for experimental evaluation. Then we apply machine learning algorithms to construct a fingerprint database and device authentication, achieving an average of 82.4% precision, 89.9% recall, and 85.9% F1-score, which can help to safeguard the security of 5G communication.
引用
收藏
页码:277 / 284
页数:8
相关论文
共 24 条
[1]  
A. K. K. A, 2022, Journal of Communications, V17, P287
[2]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[3]  
[Anonymous], 2017, MINIMUM REQUIREMENTS
[4]   A Formal Analysis of 5G Authentication [J].
Basin, David ;
Dreier, Jannik ;
Hirschi, Lucca ;
Radomirovic, Sasa ;
Sasse, Ralf ;
Stettler, Vincent .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1383-1396
[5]  
Beale Jay, 2006, Wireshark & Ethereal network protocol analyzer toolkit
[6]   Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags [J].
Bertoncini, Crystal ;
Rudd, Kevin ;
Nousain, Bryan ;
Hinders, Mark .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) :4843-4850
[7]   Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh - A Python']Python package) [J].
Christ, Maximilian ;
Braun, Nils ;
Neuffer, Julius ;
Kempa-Liehr, Andreas W. .
NEUROCOMPUTING, 2018, 307 :72-77
[8]  
Dillinger M., 2005, Software defined radio: Architectures, systems and functions
[9]  
Engelhardt M., 2022, arXiv
[10]  
Foruhandeh Mahsa, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P242, DOI 10.1145/3395351.3399353