Download - Saeed Ur Rehman Supervised by AP Kevin Sowerby Colin Coghill.

Transcript

Impersonation Attacks on RF Fingerprinting

Saeed Ur Rehman Supervised by

AP Kevin SowerbyColin Coghill

2

Outline

Radio Frequency (RF) Fingerprinting Research gaps Objective Experiment setup Results Conclusion

3

RF Fingerprinting

Radio Frequency (RF) fingerprinting is the process of identifying a radio transmitter by the unique features present in its analog waveform.

4

Traditional Analysis of RF Fingerprinting

High End Receiver setup

5

Radio Frequency Communication

Channel Impairments

Receiver Impairments

6

Research Gaps in RF Fingerprinting

Analog components at the receiver front-end also have impairments.

Channel impairments further distorts the unique RF features of the transmitter

How secure and robust RF fingerprinting is to impersonation attack?

7

Research Objective

How secure and robust RF fingerprinting is to impersonation attack using a low-end receiver?

8

Experimental Testbed

9

Classification Process

10

Results of one receiver

11

Results for four receivers

12

Conclusion

An attacker (malicious user) would be unaware of the impairments of a legitimate receiver. More importantly, the attacker would probably also be unaware of its own receiver impairments (which influence the fingerprint it creates for a target transmitter) and its transmitter impairments.

Therefore, the uncertainty associated with low end hardware increases the challenge for the attacker to create a signal that would deceive a legitimate user.

13

Questions ?