2014
DOI: 10.1016/j.jcss.2013.06.013
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
35
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(35 citation statements)
references
References 26 publications
(50 reference statements)
0
35
0
Order By: Relevance
“…Transient-based fingerprinting requires at least 4 Gsps [3,4], which is not possible with USRP receivers that have a 25 Msps limit. However, spectral fingerprinting using wireless preambles has recently been demonstrated with USRP receivers [22,23]. Initial results suggest lower device differentiation accuracy and higher receiver-specific variability with USRP receivers than with high-end receivers.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Transient-based fingerprinting requires at least 4 Gsps [3,4], which is not possible with USRP receivers that have a 25 Msps limit. However, spectral fingerprinting using wireless preambles has recently been demonstrated with USRP receivers [22,23]. Initial results suggest lower device differentiation accuracy and higher receiver-specific variability with USRP receivers than with high-end receivers.…”
Section: Introductionmentioning
confidence: 99%
“…In order to be commercially viable, the radio frequency fingerprinting of low-cost WPANs in critical infrastructure applications must be practical and must leverage inexpensive, smallform-factor receiver technologies. Ur Rehman et al [22,23] were among the first to attempt robust radio frequency fingerprinting using low-cost USRP receivers. Their fingerprints consist solely of power spectral density (PSD) features of IEEE 802.11a (5 GHz WiFi) preambles.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…However, SAKE is based on ICE, the same primitive used by SCUBA, which relies on strict time measurements. One alternative solution to authenticate sensor nodes is the use of Radio Frequency fingerprint techniques which enable the identification of individual devices by the unique characteristics of their radio transmitter [Ureten and Serinken 2007;Rehman et al 2014;Knox and Kunz 2015].…”
Section: Overoptimistic Assumptionsmentioning
confidence: 99%
“…Since the intruder may duplicate the secure tokens or passwords, the inherent physical layer characteristics of the radio emitters have been exploited to improve the security mechanism [1][2]. There are minute differences between different radio emitters because of imperfect manufacturing processes.…”
Section: Introductionmentioning
confidence: 99%