Protocol Switching Mechanism for Countering Radiometric Signature Exploitation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Manufacturing variations introduce features that distinguish radio transceivers even those of the same vendor. Such distinction is often referred to as radiometric signature and is found to be useful in conducting device authentication and crime forensics. Yet, radiometric signatures could constitute a privacy threat. Particularly, in the realm of wireless networks, an adversary may exploit RF fingerprinting to identify devices and conduct traffic analysis in order to uncover the topology and categorize the role of various nodes. In this paper, we show that RF fingerprinting could be a major tool for the adversary to distinguish among nodes and bypass the provisioned anonymity protection in the network. We analyze the accuracy of RF fingerprinting and highlight how the accuracy affects the success of adversary attacks. We further develop a novel countermeasure to degrade the adversary's ability in exploiting RF fingerprinting. The proposed countermeasure is based on switching among preset communication protocols and employs adversarial machine learning to select the protocol for a transmission so that the accuracy of the RF fingerprinting diminishes. We demonstrate the effectiveness of our scheme through simulation and prototype experiments.

Original languageEnglish
Title of host publication2020 IEEE International Conference on Communications, ICC 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728150895
DOIs
StatePublished - Jun 2020

Publication series

NameIEEE International Conference on Communications
Volume2020-June
ISSN (Print)1550-3607

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • Adversarial machine learning.
  • RF Fingerprinting
  • Radiometric signature
  • Traffic analysis

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Protocol Switching Mechanism for Countering Radiometric Signature Exploitation'. Together they form a unique fingerprint.

Cite this