Show simple record

dc.contributor.authorRehman, Saeed
dc.contributor.authorSowerby, K.W.
dc.contributor.authorCoghill, Colin
dc.date.accessioned2015-04-08T00:26:06Z
dc.date.available2015-04-08T00:26:06Z
dc.date.issued2014-05
dc.identifier.issn0022-0000
dc.identifier.issn1090-2724
dc.identifier.urihttps://hdl.handle.net/10652/2708
dc.description.abstractRecently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.en_NZ
dc.language.isoenen_NZ
dc.publisherAcademic Pressen_NZ
dc.relation.urihttp://www.sciencedirect.com/science/article/pii/S0022000013001220en_NZ
dc.rightsCopyright © 2013 Elsevier Inc. All rights reserved.en_NZ
dc.subjectradio fingerprintingen_NZ
dc.subjectimpersonation attacken_NZ
dc.subjectphysical layer securityen_NZ
dc.subjecthardware securityen_NZ
dc.titleAnalysis of impersonation attacks on systems using RF fingerprinting and low-end receiversen_NZ
dc.typeJournal Articleen_NZ
dc.rights.holderElsevier Inc.en_NZ
dc.identifier.doihttp://dx.doi.org/10.1016/j.jcss.2013.06.013en_NZ
dc.subject.marsden080303 Computer System Securityen_NZ
dc.identifier.bibliographicCitationRehman, S.U., Sowerby, K., and Coghill, C. (2013). Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. Journal of Computer and System Sciences, 80 (3), 591-601.en_NZ
unitec.institutionUnitec Institute of Technologyen_NZ
unitec.publication.spage591en_NZ
unitec.publication.lpage601en_NZ
unitec.publication.volume80 (3)en_NZ
unitec.publication.titleJournal of Computer and System Sciencesen_NZ
unitec.peerreviewedyesen_NZ
dc.contributor.affiliationUniversity of Aucklanden_NZ
unitec.identifier.roms55155en_NZ
unitec.institution.studyareaComputing


Files in this item

Thumbnail

This item appears in

Show simple record


© Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142