Title
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Abstract
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.
Year
DOI
Venue
2014
10.1016/j.jcss.2013.06.013
J. Comput. Syst. Sci.
Keywords
Field
DocType
practical situations receiver,rf fingerprinting process,impersonation attack,modulation-based rf fingerprinting system,rf fingerprinting technique,receiver hardware,unique rf fingerprint,success rate,rf fingerprinting,low-end receiver,hardware security
Discrete mathematics,Wireless,Hardware security module,Computer security,Computer network,Modulation,Fingerprint,Radio frequency,Physical layer,Impersonation attack,Commodity hardware,Mathematics
Journal
Volume
Issue
ISSN
80
3
0022-0000
Citations 
PageRank 
References 
21
0.95
29
Authors
3
Name
Order
Citations
PageRank
Saeed Ur Rehman111310.84
Kevin W. Sowerby220532.02
Colin Coghill3503.04