• Tidak ada hasil yang ditemukan

Analysis of Impersonation Attack on RF Fingerprinting

N/A
N/A
Protected

Academic year: 2024

Membagikan "Analysis of Impersonation Attack on RF Fingerprinting"

Copied!
13
0
0

Teks penuh

(1)

Impersonation Attacks on RF Fingerprinting

Saeed Ur Rehman

Supervised by AP Kevin Sowerby

Colin Coghill

(2)

Outline

 Radio Frequency (RF) Fingerprinting

 Research gaps

 Objective

 Experiment setup

 Results

 Conclusion

2

(3)

RF Fingerprinting

Radio Frequency (RF) fingerprinting is the process of identifying a radio transmitter by the unique features present in its analog waveform.

(4)

4

Traditional Analysis of RF Fingerprinting Traditional Analysis of RF Fingerprinting

High End Receiver setup

(5)

Radio Frequency Communication Radio Frequency Communication

Channel Impairments

Receiver Impairments

(6)

Research Gaps in RF Fingerprinting

 Analog components at the receiver front-end also have impairments.

 Channel impairments further distorts the unique RF features of the transmitter

 How secure and robust RF fingerprinting is to impersonation attack?

6

(7)

Research Objective

 How secure and robust RF fingerprinting is to impersonation attack using a low-end

receiver?

(8)

Experimental Testbed

8

(9)

Classification Process

(10)

Results of one receiver

10

(11)

Results for four receivers

(12)

Conclusion

 An attacker (malicious user) would be unaware of the impairments of a legitimate receiver. More importantly, the attacker would probably also be unaware of its own receiver impairments (which influence the fingerprint it creates for a target transmitter) and its transmitter impairments.

 Therefore, the uncertainty associated with low end hardware increases the challenge for the attacker to create a signal that would deceive a legitimate user.

12

(13)

Questions ?

Referensi

Dokumen terkait