Internet DRAFT - draft-jiang-kitten-rf-fingerprint-auth
draft-jiang-kitten-rf-fingerprint-auth
KITTEN Jiang Yu
Internet Draft Huang Jie
Intended status: Standards Track Southeast University
Expires: June 2014 December 19, 2013
RF fingerprint authentication of wireless device
draft-jiang-kitten-rf-fingerprint-auth-00.txt
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on June 19, 2009.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents carefully,
as they describe your rights and restrictions with respect to this
document. Code Components extracted from this document must include
Simplified BSD License text as described in Section 4.e of the Trust
Legal Provisions and are provided without warranty as described in
the Simplified BSD License.
Yu & Jie Expires June 19, 2014 [Page 1]
Internet-Draft RF fingerprint authentication December 2013
Abstract
This memo documents the concept of RF fingerprint which is the unique
identity characteristics of wireless device and can not be modified.
Then, we give the method to get the RF fingerprint from the emitted
wireless signal. At last, we tell how to use the RF fingerprint to
carry out the authentication. Because of the non-replicable of RF
fingerprint, the security of the authentication can be improved.
Table of Contents
1. Introduction ................................................. 2
2. The concept of RF fingerprint ................................ 3
2.1. The definition of RF fingerprint ........................ 3
2.2. The RF fingerprinting technology ........................ 3
2.2.1. Recognition for transient signals .................. 3
2.2.2. Recognition for stationary signals ................. 3
3. RF fingerprint transformation method ......................... 4
4. Authentication on RF fingerprint ............................. 4
5. Security Considerations ...................................... 5
6. IANA Considerations .......................................... 5
7. References ................................................... 5
7.1. Normative References .................................... 5
8. Acknowledgments .............................................. 5
1. Introduction
As the rapid development of wireless networks and the increase of
security threats, the physical-layer security of wireless networks is
becoming important more and more.
Authentication is the foundation of the security of wireless network
services, authentication ensures that the communication entity is the
entity he claims, and the goal of authentication is to prevent the
access of illegal users. Authentication above the physical layer of
wireless networks is normally based on cryptography mechanism and
security protocol, while the key of cryptography mechanism is easy to
be compromised and the defects of security protocol are common.
The Radio Frequency (RF) fingerprints, which embodies the hardware
property of the wireless transmitter to be identified, has the
characteristics difficult to be cloned and can be used for non-
cryptographic authentication of wireless transmitters.
Yu & Jie Expires June 19, 2014 [Page 2]
Internet-Draft RF fingerprint authentication December 2013
2. The concept of RF fingerprint
2.1. The definition of RF fingerprint
RF fingerprint is transformed results carry the wireless device
hardware information transmitter receives wireless signals, the
results reflect this transformation transmitter hardware features of
wireless devices and have comparable.
2.2. The RF fingerprinting technology
RF fingerprinting architecture is divided into signal layers, layer
RF fingerprint characteristic layer and layer of wireless transmitter
to be identified. To be identified with a wireless transmitter sends
a radio signal that can be converted from a different perspective for
a variety of RF fingerprint; while the same kind of radio frequency
fingerprint, different features can be extracted from a different
perspective. RF fingerprint recognition based on multiple features RF
fingerprints to identify or confirm the identity of the wireless
transmitter.
2.2.1. Recognition for transient signals
Fingerprint identification based on radio frequency transient signals
is the signal for the interception of the radio fingerprint received
radio signal converting transient components, namely: the wireless
device is a transmitter state, the transmission power from zero to
rated power or the power back from the nominal when part of the
process signals emitted by 0. The transmitter transmits a signal
during the transient, the capacitor charging and discharging, a power
amplifier gradually ascending or descending, the frequency
synthesizer (if it exists) between the output and the non-steady
output switching.
2.2.2. Recognition for stationary signals
Steady-state signal is the signal portion of the received wireless
signal between the start and end of the transient signals. RF
fingerprint recognition based on steady-state signal has been more
and more attention, and achieved good recognition performance.
Since the RF signal based on steady-state fingerprint carries more
wireless transmitter device hardware information, and thus achieve a
better recognition performance.
Yu & Jie Expires June 19, 2014 [Page 3]
Internet-Draft RF fingerprint authentication December 2013
3. RF fingerprint transformation method
Radiofrequency fingerprinting is divided in 4 Step process: the
starting time of receiving a wireless signal detection and signal
interception, RF fingerprint transform, feature extraction and
recognition or recognition of wireless devices and radio frequency
based on the intermediate results of fingerprint identification
process, try RF fingerprinting of built architecture includes a
signal layer, RF fingerprint layer, feature layer and wireless
transmitters layer.
RF fingerprint can be divided into a transient signal from the turn-
on conversion RF fingerprint and fingerprint using steady-state RF
two steady-state signal transformations comes. Transient signal
refers to a wireless transmitter transmitting power when the
transient part of the signal from 0 to reach the rated power, the
section does not contain information transmitted symbols, which are
comparable; hardware and reflect the nature of the transmitter, which
has long been transformed time domain envelope spectrum, wavelet
factors and based on fractal dimension, such as the turn-on transient
signal RF wireless transmitter for fingerprint recognition.
In which the radio signal transmitter transmits the steady state
power of the transmitted signal stable, because the wireless
transmitter frequency offset, the preamble, the constellation points
with comparable hardware and reflect the nature of the wireless
transmitter, and thus a "steady state signal" is converted to a
frequency bias, leading envelope, leading the spectrum, leading
wavelet factors and constellation points, etc. steady-state RF
fingerprinting is used to identify a wireless transmitter
4. Authentication on RF fingerprint
We need to choose proper features to carry out the authentication.
The goal of feature selection is to obtain distinctive feature
templates fingerprints from raw transient signals. Our feature
selection procedure consists of two stages: (1) initial
transformation and (2) feature extraction using statistical analysis.
The initial transformation is selected from a set of known
transformations and is an input into a Linear Discriminant Analysis
(LDA) feature extraction. The feature extraction is done using a
linear transformation derived from Fisher LDA. In the initial
transformation stage, we experimentally test a number of signal
transformations to find initial features that capture most
discriminant information in a device's transient. In the statistical
analysis stage, we statistically determine linear boundaries between
the initial features in order to efficiently reduce the
Yu & Jie Expires June 19, 2014 [Page 4]
Internet-Draft RF fingerprint authentication December 2013
dimensionality and increase the system accuracy. The used Fisher LDA
has been effectively applied to discriminate human biometrics and
outperforms related methods when the training data is sufficiently
large. Then, the selected features are transformed to obtain the
stable features to carry out the authentication.
5. Security Considerations
The current version of this document does not affect the existing
security issues. In the future versions, new security requirements
may be added.
6. IANA Considerations
This document has no IANA considerations.
7. References
7.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[2] Crocker, D. and Overell, P.(Editors), "Augmented BNF for Syntax
Specifications: ABNF", RFC 2234, Internet Mail Consortium and
Demon Internet Ltd., November 1997.
8. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot
Yu & Jie Expires June 19, 2014 [Page 5]
Internet-Draft RF fingerprint authentication December 2013
Authors' Addresses
Yu Jiang
Southeast University
2# Sipailou, Nanjing, Jiangsu Province, China
Email: jiangyu@seu.edu.cn
Jie Huang
Southeast University
2# Sipailou, Nanjing, Jiangsu Province, China
Email: jhuang@seu.edu.cn
Yu & Jie Expires June 19, 2014 [Page 6]