A practical radio frequency fingerprinting scheme for mobile phones identification

被引:2
作者
Yang, Yang [1 ,3 ]
Hu, Aiqun [2 ,3 ]
Yu, Jiabao [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
[3] Purple Mt Labs Network & Commun Secur, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
Radio frequency fingerprint; Global System for Mobile; Anomaly filtering and stacking; Time Division Multiple Access;
D O I
10.1016/j.phycom.2022.101876
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency fingerprint (RFF) has attracted a remarkable surge of attention to wireless transmitter identification due to the inimitable hardware imperfection. However, most RFF-based schemes devised in controlled environments are unable to reach the claimed performance in real-world scenarios. This paper proposes a practical RFF identification method for mobile phones in Global System for Mobile (GSM) system. Specifically, the instantaneous amplitude of near-transient part in normal burst (NB) is regarded as RFF that extracted from up-link communications. In addition, an anomaly filtering and stacking (AFS) method is introduced to obtain stable RFF in Time Division Multiple Access (TDMA) system. Lastly, the impacts of frequency point and sending power variations on RFF are fully dissected in comparison experiments. Experiments on 10 mobile phones show that the proposed RFF scheme yields 99.17% True Acceptance Rate (TAR) in real wireless environments. Experiments also show that the varying transmission power decreases the accuracy of RFF identification. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:10
相关论文
共 36 条
  • [1] Alshehri A, 2021, INTERNATIONAL CONFERENCE ON TRANSPORTATION AND DEVELOPMENT 2021: TRANSPORTATION OPERATIONS, TECHNOLOGIES, AND SAFETY, P251, DOI 10.1145/3466772.3467054
  • [2] Wireless Device Identification with Radiometric Signatures
    Brik, Vladimir
    Banerjee, Suman
    Gruteser, Marco
    Oh, Sangho
    [J]. MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, : 116 - +
  • [3] CHOE HC, 1995, P SOC PHOTO-OPT INS, V2491, P504, DOI 10.1117/12.205415
  • [4] Hadzialic M, 2014, 2014 22ND TELECOMMUNICATIONS FORUM TELFOR (TELFOR), P99, DOI 10.1109/TELFOR.2014.7034366
  • [5] Hasse J., 2013, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, P131
  • [6] NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks
    Huan, Xintao
    Kim, Kyeong Soo
    Zhang, Junqing
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (07) : 4691 - 4703
  • [7] A Novel Framework for Open-Set Authentication of Internet of Things Using Limited Devices
    Huang, Keju
    Yang, Junan
    Hu, Pengjiang
    Liu, Hui
    [J]. SENSORS, 2022, 22 (07)
  • [8] Deep Learning for RF Fingerprinting: A Massive Experimental Study
    Jian, Tong
    Rendon, Bruno Costa
    Ojuba, Emmanuel
    Soltani, Nasim
    Wang, Zifeng
    Sankhe, Kunal
    Gritsenko, Andrey
    Dy, Jennifer
    Chowdhury, Kaushik
    Ioannidis, Stratis
    [J]. IEEE Internet of Things Magazine, 2020, 3 (01): : 50 - 57
  • [9] Solution of linear and non linear regression problem by K Nearest Neighbour approach
    Kumar, Tarun
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 197 - 201
  • [10] Liu HQ, 1999, 42ND MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, PROCEEDINGS, VOLS 1 AND 2, P678