• DocumentCode
    1782713
  • Title

    RF-fingerprint based authentication: Exponents and achievable rates

  • Author

    Gungor, Onur ; Koksal, Can Emre

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
  • fYear
    2014
  • fDate
    29-31 Oct. 2014
  • Firstpage
    97
  • Lastpage
    102
  • Abstract
    RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from transmissions of legitimate nodes. We provide a systematic approach rooted from information theory to evaluate basic performance limits of RF fingerprinting. We develop a novel channel model for RF fingerprinting, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the actual physical channel. We address the authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels, in addition to a possible secret key available at the legitimate nodes. We provide achievable bounds for the error exponents for reliable communication of the legitimate nodes, and the success exponent for impersonation and substitution attacks of the adversary, as a function of certain parameters based on their RF-fingerprints, and the shared key rate. We illustrate that keyless authentication is possible via RF fingerprints when the legitimate channel is not simulatable.
  • Keywords
    authorisation; RF radio chain; RF-fingerprint based authentication; authentication problem; keyless authentication; radiofrequency fingerprinting; Authentication; Communication system security; Decoding; Radio frequency; Receivers; Transmitters; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2014 IEEE Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/CNS.2014.6997472
  • Filename
    6997472