On the Basic Limits of RF-Fingerprint-Based Authentication
2016; Institute of Electrical and Electronics Engineers; Volume: 62; Issue: 8 Linguagem: Inglês
10.1109/tit.2016.2572725
ISSN1557-9654
Autores Tópico(s)Hate Speech and Cyberbullying Detection
ResumoRF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from the transmissions of legitimate nodes. We provide a systematic approach rooted from the information theory to evaluate the basic performance limits of RF fingerprinting. We develop a novel channel model for RF fingerprinting, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the actual physical channel. We address the authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels, in addition to a possible secret key available at the legitimate nodes. We provide bounds for the error exponents for reliable communication of the legitimate nodes, and the success exponent for impersonation and substitution attacks of the adversary, as a function of certain parameters based on their RF-fingerprints, and the shared key rate. We illustrate that keyless authentication is possible via RF fingerprints when the legitimate channel is not simulatable. We also show that the probability of these attacks can be reduced significantly by employing additional dedicated authenticated nodes.
Referência(s)