Abstract

RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from the transmissions of legitimate nodes. We provide a systematic approach rooted from the information theory to evaluate the basic performance limits of RF fingerprinting. We develop a novel channel model for RF fingerprinting, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the actual physical channel. We address the authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels, in addition to a possible secret key available at the legitimate nodes. We provide bounds for the error exponents for reliable communication of the legitimate nodes, and the success exponent for impersonation and substitution attacks of the adversary, as a function of certain parameters based on their RF-fingerprints, and the shared key rate. We illustrate that keyless authentication is possible via RF fingerprints when the legitimate channel is not simulatable. We also show that the probability of these attacks can be reduced significantly by employing additional dedicated authenticated nodes.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.