首页 | 本学科首页   官方微博 | 高级检索  
     


Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Authors:Saeed Ur Rehman  Kevin W Sowerby  Colin Coghill
Affiliation:Department of Electrical and Computer Engineering, The University of Auckland, 38 Princess St., Auckland Private Bag 92019, Auckland 1142, New Zealand
Abstract:Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.
Keywords:Radio fingerprinting  Impersonation attack  Physical layer security  Hardware security
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号