DocumentCode
1782713
Title
RF-fingerprint based authentication: Exponents and achievable rates
Author
Gungor, Onur ; Koksal, Can Emre
Author_Institution
Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
fYear
2014
fDate
29-31 Oct. 2014
Firstpage
97
Lastpage
102
Abstract
RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from transmissions of legitimate nodes. We provide a systematic approach rooted from information theory to evaluate basic performance limits of RF fingerprinting. We develop a novel channel model for RF fingerprinting, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the actual physical channel. We address the authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels, in addition to a possible secret key available at the legitimate nodes. We provide achievable bounds for the error exponents for reliable communication of the legitimate nodes, and the success exponent for impersonation and substitution attacks of the adversary, as a function of certain parameters based on their RF-fingerprints, and the shared key rate. We illustrate that keyless authentication is possible via RF fingerprints when the legitimate channel is not simulatable.
Keywords
authorisation; RF radio chain; RF-fingerprint based authentication; authentication problem; keyless authentication; radiofrequency fingerprinting; Authentication; Communication system security; Decoding; Radio frequency; Receivers; Transmitters; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location
San Francisco, CA
Type
conf
DOI
10.1109/CNS.2014.6997472
Filename
6997472
Link To Document