Review
BibTex RIS Cite

A Review of Recent Developments on Secure Authentication Using RF Fingerprints Techniques

Year 2022, Volume: 5 Issue: 3, 278 - 303, 31.12.2022
https://doi.org/10.35377/saucis...1084024

Abstract

The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the number of devices communicating wirelessly (using various communication standards) grows. Due to resource constraints, customized security measures are not possible on IoT devices. As a result, security is becoming increasingly important in IoT. It is proposed in this study to use the physical layer properties of wireless signals as an effective method of increasing IoT security. According to the literature, radio frequency (RF) fingerprinting (RFF) techniques are used as an additional layer of security for wireless devices. To prevent spoofing or spoofing attacks, unique fingerprints appear to be used to identify wireless devices for security purposes (due to manufacturing defects in the devices' analog components). To overcome the difficulties in RFF, different parts of the transmitted signals (transient/preamble/steady-state) are used.
This review provides an overview of the most recent RFF technique developments. It discusses various solution methods as well as the challenges that researchers face when developing effective RFFs. It takes a step towards the discovery of the wireless world in this context by drawing attention to the existence of software-defined radios (SDR) for signal capture. It also demonstrates how and what features can be extracted from captured RF signals from various wireless communication devices. All of these approaches' methodologies, classification algorithms, and feature classification are explained.
In addition, this study discusses how deep learning, neural networks, and machine learning algorithms, in addition to traditional classifiers, can be used. Furthermore, the review gives researchers easy access to sample datasets in this field.

Supporting Institution

Bilecik Şeyh Edebali University Scientific Research Projects

Project Number

2021-01.BŞEÜ.01-01

References

  • [1] M. Z. Gündüz and D. Resul, "Nesnelerin interneti: Gelişimi, bileşenleri ve uygulama alanları," Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, vol. 24, pp. 327-335, 2018.
  • [2] J. R. B. Higuera, J. B. Higuera, J. A. S. Montalvo, J. C. Villalba, and J. J. N. Pérez, "Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities," Computers, Materials and Continua, vol. 64, p. 3, 2020.
  • [3] D. Nouichi, M. Abdelsalam, Q. Nasir, and S. Abbas, "Iot devices security using rf fingerprinting," in 2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019, pp. 1-7.
  • [4] B. Danev, D. Zanetti, and S. Capkun, "On physical-layer identification of wireless devices," ACM Computing Surveys (CSUR), vol. 45, pp. 1-29, 2012.
  • [5] M. D. Williams, M. A. Temple, and D. R. Reising, "Augmenting bit-level network security using physical layer RF-DNA fingerprinting," in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010, pp. 1-6.
  • [6] R. Akeela and B. Dezfouli, "Software-defined Radios: Architecture, state-of-the-art, and challenges," Computer Communications, vol. 128, pp. 106-125, 2018.
  • [7] M. Gummineni and T. R. Polipalli, "Implementation of reconfigurable transceiver using GNU Radio and HackRF One," Wireless Personal Communications, pp. 1-17, 2020.
  • [8] H. Miyashiro, M. Medrano, J. Huarcaya, and J. Lezama, "Software defined radio for hands-on communication theory," in 2017 IEEE XXIV International Conference on Electronics, Electrical Engineering and Computing (INTERCON), 2017, pp. 1-4.
  • [9] M. Sruthi, M. Abirami, A. Manikkoth, R. Gandhiraj, and K. Soman, "Low cost digital transceiver design for Software Defined Radio using RTL-SDR," in 2013 international mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s), 2013, pp. 852-855.
  • [10] B. Paillassa and C. Morlet, "Flexible satellites: software radio in the sky," in 10th International Conference on Telecommunications, 2003. ICT 2003., 2003, pp. 1596-1600.
  • [11] P. Angeletti, R. De Gaudenzi, and M. Lisi, "From" Bent pipes" to" software defined payloads": evolution and trends of satellite communications systems," in 26th International Communications Satellite Systems Conference (ICSSC), 2008.
  • [12] P. Angeletti, M. Lisi, and P. Tognolatti, "Software Defined Radio: A key technology for flexibility and reconfigurability in space applications," in 2014 IEEE Metrology for Aerospace (MetroAeroSpace), 2014, pp. 399-403.
  • [13] W. Xiang, F. Sotiropoulos, and S. Liu, "xRadio: an novel software defined radio (SDR) platform and its exemplar application to vehicle-to-vehicle communications," in International Conference on Ad-Hoc Networks and Wireless, 2015, pp. 404-415.
  • [14] K. D. Singh, P. Rawat, and J.-M. Bonnin, "Cognitive radio for vehicular ad hoc networks (CR-VANETs): approaches and challenges," EURASIP journal on wireless communications and networking, vol. 2014, pp. 1-22, 2014.
  • [15] M. Kloc, R. Weigel, and A. Koelpin, "SDR implementation of an adaptive low-latency IEEE 802.11 p transmitter system for real-time wireless applications," in 2017 IEEE radio and wireless symposium (RWS), 2017, pp. 207-210.
  • [16] J. Seo, Y.-H. Chen, D. S. De Lorenzo, S. Lo, P. Enge, D. Akos, et al., "A real-time capable software-defined receiver using GPU for adaptive anti-jam GPS sensors," Sensors, vol. 11, pp. 8966-8991, 2011.
  • [17] Y. Chen, S. Lu, H.-S. Kim, D. Blaauw, R. G. Dreslinski, and T. Mudge, "A low power software-defined-radio baseband processor for the Internet of Things," in 2016 IEEE international symposium on high performance computer architecture (HPCA), 2016, pp. 40-51.
  • [18] Y. Park, S. Kuk, I. Kang, and H. Kim, "Overcoming IoT language barriers using smartphone SDRs," IEEE Transactions on Mobile Computing, vol. 16, pp. 816-828, 2016.
  • [19] J. N. Samuel, "Specific emitter identification for GSM cellular telephones," University of Pretoria, 2018.
  • [20] B. Skorup, "Reclaiming federal spectrum: Proposals and recommendations," Colum. Sci. & Tech. L. Rev., vol. 15, p. 90, 2013.
  • [21] T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, "Fingerprinting Wi-Fi devices using software defined radios," in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 3-14.
  • [22] L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, "Design of a hybrid RF fingerprint extraction and device classification scheme," IEEE Internet of Things Journal, vol. 6, pp. 349-360, 2018.
  • [23] S. U. Rehman, S. Alam, and I. T. Ardekani, "An overview of radio frequency fingerprinting for low-end devices," International Journal of Mobile Computing and Multimedia Communications (IJMCMC), vol. 6, pp. 1-21, 2014.
  • [24] S. U. Rehman, K. W. Sowerby, and C. Coghill, "Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios," IET Communications, vol. 8, pp. 1274-1284, 2014.
  • [25] T.-Y. Lin, C.-M. Lai, and C.-W. Chen, "Using SDR Platform to Extract the RF Fingerprint of the Wireless Devices for Device Identification," in CS & IT Conference Proceedings, 2020.
  • [26] E. Uzundurukan, Y. Dalveren, and A. Kara, "A database for the radio frequency fingerprinting of Bluetooth devices," Data, vol. 5, p. 55, 2020.
  • [27] M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, and I. Guvenc, "Drone remote controller RF signal dataset," IEEE Dataport, 2020.
  • [28] Y. Liu, J. Wang, S. Niu, and H. Song, "ADS-B signals records for non-cryptographic identification and incremental learning," IEEE, Piscataway, NJ, USA, Data Set, 2021.
  • [29] Y. Liu, J. Wang, H. Song, S. Niu, and Y. Thomas, "A 24-hour signal recording dataset with labels for cybersecurity and IoT," IEEE, Piscataway, NJ, USA, Data Set, 2020.
  • [30] A. Jagannath, J. Jagannath, and P. S. P. V. Kumar, "A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges," arXiv preprint arXiv:2201.00680, 2022.
  • [31] A. Al-Shawabka, F. Restuccia, S. D’Oro, and T. Melodia, "Massive-Scale I/Q Datasets for WiFi Radio Fingerprinting," Computer Networks, vol. 182, p. 107566, 2020.
  • [32] S. Dolatshahi, A. Polak, and D. L. Goeckel, "Identification of wireless users via power amplifier imperfections," in 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, 2010, pp. 1553-1557.
  • [33] Q. Xu, R. Zheng, W. Saad, and Z. Han, "Device fingerprinting in wireless networks: Challenges and opportunities," IEEE Communications Surveys & Tutorials, vol. 18, pp. 94-104, 2015.
  • [34] P. Scanlon, I. O. Kennedy, and Y. Liu, "Feature extraction approaches to RF fingerprinting for device identification in femtocells," Bell Labs Technical Journal, vol. 15, pp. 141-151, 2010.
  • [35] J. Hall, M. Barbeau, and E. Kranakis, "Detection of transient in radio frequency fingerprinting using signal phase," Wireless and Optical Communications, pp. 13-18, 2003.
  • [36] A. C. Polak, S. Dolatshahi, and D. L. Goeckel, "Identifying wireless users via transmitter imperfections," IEEE Journal on selected areas in communications, vol. 29, pp. 1469-1479, 2011.
  • [37] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008, pp. 116-127.
  • [38] N. T. Nguyen, G. Zheng, Z. Han, and R. Zheng, "Device fingerprinting to enhance wireless security using nonparametric Bayesian method," in 2011 Proceedings IEEE INFOCOM, 2011, pp. 1404-1412.
  • [39] N. Soltanieh, Y. Norouzi, Y. Yang, and N. C. Karmakar, "A review of radio frequency fingerprinting techniques," IEEE Journal of Radio Frequency Identification, vol. 4, pp. 222-233, 2020.
  • [40] N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in Proceedings of the 13th annual ACM international conference on Mobile computing and networking, 2007, pp. 111-122.
  • [41] R. Zekavat and R. M. Buehrer, Handbook of position location: Theory, practice and advances vol. 27: John Wiley & Sons, 2011.
  • [42] Y. Ren, L. Peng, W. Bai, and J. Yu, "A practical study of channel influence on radio frequency fingerprint features," in 2018 IEEE International Conference on Electronics and Communication Engineering (ICECE), 2018, pp. 1-7.
  • [43] B. Danev, T. S. Heydt-Benjamin, and S. Capkun, "Physical-layer Identification of RFID Devices," in USENIX security symposium, 2009, pp. 199-214.
  • [44] Y. Huang, "Radio frequency fingerprint extraction of radio emitter based on I/Q imbalance," Procedia computer science, vol. 107, pp. 472-477, 2017.
  • [45] K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, "ORACLE: Optimized radio classification through convolutional neural networks," in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2019, pp. 370-378.
  • [46] A. Al-Shawabka, F. Restuccia, S. D’Oro, T. Jian, B. C. Rendon, N. Soltani, et al., "Exposing the fingerprint: Dissecting the impact of the wireless channel on radio fingerprinting," in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 646-655.
  • [47] S. U. Rehman, K. Sowerby, and C. Coghill, "RF fingerprint extraction from the energy envelope of an instantaneous transient signal," in 2012 Australian Communications Theory Workshop (AusCTW), 2012, pp. 90-95.
  • [48] B. Danev and S. Capkun, "Transient-based identification of wireless sensor nodes," in 2009 International Conference on Information Processing in Sensor Networks, 2009, pp. 25-36.
  • [49] Y. Yuan, Z. Huang, H. Wu, and X. Wang, "Specific emitter identification based on Hilbert-Huang transform-based time-frequency-energy distribution features," IET communications, vol. 8, pp. 2404-2412, 2014.
  • [50] R. W. Klein, M. A. Temple, and M. J. Mendenhall, "Application of wavelet-based RF fingerprinting to enhance wireless network security," Journal of Communications and Networks, vol. 11, pp. 544-555, 2009.
  • [51] M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, and I. Guvenc, "Micro-UAV detection and classification from RF fingerprints using machine learning techniques," in 2019 IEEE Aerospace Conference, 2019, pp. 1-13.
  • [52] C. Bertoncini, K. Rudd, B. Nousain, and M. Hinders, "Wavelet fingerprinting of radio-frequency identification (RFID) tags," IEEE Transactions on Industrial Electronics, vol. 59, pp. 4843-4850, 2011.
  • [53] G. Reus-Muns, D. Jaisinghani, K. Sankhe, and K. R. Chowdhury, "Trust in 5G open RANs through machine learning: RF fingerprinting on the POWDER PAWR platform," in GLOBECOM 2020-2020 IEEE Global Communications Conference, 2020, pp. 1-6.
  • [54] L. Zong, C. Xu, and H. Yuan, "A rf fingerprint recognition method based on deeply convolutional neural network," in 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), 2020, pp. 1778-1781.
  • [55] L. Ding, S. Wang, F. Wang, and W. Zhang, "Specific emitter identification via convolutional neural networks," IEEE Communications Letters, vol. 22, pp. 2591-2594, 2018.
  • [56] L. Peng, J. Zhang, M. Liu, and A. Hu, "Deep learning based RF fingerprint identification using differential constellation trace figure," IEEE Transactions on Vehicular Technology, vol. 69, pp. 1091-1095, 2019.
  • [57] T. Jian, B. C. Rendon, E. Ojuba, N. Soltani, Z. Wang, K. Sankhe, et al., "Deep learning for RF fingerprinting: A massive experimental study," IEEE Internet of Things Magazine, vol. 3, pp. 50-57, 2020.
  • [58] N. Soltani, G. Reus-Muns, B. Salehi, J. Dy, S. Ioannidis, and K. Chowdhury, "RF fingerprinting unmanned aerial vehicles with non-standard transmitter waveforms," IEEE Transactions on Vehicular Technology, vol. 69, pp. 15518-15531, 2020.
  • [59] J.-H. Liang, Z.-T. Huang, and Z.-W. Li, "Method of empirical mode decomposition in specific emitter identification," Wireless Personal Communications, vol. 96, pp. 2447-2461, 2017.
  • [60] P. H. Moose, "A technique for orthogonal frequency division multiplexing frequency offset correction," IEEE Transactions on communications, vol. 42, pp. 2908-2914, 1994.
  • [61] S. Kaur, C. Singh, and A. S. Sappal, "Effects and estimation techniques of symbol time offset and carrier frequency offset in OFDM system: Simulation and analysis," International Journal of Electronics and Computer Science Engineering, pp. 1188-1196, 2012.
  • [62] S. Ellingson, "Correcting IQ imbalance in direct conversion receivers," Argus Technical and Scientific Documents, 2003.
  • [63] J. Li, Y. Ying, C. Ji, and B. Zhang, "Differential contour stellar-based radio frequency fingerprint identification for Internet of Things," IEEE Access, vol. 9, pp. 53745-53753, 2021.
  • [64] T. Higuchi, "Approach to an irregular time series on the basis of the fractal theory," Physica D: Nonlinear Phenomena, vol. 31, pp. 277-283, 1988.
  • [65] O. Ureten and N. Serinken, "Bayesian detection of Wi-Fi transmitter RF fingerprints," Electronics Letters, vol. 41, pp. 373-374, 2005.
  • [66] O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Canadian Journal of Electrical and Computer Engineering, vol. 32, pp. 27-33, 2007.
  • [67] L. Huang, M. Gao, C. Zhao, and X. Wu, "Detection of Wi-Fi transmitter transients using statistical method," in 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013), 2013, pp. 1-5.
  • [68] Y. Cao, W.-w. Tung, J. Gao, V. A. Protopopescu, and L. M. Hively, "Detecting dynamical changes in time series using the permutation entropy," Physical review E, vol. 70, p. 046217, 2004.
  • [69] Y.-J. Yuan, X. Wang, Z.-T. Huang, and Z.-C. Sha, "Detection of radio transient signal based on permutation entropy and GLRT," Wireless Personal Communications, vol. 82, pp. 1047-1057, 2015.
  • [70] C. Bandt and B. Pompe, "Permutation entropy: a natural complexity measure for time series," Physical review letters, vol. 88, p. 174102, 2002.
  • [71] S. Kay, "Volume II: Detection Theory," Fundamentals of Statistical Signal Processing; PTR Prentice Hall: Upper Saddle River, NJ, USA, pp. 465-466, 1993.
  • [72] S. M. Kay, Fundamentals of statistical signal processing: estimation theory: Prentice-Hall, Inc., 1993.
  • [73] A. Candore, O. Kocabas, and F. Koushanfar, "Robust stable radiometric fingerprinting for wireless devices," in 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 2009, pp. 43-49.
  • [74] S. M. Markalous, S. Tenbohlen, and K. Feser, "Detection and location of partial discharges in power transformers using acoustic and electromagnetic signals," IEEE Transactions on Dielectrics and Electrical Insulation, vol. 15, pp. 1576-1583, 2008.
  • [75] C. Herold, T. Leibfried, S. Markalous, and I. Quint, "Algorithms for automated arrival time estimation of partial discharge signals in power cables," in Proc. Int. Symp. High Volt. Eng.(ISH), 2007.
  • [76] I. S. Mohamed, Y. Dalveren, and A. Kara, "Performance Assessment of Transient Signal Detection Methods and Superiority of Energy Criterion (EC) Method," IEEE Access, vol. 8, pp. 115613-115620, 2020.
  • [77] M. Barbeau, J. Hall, and E. Kranakis, "Detection of rogue devices in bluetooth networks using radio frequency fingerprinting," in proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN, 2006, pp. 4-6.
  • [78] K. B. Rasmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, 2007, pp. 331-340.
  • [79] C. Zhao, T. Y. Chi, L. Huang, Y. Yao, and S.-Y. Kuo, "Wireless local area network cards identification based on transient fingerprinting," Wireless Communications and Mobile Computing, vol. 13, pp. 711-718, 2013.
  • [80] R. M. Gerdes, T. E. Daniels, M. Mina, and S. Russell, "Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach," in NDSS, 2006.
  • [81] Y. Shi and M. A. Jensen, "Improved radiometric identification of wireless devices using MIMO transmission," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1346-1354, 2011.
  • [82] I. O. Kennedy, P. Scanlon, F. J. Mullany, M. M. Buddhikot, K. E. Nolan, and T. W. Rondeau, "Radio transmitter fingerprinting: A steady state frequency domain approach," in 2008 IEEE 68th Vehicular Technology Conference, 2008, pp. 1-5.
  • [83] W. C. Suski II, M. A. Temple, M. J. Mendenhall, and R. F. Mills, "Radio frequency fingerprinting commercial communication devices to enhance electronic security," International Journal of Electronic Security and Digital Forensics, vol. 1, pp. 301-322, 2008.
  • [84] E. J. Oughton, W. Lehr, K. Katsaros, I. Selinis, D. Bubley, and J. Kusuma, "Revisiting wireless internet connectivity: 5G vs Wi-Fi 6," Telecommunications Policy, vol. 45, p. 102127, 2021.
  • [85] R. B. M. Abdelrahman, A. B. A. Mustafa, and A. A. Osman, "A Comparison between IEEE 802.11 a, b, g, n and ac Standards," IOSR Journal of Computer Engineering (IOSR-JEC), vol. 17, pp. 26-29, 2015.
  • [86] B. Mitchell, "Wireless Standards 802.11 a, 802.11 b/g/n, and 802.11 ac," Verkkojulkaisu. Saatavissa: http://compnetworking. about. com/cs/wireless80211/a/aa80211standard. htm [viitattu 8.4. 2015], 2015.
  • [87] R. Khanduri and S. Rattan, "Performance Comparison Analysis between IEEE 802.11 a/b/g/n Standards," International Journal of Computer Applications, vol. 78, pp. 13-20, 2013.
  • [88] B. Bellalta, "IEEE 802.11 ax: High-efficiency WLANs," IEEE Wireless Communications, vol. 23, pp. 38-46, 2016.
  • [89] D.-J. Deng, K.-C. Chen, and R.-S. Cheng, "IEEE 802.11 ax: Next generation wireless local area networks," in 10Th international conference on heterogeneous networking for quality, reliability, security and robustness, 2014, pp. 77-82.
  • [90] E. Khorov, A. Kiryanov, A. Lyakhov, and G. Bianchi, "A tutorial on IEEE 802.11 ax high efficiency WLANs," IEEE Communications Surveys & Tutorials, vol. 21, pp. 197-216, 2018.
  • [91] D. López-Pérez, A. Garcia-Rodriguez, L. Galati-Giordano, M. Kasslin, and K. Doppler, "IEEE 802.11 be extremely high throughput: The next generation of Wi-Fi technology beyond 802.11 ax," IEEE Communications Magazine, vol. 57, pp. 113-119, 2019.
  • [92] E. Khorov, I. Levitsky, and I. F. Akyildiz, "Current status and directions of IEEE 802.11 be, the future Wi-Fi 7," IEEE access, vol. 8, pp. 88664-88688, 2020.
  • [93] J. Yu, A. Hu, F. Zhou, Y. Xing, Y. Yu, G. Li, et al., "Radio frequency fingerprint identification based on denoising autoencoders," in 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 1-6.
  • [94] S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE transactions on Mobile Computing, vol. 9, pp. 449-462, 2009.
  • [95] T. Kohno, A. Broido, and K. C. Claffy, "Remote physical device fingerprinting," IEEE Transactions on Dependable and Secure Computing, vol. 2, pp. 93-108, 2005.
  • [96] R. W. Klein, M. A. Temple, and M. J. Mendenhall, "Application of wavelet denoising to improve OFDM‐based signal detection and classification," Security and Communication Networks, vol. 3, pp. 71-82, 2010.
  • [97] W. C. Suski II, M. A. Temple, M. J. Mendenhall, and R. F. Mills, "Using spectral fingerprints to improve wireless network security," in IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 2008, pp. 1-5.
  • [98] D. Zanetti, B. Danev, and S. ೄapkun, "Physical-layer identification of UHF RFID tags," in Proceedings of the sixteenth annual international conference on Mobile computing and networking, 2010, pp. 353-364.
  • [99] S. C. G. Periaswamy, D. R. Thompson, and J. Di, "Fingerprinting RFID tags," IEEE Transactions on Dependable and Secure Computing, vol. 8, pp. 938-943, 2010.
  • [100] S. Chinnappa Gounder Periaswamy, D. R. Thompson, H. P. Romero, and J. Di, "Fingerprinting radio frequency identification tags using timing characteristics," in Radio Frequency Identification System Security, ed: IOS Press, 2010, pp. 73-81.
  • [101] D. R. Reising, M. A. Temple, and M. J. Mendenhall, "Improved wireless security for GMSK-based devices using RF fingerprinting," International Journal of Electronic Security and Digital Forensics, vol. 3, pp. 41-59, 2010.
  • [102] J. Padilla, P. Padilla, J. Valenzuela-Valdés, J. Ramírez, and J. Górriz, "RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation," Measurement, vol. 58, pp. 468-475, 2014.
  • [103] F. Chen, Q. Yan, C. Shahriar, C. Lu, W. Lou, and T. C. Clancy, "On passive wireless device fingerprinting using infinite hidden markov random field," submitted for publication, 2017.
  • [104] S. Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, "Deep learning convolutional neural networks for radio identification," IEEE Communications Magazine, vol. 56, pp. 146-152, 2018.
  • [105] J. A. Van Randwyk, J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, and D. Sicker, "Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting," Sandia National Lab.(SNL-CA), Livermore, CA (United States)2006.
  • [106] K. Gao, C. Corbett, and R. Beyah, "A passive approach to wireless device fingerprinting," in 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), 2010, pp. 383-392.
  • [107] S. V. Radhakrishnan, A. S. Uluagac, and R. Beyah, "GTID: A technique for physical device and device type fingerprinting," IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 519-532, 2014.
  • [108] T. J. O’Shea, J. Corgan, and T. C. Clancy, "Convolutional radio modulation recognition networks," in International conference on engineering applications of neural networks, 2016, pp. 213-226.
  • [109] T. J. O’Shea and J. Hoydis, "An introduction to machine learning communications systems," arXiv preprint arXiv:1702.00832, 2017.
  • [110] G. Shen, J. Zhang, A. Marshall, L. Peng, and X. Wang, "Radio Frequency Fingerprint Identification for LoRa Using Deep Learning," IEEE Journal on Selected Areas in Communications, 2021.
  • [111] S. Ding, N. Zhang, X. Xu, L. Guo, and J. Zhang, "Deep extreme learning machine and its application in EEG classification," Mathematical Problems in Engineering, vol. 2015, 2015.
Year 2022, Volume: 5 Issue: 3, 278 - 303, 31.12.2022
https://doi.org/10.35377/saucis...1084024

Abstract

Project Number

2021-01.BŞEÜ.01-01

References

  • [1] M. Z. Gündüz and D. Resul, "Nesnelerin interneti: Gelişimi, bileşenleri ve uygulama alanları," Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, vol. 24, pp. 327-335, 2018.
  • [2] J. R. B. Higuera, J. B. Higuera, J. A. S. Montalvo, J. C. Villalba, and J. J. N. Pérez, "Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities," Computers, Materials and Continua, vol. 64, p. 3, 2020.
  • [3] D. Nouichi, M. Abdelsalam, Q. Nasir, and S. Abbas, "Iot devices security using rf fingerprinting," in 2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019, pp. 1-7.
  • [4] B. Danev, D. Zanetti, and S. Capkun, "On physical-layer identification of wireless devices," ACM Computing Surveys (CSUR), vol. 45, pp. 1-29, 2012.
  • [5] M. D. Williams, M. A. Temple, and D. R. Reising, "Augmenting bit-level network security using physical layer RF-DNA fingerprinting," in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010, pp. 1-6.
  • [6] R. Akeela and B. Dezfouli, "Software-defined Radios: Architecture, state-of-the-art, and challenges," Computer Communications, vol. 128, pp. 106-125, 2018.
  • [7] M. Gummineni and T. R. Polipalli, "Implementation of reconfigurable transceiver using GNU Radio and HackRF One," Wireless Personal Communications, pp. 1-17, 2020.
  • [8] H. Miyashiro, M. Medrano, J. Huarcaya, and J. Lezama, "Software defined radio for hands-on communication theory," in 2017 IEEE XXIV International Conference on Electronics, Electrical Engineering and Computing (INTERCON), 2017, pp. 1-4.
  • [9] M. Sruthi, M. Abirami, A. Manikkoth, R. Gandhiraj, and K. Soman, "Low cost digital transceiver design for Software Defined Radio using RTL-SDR," in 2013 international mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s), 2013, pp. 852-855.
  • [10] B. Paillassa and C. Morlet, "Flexible satellites: software radio in the sky," in 10th International Conference on Telecommunications, 2003. ICT 2003., 2003, pp. 1596-1600.
  • [11] P. Angeletti, R. De Gaudenzi, and M. Lisi, "From" Bent pipes" to" software defined payloads": evolution and trends of satellite communications systems," in 26th International Communications Satellite Systems Conference (ICSSC), 2008.
  • [12] P. Angeletti, M. Lisi, and P. Tognolatti, "Software Defined Radio: A key technology for flexibility and reconfigurability in space applications," in 2014 IEEE Metrology for Aerospace (MetroAeroSpace), 2014, pp. 399-403.
  • [13] W. Xiang, F. Sotiropoulos, and S. Liu, "xRadio: an novel software defined radio (SDR) platform and its exemplar application to vehicle-to-vehicle communications," in International Conference on Ad-Hoc Networks and Wireless, 2015, pp. 404-415.
  • [14] K. D. Singh, P. Rawat, and J.-M. Bonnin, "Cognitive radio for vehicular ad hoc networks (CR-VANETs): approaches and challenges," EURASIP journal on wireless communications and networking, vol. 2014, pp. 1-22, 2014.
  • [15] M. Kloc, R. Weigel, and A. Koelpin, "SDR implementation of an adaptive low-latency IEEE 802.11 p transmitter system for real-time wireless applications," in 2017 IEEE radio and wireless symposium (RWS), 2017, pp. 207-210.
  • [16] J. Seo, Y.-H. Chen, D. S. De Lorenzo, S. Lo, P. Enge, D. Akos, et al., "A real-time capable software-defined receiver using GPU for adaptive anti-jam GPS sensors," Sensors, vol. 11, pp. 8966-8991, 2011.
  • [17] Y. Chen, S. Lu, H.-S. Kim, D. Blaauw, R. G. Dreslinski, and T. Mudge, "A low power software-defined-radio baseband processor for the Internet of Things," in 2016 IEEE international symposium on high performance computer architecture (HPCA), 2016, pp. 40-51.
  • [18] Y. Park, S. Kuk, I. Kang, and H. Kim, "Overcoming IoT language barriers using smartphone SDRs," IEEE Transactions on Mobile Computing, vol. 16, pp. 816-828, 2016.
  • [19] J. N. Samuel, "Specific emitter identification for GSM cellular telephones," University of Pretoria, 2018.
  • [20] B. Skorup, "Reclaiming federal spectrum: Proposals and recommendations," Colum. Sci. & Tech. L. Rev., vol. 15, p. 90, 2013.
  • [21] T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, "Fingerprinting Wi-Fi devices using software defined radios," in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 3-14.
  • [22] L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, "Design of a hybrid RF fingerprint extraction and device classification scheme," IEEE Internet of Things Journal, vol. 6, pp. 349-360, 2018.
  • [23] S. U. Rehman, S. Alam, and I. T. Ardekani, "An overview of radio frequency fingerprinting for low-end devices," International Journal of Mobile Computing and Multimedia Communications (IJMCMC), vol. 6, pp. 1-21, 2014.
  • [24] S. U. Rehman, K. W. Sowerby, and C. Coghill, "Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios," IET Communications, vol. 8, pp. 1274-1284, 2014.
  • [25] T.-Y. Lin, C.-M. Lai, and C.-W. Chen, "Using SDR Platform to Extract the RF Fingerprint of the Wireless Devices for Device Identification," in CS & IT Conference Proceedings, 2020.
  • [26] E. Uzundurukan, Y. Dalveren, and A. Kara, "A database for the radio frequency fingerprinting of Bluetooth devices," Data, vol. 5, p. 55, 2020.
  • [27] M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, and I. Guvenc, "Drone remote controller RF signal dataset," IEEE Dataport, 2020.
  • [28] Y. Liu, J. Wang, S. Niu, and H. Song, "ADS-B signals records for non-cryptographic identification and incremental learning," IEEE, Piscataway, NJ, USA, Data Set, 2021.
  • [29] Y. Liu, J. Wang, H. Song, S. Niu, and Y. Thomas, "A 24-hour signal recording dataset with labels for cybersecurity and IoT," IEEE, Piscataway, NJ, USA, Data Set, 2020.
  • [30] A. Jagannath, J. Jagannath, and P. S. P. V. Kumar, "A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges," arXiv preprint arXiv:2201.00680, 2022.
  • [31] A. Al-Shawabka, F. Restuccia, S. D’Oro, and T. Melodia, "Massive-Scale I/Q Datasets for WiFi Radio Fingerprinting," Computer Networks, vol. 182, p. 107566, 2020.
  • [32] S. Dolatshahi, A. Polak, and D. L. Goeckel, "Identification of wireless users via power amplifier imperfections," in 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, 2010, pp. 1553-1557.
  • [33] Q. Xu, R. Zheng, W. Saad, and Z. Han, "Device fingerprinting in wireless networks: Challenges and opportunities," IEEE Communications Surveys & Tutorials, vol. 18, pp. 94-104, 2015.
  • [34] P. Scanlon, I. O. Kennedy, and Y. Liu, "Feature extraction approaches to RF fingerprinting for device identification in femtocells," Bell Labs Technical Journal, vol. 15, pp. 141-151, 2010.
  • [35] J. Hall, M. Barbeau, and E. Kranakis, "Detection of transient in radio frequency fingerprinting using signal phase," Wireless and Optical Communications, pp. 13-18, 2003.
  • [36] A. C. Polak, S. Dolatshahi, and D. L. Goeckel, "Identifying wireless users via transmitter imperfections," IEEE Journal on selected areas in communications, vol. 29, pp. 1469-1479, 2011.
  • [37] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008, pp. 116-127.
  • [38] N. T. Nguyen, G. Zheng, Z. Han, and R. Zheng, "Device fingerprinting to enhance wireless security using nonparametric Bayesian method," in 2011 Proceedings IEEE INFOCOM, 2011, pp. 1404-1412.
  • [39] N. Soltanieh, Y. Norouzi, Y. Yang, and N. C. Karmakar, "A review of radio frequency fingerprinting techniques," IEEE Journal of Radio Frequency Identification, vol. 4, pp. 222-233, 2020.
  • [40] N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in Proceedings of the 13th annual ACM international conference on Mobile computing and networking, 2007, pp. 111-122.
  • [41] R. Zekavat and R. M. Buehrer, Handbook of position location: Theory, practice and advances vol. 27: John Wiley & Sons, 2011.
  • [42] Y. Ren, L. Peng, W. Bai, and J. Yu, "A practical study of channel influence on radio frequency fingerprint features," in 2018 IEEE International Conference on Electronics and Communication Engineering (ICECE), 2018, pp. 1-7.
  • [43] B. Danev, T. S. Heydt-Benjamin, and S. Capkun, "Physical-layer Identification of RFID Devices," in USENIX security symposium, 2009, pp. 199-214.
  • [44] Y. Huang, "Radio frequency fingerprint extraction of radio emitter based on I/Q imbalance," Procedia computer science, vol. 107, pp. 472-477, 2017.
  • [45] K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and K. Chowdhury, "ORACLE: Optimized radio classification through convolutional neural networks," in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2019, pp. 370-378.
  • [46] A. Al-Shawabka, F. Restuccia, S. D’Oro, T. Jian, B. C. Rendon, N. Soltani, et al., "Exposing the fingerprint: Dissecting the impact of the wireless channel on radio fingerprinting," in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 646-655.
  • [47] S. U. Rehman, K. Sowerby, and C. Coghill, "RF fingerprint extraction from the energy envelope of an instantaneous transient signal," in 2012 Australian Communications Theory Workshop (AusCTW), 2012, pp. 90-95.
  • [48] B. Danev and S. Capkun, "Transient-based identification of wireless sensor nodes," in 2009 International Conference on Information Processing in Sensor Networks, 2009, pp. 25-36.
  • [49] Y. Yuan, Z. Huang, H. Wu, and X. Wang, "Specific emitter identification based on Hilbert-Huang transform-based time-frequency-energy distribution features," IET communications, vol. 8, pp. 2404-2412, 2014.
  • [50] R. W. Klein, M. A. Temple, and M. J. Mendenhall, "Application of wavelet-based RF fingerprinting to enhance wireless network security," Journal of Communications and Networks, vol. 11, pp. 544-555, 2009.
  • [51] M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, and I. Guvenc, "Micro-UAV detection and classification from RF fingerprints using machine learning techniques," in 2019 IEEE Aerospace Conference, 2019, pp. 1-13.
  • [52] C. Bertoncini, K. Rudd, B. Nousain, and M. Hinders, "Wavelet fingerprinting of radio-frequency identification (RFID) tags," IEEE Transactions on Industrial Electronics, vol. 59, pp. 4843-4850, 2011.
  • [53] G. Reus-Muns, D. Jaisinghani, K. Sankhe, and K. R. Chowdhury, "Trust in 5G open RANs through machine learning: RF fingerprinting on the POWDER PAWR platform," in GLOBECOM 2020-2020 IEEE Global Communications Conference, 2020, pp. 1-6.
  • [54] L. Zong, C. Xu, and H. Yuan, "A rf fingerprint recognition method based on deeply convolutional neural network," in 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), 2020, pp. 1778-1781.
  • [55] L. Ding, S. Wang, F. Wang, and W. Zhang, "Specific emitter identification via convolutional neural networks," IEEE Communications Letters, vol. 22, pp. 2591-2594, 2018.
  • [56] L. Peng, J. Zhang, M. Liu, and A. Hu, "Deep learning based RF fingerprint identification using differential constellation trace figure," IEEE Transactions on Vehicular Technology, vol. 69, pp. 1091-1095, 2019.
  • [57] T. Jian, B. C. Rendon, E. Ojuba, N. Soltani, Z. Wang, K. Sankhe, et al., "Deep learning for RF fingerprinting: A massive experimental study," IEEE Internet of Things Magazine, vol. 3, pp. 50-57, 2020.
  • [58] N. Soltani, G. Reus-Muns, B. Salehi, J. Dy, S. Ioannidis, and K. Chowdhury, "RF fingerprinting unmanned aerial vehicles with non-standard transmitter waveforms," IEEE Transactions on Vehicular Technology, vol. 69, pp. 15518-15531, 2020.
  • [59] J.-H. Liang, Z.-T. Huang, and Z.-W. Li, "Method of empirical mode decomposition in specific emitter identification," Wireless Personal Communications, vol. 96, pp. 2447-2461, 2017.
  • [60] P. H. Moose, "A technique for orthogonal frequency division multiplexing frequency offset correction," IEEE Transactions on communications, vol. 42, pp. 2908-2914, 1994.
  • [61] S. Kaur, C. Singh, and A. S. Sappal, "Effects and estimation techniques of symbol time offset and carrier frequency offset in OFDM system: Simulation and analysis," International Journal of Electronics and Computer Science Engineering, pp. 1188-1196, 2012.
  • [62] S. Ellingson, "Correcting IQ imbalance in direct conversion receivers," Argus Technical and Scientific Documents, 2003.
  • [63] J. Li, Y. Ying, C. Ji, and B. Zhang, "Differential contour stellar-based radio frequency fingerprint identification for Internet of Things," IEEE Access, vol. 9, pp. 53745-53753, 2021.
  • [64] T. Higuchi, "Approach to an irregular time series on the basis of the fractal theory," Physica D: Nonlinear Phenomena, vol. 31, pp. 277-283, 1988.
  • [65] O. Ureten and N. Serinken, "Bayesian detection of Wi-Fi transmitter RF fingerprints," Electronics Letters, vol. 41, pp. 373-374, 2005.
  • [66] O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Canadian Journal of Electrical and Computer Engineering, vol. 32, pp. 27-33, 2007.
  • [67] L. Huang, M. Gao, C. Zhao, and X. Wu, "Detection of Wi-Fi transmitter transients using statistical method," in 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013), 2013, pp. 1-5.
  • [68] Y. Cao, W.-w. Tung, J. Gao, V. A. Protopopescu, and L. M. Hively, "Detecting dynamical changes in time series using the permutation entropy," Physical review E, vol. 70, p. 046217, 2004.
  • [69] Y.-J. Yuan, X. Wang, Z.-T. Huang, and Z.-C. Sha, "Detection of radio transient signal based on permutation entropy and GLRT," Wireless Personal Communications, vol. 82, pp. 1047-1057, 2015.
  • [70] C. Bandt and B. Pompe, "Permutation entropy: a natural complexity measure for time series," Physical review letters, vol. 88, p. 174102, 2002.
  • [71] S. Kay, "Volume II: Detection Theory," Fundamentals of Statistical Signal Processing; PTR Prentice Hall: Upper Saddle River, NJ, USA, pp. 465-466, 1993.
  • [72] S. M. Kay, Fundamentals of statistical signal processing: estimation theory: Prentice-Hall, Inc., 1993.
  • [73] A. Candore, O. Kocabas, and F. Koushanfar, "Robust stable radiometric fingerprinting for wireless devices," in 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 2009, pp. 43-49.
  • [74] S. M. Markalous, S. Tenbohlen, and K. Feser, "Detection and location of partial discharges in power transformers using acoustic and electromagnetic signals," IEEE Transactions on Dielectrics and Electrical Insulation, vol. 15, pp. 1576-1583, 2008.
  • [75] C. Herold, T. Leibfried, S. Markalous, and I. Quint, "Algorithms for automated arrival time estimation of partial discharge signals in power cables," in Proc. Int. Symp. High Volt. Eng.(ISH), 2007.
  • [76] I. S. Mohamed, Y. Dalveren, and A. Kara, "Performance Assessment of Transient Signal Detection Methods and Superiority of Energy Criterion (EC) Method," IEEE Access, vol. 8, pp. 115613-115620, 2020.
  • [77] M. Barbeau, J. Hall, and E. Kranakis, "Detection of rogue devices in bluetooth networks using radio frequency fingerprinting," in proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN, 2006, pp. 4-6.
  • [78] K. B. Rasmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, 2007, pp. 331-340.
  • [79] C. Zhao, T. Y. Chi, L. Huang, Y. Yao, and S.-Y. Kuo, "Wireless local area network cards identification based on transient fingerprinting," Wireless Communications and Mobile Computing, vol. 13, pp. 711-718, 2013.
  • [80] R. M. Gerdes, T. E. Daniels, M. Mina, and S. Russell, "Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach," in NDSS, 2006.
  • [81] Y. Shi and M. A. Jensen, "Improved radiometric identification of wireless devices using MIMO transmission," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1346-1354, 2011.
  • [82] I. O. Kennedy, P. Scanlon, F. J. Mullany, M. M. Buddhikot, K. E. Nolan, and T. W. Rondeau, "Radio transmitter fingerprinting: A steady state frequency domain approach," in 2008 IEEE 68th Vehicular Technology Conference, 2008, pp. 1-5.
  • [83] W. C. Suski II, M. A. Temple, M. J. Mendenhall, and R. F. Mills, "Radio frequency fingerprinting commercial communication devices to enhance electronic security," International Journal of Electronic Security and Digital Forensics, vol. 1, pp. 301-322, 2008.
  • [84] E. J. Oughton, W. Lehr, K. Katsaros, I. Selinis, D. Bubley, and J. Kusuma, "Revisiting wireless internet connectivity: 5G vs Wi-Fi 6," Telecommunications Policy, vol. 45, p. 102127, 2021.
  • [85] R. B. M. Abdelrahman, A. B. A. Mustafa, and A. A. Osman, "A Comparison between IEEE 802.11 a, b, g, n and ac Standards," IOSR Journal of Computer Engineering (IOSR-JEC), vol. 17, pp. 26-29, 2015.
  • [86] B. Mitchell, "Wireless Standards 802.11 a, 802.11 b/g/n, and 802.11 ac," Verkkojulkaisu. Saatavissa: http://compnetworking. about. com/cs/wireless80211/a/aa80211standard. htm [viitattu 8.4. 2015], 2015.
  • [87] R. Khanduri and S. Rattan, "Performance Comparison Analysis between IEEE 802.11 a/b/g/n Standards," International Journal of Computer Applications, vol. 78, pp. 13-20, 2013.
  • [88] B. Bellalta, "IEEE 802.11 ax: High-efficiency WLANs," IEEE Wireless Communications, vol. 23, pp. 38-46, 2016.
  • [89] D.-J. Deng, K.-C. Chen, and R.-S. Cheng, "IEEE 802.11 ax: Next generation wireless local area networks," in 10Th international conference on heterogeneous networking for quality, reliability, security and robustness, 2014, pp. 77-82.
  • [90] E. Khorov, A. Kiryanov, A. Lyakhov, and G. Bianchi, "A tutorial on IEEE 802.11 ax high efficiency WLANs," IEEE Communications Surveys & Tutorials, vol. 21, pp. 197-216, 2018.
  • [91] D. López-Pérez, A. Garcia-Rodriguez, L. Galati-Giordano, M. Kasslin, and K. Doppler, "IEEE 802.11 be extremely high throughput: The next generation of Wi-Fi technology beyond 802.11 ax," IEEE Communications Magazine, vol. 57, pp. 113-119, 2019.
  • [92] E. Khorov, I. Levitsky, and I. F. Akyildiz, "Current status and directions of IEEE 802.11 be, the future Wi-Fi 7," IEEE access, vol. 8, pp. 88664-88688, 2020.
  • [93] J. Yu, A. Hu, F. Zhou, Y. Xing, Y. Yu, G. Li, et al., "Radio frequency fingerprint identification based on denoising autoencoders," in 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2019, pp. 1-6.
  • [94] S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE transactions on Mobile Computing, vol. 9, pp. 449-462, 2009.
  • [95] T. Kohno, A. Broido, and K. C. Claffy, "Remote physical device fingerprinting," IEEE Transactions on Dependable and Secure Computing, vol. 2, pp. 93-108, 2005.
  • [96] R. W. Klein, M. A. Temple, and M. J. Mendenhall, "Application of wavelet denoising to improve OFDM‐based signal detection and classification," Security and Communication Networks, vol. 3, pp. 71-82, 2010.
  • [97] W. C. Suski II, M. A. Temple, M. J. Mendenhall, and R. F. Mills, "Using spectral fingerprints to improve wireless network security," in IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 2008, pp. 1-5.
  • [98] D. Zanetti, B. Danev, and S. ೄapkun, "Physical-layer identification of UHF RFID tags," in Proceedings of the sixteenth annual international conference on Mobile computing and networking, 2010, pp. 353-364.
  • [99] S. C. G. Periaswamy, D. R. Thompson, and J. Di, "Fingerprinting RFID tags," IEEE Transactions on Dependable and Secure Computing, vol. 8, pp. 938-943, 2010.
  • [100] S. Chinnappa Gounder Periaswamy, D. R. Thompson, H. P. Romero, and J. Di, "Fingerprinting radio frequency identification tags using timing characteristics," in Radio Frequency Identification System Security, ed: IOS Press, 2010, pp. 73-81.
  • [101] D. R. Reising, M. A. Temple, and M. J. Mendenhall, "Improved wireless security for GMSK-based devices using RF fingerprinting," International Journal of Electronic Security and Digital Forensics, vol. 3, pp. 41-59, 2010.
  • [102] J. Padilla, P. Padilla, J. Valenzuela-Valdés, J. Ramírez, and J. Górriz, "RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation," Measurement, vol. 58, pp. 468-475, 2014.
  • [103] F. Chen, Q. Yan, C. Shahriar, C. Lu, W. Lou, and T. C. Clancy, "On passive wireless device fingerprinting using infinite hidden markov random field," submitted for publication, 2017.
  • [104] S. Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, "Deep learning convolutional neural networks for radio identification," IEEE Communications Magazine, vol. 56, pp. 146-152, 2018.
  • [105] J. A. Van Randwyk, J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, and D. Sicker, "Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting," Sandia National Lab.(SNL-CA), Livermore, CA (United States)2006.
  • [106] K. Gao, C. Corbett, and R. Beyah, "A passive approach to wireless device fingerprinting," in 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), 2010, pp. 383-392.
  • [107] S. V. Radhakrishnan, A. S. Uluagac, and R. Beyah, "GTID: A technique for physical device and device type fingerprinting," IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 519-532, 2014.
  • [108] T. J. O’Shea, J. Corgan, and T. C. Clancy, "Convolutional radio modulation recognition networks," in International conference on engineering applications of neural networks, 2016, pp. 213-226.
  • [109] T. J. O’Shea and J. Hoydis, "An introduction to machine learning communications systems," arXiv preprint arXiv:1702.00832, 2017.
  • [110] G. Shen, J. Zhang, A. Marshall, L. Peng, and X. Wang, "Radio Frequency Fingerprint Identification for LoRa Using Deep Learning," IEEE Journal on Selected Areas in Communications, 2021.
  • [111] S. Ding, N. Zhang, X. Xu, L. Guo, and J. Zhang, "Deep extreme learning machine and its application in EEG classification," Mathematical Problems in Engineering, vol. 2015, 2015.
There are 111 citations in total.

Details

Primary Language English
Subjects Computer Software, Software Engineering (Other)
Journal Section Articles
Authors

Hüseyin Parmaksız 0000-0001-8455-5625

Cihan Karakuzu 0000-0003-0569-098X

Project Number 2021-01.BŞEÜ.01-01
Publication Date December 31, 2022
Submission Date March 7, 2022
Acceptance Date October 11, 2022
Published in Issue Year 2022Volume: 5 Issue: 3

Cite

IEEE H. Parmaksız and C. Karakuzu, “A Review of Recent Developments on Secure Authentication Using RF Fingerprints Techniques”, SAUCIS, vol. 5, no. 3, pp. 278–303, 2022, doi: 10.35377/saucis...1084024.

Sakarya University Journal of Computer and Information Sciences in Applied Sciences and Engineering: An interdisciplinary journal of information science      28938