Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

作者:

Highlights:

• The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike).

• All the transceivers (including two impersonators) have the same manufacturer and their transceiver front ends are equipped with similar components.

• A receiverʼs front end also contributes to its RF fingerprinting of a specific transmitter.

• The success rate of an impersonation attack is receiver dependent and receiver impairment effectively decreases this rate.

摘要

•The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike).•All the transceivers (including two impersonators) have the same manufacturer and their transceiver front ends are equipped with similar components.•A receiverʼs front end also contributes to its RF fingerprinting of a specific transmitter.•The success rate of an impersonation attack is receiver dependent and receiver impairment effectively decreases this rate.

论文关键词:Radio fingerprinting,Impersonation attack,Physical layer security,Hardware security

论文评审过程:Received 30 November 2012, Revised 30 April 2013, Accepted 14 June 2013, Available online 4 July 2013.

论文官网地址:https://doi.org/10.1016/j.jcss.2013.06.013