Considerations, Advances, and Challenges Associated with the Use of Specific Emitter Identification in the Security of Internet of Things Deployments: A Survey

被引:3
作者
Tyler, Joshua H. [1 ]
Fadul, Mohamed K. M. [1 ]
Reising, Donald R. [1 ]
机构
[1] Univ Tennessee Chattanooga, Coll Engn & Comp Sci, Elect Engn Dept, Chattanooga, TN 37403 USA
关键词
specific emitter identification; radio frequency fingerprinting; physical layer authentication; physical layer security; Internet of Things; FREQUENCY FINGERPRINT IDENTIFICATION; WIRELESS SECURITY; RADIO; DEVICES; CHANNEL; SYSTEM; AUTHENTICATION; CLASSIFICATION; REPRESENTATION; NETWORKS;
D O I
10.3390/info14090479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of attention within the research community as a physical layer technique for securing Internet of Things (IoT) deployments. This attention is largely due to SEI's demonstrated success in passively and uniquely identifying wireless emitters using traditional machine learning and the success of Deep Learning (DL) within the natural language processing and computer vision areas. SEI exploits distinct and unintentional features present within an emitter's transmitted signals. These distinctive and unintentional features are attributed to slight manufacturing and assembly variations within and between the components, sub-systems, and systems comprising an emitter's Radio Frequency (RF) front end. Although sufficient to facilitate SEI, these features do not hinder normal operations such as detection, channel estimation, timing, and demodulation. However, despite the plethora of SEI publications, it has remained largely a focus of academic endeavors, primarily focusing on proof-of-concept demonstration and little to no use in operational networks for various reasons. The focus of this survey is a review of SEI publications from the perspective of its use as a practical, effective, and usable IoT security mechanism; thus, we use IoT requirements and constraints (e.g., wireless standard, nature of their deployment) as a lens through which each reviewed paper is analyzed. Previous surveys have not taken such an approach and have only used IoT as motivation, a setting, or a context. In this survey, we consider operating conditions, SEI threats, SEI at scale, publicly available data sets, and SEI considerations that are dictated by the fact that it is to be employed by IoT devices or IoT infrastructure.
引用
收藏
页数:49
相关论文
共 196 条
  • [1] Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints
    Abanto-Leon, Luis Fernando
    Baeuml, Andreas
    Sim, Gek Hong
    Hollick, Matthias
    Asadi, Arash
    [J]. PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2020, 4 (03)
  • [2] Al-Shawabka A, 2020, IEEE INFOCOM SER, P646, DOI [10.1109/infocom41043.2020.9155259, 10.1109/INFOCOM41043.2020.9155259]
  • [3] Alom M.Z., 2018, P 2018 INT JOINT C N, P1
  • [4] [Anonymous], 2008, Politica criminal
  • [5] Azzouz E., 2013, AUTOMATIC MODULATION
  • [6] Bai Lin, 2020, [Journal of Communications and Information Networks, 通信与信息网络学报], V5, P237
  • [7] Comparison of techniques for radiometric identification based on deep convolutional neural networks
    Baldini, G.
    Gentile, C.
    Giuliani, R.
    Steri, G.
    [J]. ELECTRONICS LETTERS, 2019, 55 (02) : 90 - +
  • [8] An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN
    Baldini, Gianmarco
    Giuliani, Raimondo
    [J]. 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [9] A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components
    Baldini, Gianmarco
    Steri, Gary
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03): : 1761 - 1789
  • [10] Channel-Resilient Deep-Learning-Driven Device Fingerprinting Through Multiple Data Streams
    Basha, Nora
    Hamdaoui, Bechir
    Sivanesan, Kathiravetpillai
    Guizani, Mohsen
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 : 118 - 133