A Robust Radio-Frequency Fingerprint Extraction Scheme for Practical Device Recognition

被引:115
作者
Zhou, Xinyu [1 ]
Hu, Aiqun [2 ,3 ]
Li, Guyue [1 ,3 ]
Peng, Linning [1 ,3 ]
Xing, Yuexiu [2 ]
Yu, Jiabao [2 ,3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
[3] Purple Mt Labs, Frontier Crossing Sci Res Ctr, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
Feature extraction; Security; Zigbee; Internet of Things; Fading channels; Training; Data acquisition; Artificial noise; physical layer identification; radio-frequency (RF) fingerprint; security; ZigBee; NOISE; INTERNET; THINGS; AUTHENTICATION; CLASSIFICATION; SECURITY;
D O I
10.1109/JIOT.2021.3051402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency fingerprinting (RFF) exploiting hardware characteristics has been employed for device recognition to enhance the overall security. However, the performance unreliability in long-term experiments, channel fading interference, and unauthorized devices verification are three open problems that restrict the development of RFF recognition. To address these issues, a robust RFF extraction scheme based on three corresponding algorithms is studied. For the first problem, a long-term stacking of repetitive symbols (LSRSs) algorithm is proposed to reduce the acquired signal variance, which contributes to the identification accuracy and long-term stability. For the second issue, we propose an artificial noise adding (ANA) algorithm to enhance the recognition robustness through regularization and channel adaptation. For the third issue, a verification algorithm based on the generative Gaussian probabilistic linear discriminant analysis (GPLDA) model is developed to handle unauthorized devices. Our robust RFF extraction scheme is verified in the experiments with 54 CC2530 ZigBee devices. It enables reliable node identification with the accuracy of 99.50% in the short rang line-of-sight (SLOS) scenarios for signals collected over 18 months, and 95.52% in the extensive multipath fading experiments. The equal error rate (EER) of the verification experiments with six authorized devices versus six unseen unauthorized devices is as low as 0.63%.
引用
收藏
页码:11276 / 11289
页数:14
相关论文
共 51 条
[1]   Crowdsourced measurements for device fingerprinting [J].
Andrews, Seth ;
Gerdes, Ryan M. ;
Li, Ming .
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, :72-83
[2]  
[Anonymous], 2004, SPR PRO COM
[3]  
[Anonymous], 2012, Military Communications Conference, DOI DOI 10.1109/MILCOM.2012.6415804
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]   Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities [J].
Baker, Stephanie B. ;
Xiang, Wei ;
Atkinson, Ian .
IEEE ACCESS, 2017, 5 :26521-26544
[6]  
Barba M., 2006, Proceedings of the European Conference on Antennas and Propagation EuCAP 2006
[7]   TRAINING WITH NOISE IS EQUIVALENT TO TIKHONOV REGULARIZATION [J].
BISHOP, CM .
NEURAL COMPUTATION, 1995, 7 (01) :108-116
[8]   Noise source modeling for cyclostationary noise analysis in large-signal device operation [J].
Bonani, F ;
Guerrieri, SD ;
Ghione, G .
IEEE TRANSACTIONS ON ELECTRON DEVICES, 2002, 49 (09) :1640-1647
[9]   Wireless Device Identification with Radiometric Signatures [J].
Brik, Vladimir ;
Banerjee, Suman ;
Gruteser, Marco ;
Oh, Sangho .
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, :116-+
[10]  
Brummer N., P OD, P34