On the Basic Limits of RF-Fingerprint-Based Authentication
RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from the transmissions of legitimate nodes. We provide a systematic approach rooted from the information theory to evaluate the basic performance limits of...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information theory 2016-08, Vol.62 (8), p.4523-4543 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from the transmissions of legitimate nodes. We provide a systematic approach rooted from the information theory to evaluate the basic performance limits of RF fingerprinting. We develop a novel channel model for RF fingerprinting, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the actual physical channel. We address the authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels, in addition to a possible secret key available at the legitimate nodes. We provide bounds for the error exponents for reliable communication of the legitimate nodes, and the success exponent for impersonation and substitution attacks of the adversary, as a function of certain parameters based on their RF-fingerprints, and the shared key rate. We illustrate that keyless authentication is possible via RF fingerprints when the legitimate channel is not simulatable. We also show that the probability of these attacks can be reduced significantly by employing additional dedicated authenticated nodes. |
---|---|
ISSN: | 0018-9448 1557-9654 |
DOI: | 10.1109/TIT.2016.2572725 |