1. Introduction
Radio frequency fingerprint authentication (RFFA) is a novel approach that leverages the inherent randomness of radio frequency hardware imperfections to authenticate transmitters. These hardware imperfections, including carrier frequency offset (CFO) [
1], in-phase/quadrature (I/Q) imbalance [
2], and I/Q origin offset [
3], possess inherent, unique, and non-reproducible properties. Thus, they can be used for identity authentication without the need for traditional credentials such as tokens or digital signatures. As a result, RFFA has emerged as a prominent technology for identity authentication in future wireless networks [
4,
5,
6].
Although RFFA has been extensively studied over the past few decades, achieving high accuracy remains a significant challenge. To address this issue, many researchers have devoted themselves to two approaches. The first approach is to explore potential hand-crafted features according to underlying hardware imperfections. For instance, the authors in [
7] first proposed five features, and the authors in [
6] proposed a new feature called fractal dimension that can be used for RFFA. The second approach is to utilize machine learning techniques to automatically extract and apply the features for RFFA. For example, the authors in [
8] proposed a machine learning-based method to dynamically determine the feature decision threshold in RFFA, and the authors in [
9] proposed an incremental learning method to continuously realize the feature extraction. The complicated computation involved in the second approach has also been of concern; for example, the authors in [
10] proposed a transfer learning method to reduce the computation required for edge nodes while accurately extracting the feature. Note that, for both of these two approaches, applying a multi-frame signal (MFS) performs with higher accuracy than a single-frame signal (SFS) as the input of the authenticator. This is because the MFS-based RFFA leverages the integration of multiple frames to mitigate the adverse noise effect. This approach is practical to implement, since one communication session typically involves multiple frames serving as candidates for constructing the MFS. As a brilliant study, the authors in [
7] demonstrated that, by increasing the number of frames involved in the signal from 1 to 10, the RFFA accuracy improved from 30% to 90%. Despite the benefits touted by many researchers regarding this approach, they have frequently overlooked the potential security threats associated with it.
In this paper, we address a security threat associated with the aforementioned approach. Our observation is that, if an attacker injects a forged frame into the valid traffic, the forged frame can potentially blend in with other legitimate frames during the authentication process, as illustrated in
Figure 1. Intuitively speaking, this may increase the likelihood of the forged frame being accepted, in a way that is even more pronounced compared with that of the single-frame signal (SFS)-based RFFA. To validate this intuition, we also conducted a Proof-of-Concept experiment (see
Section 3.3), and the results clearly demonstrated this security threat. Regrettably, conducting such an injection attack is relatively straightforward for carrier-sense multiple access with collision avoidance (CSMA/CA). This is because that attackers can arbitrarily employ an idle channel to conduct the traffic injection by modifying the Backoff time [
11]. Given the widespread application of CSMA/CA, it becomes crucial to address this security threat when promoting the adoption of MFS-based RFFA.
To provide an MFS-based RFFA scheme overriding the above security threat, we propose an innovative design called the inter-frame-relationship protected signal (IfrPS). The core concept of IfrPS is to bind each pair of consecutively transmitted frames’ signal with unique information, which can be used by the receiver to determine whether two consecutively received frames originate from the same transmitter. Meanwhile, frames that do not conform to the inter-frame relationship are excluded from the MFS-based RFFA process. Note that the unique information is randomly generated for each pair of consecutively transmitted frames and, thus, it cannot be forged by the attacker. Note that the proposed IfrPS-aided, MFS-based RFFA is applicable to these CSMA/CA communication systems, such as IEEE 802.15.4 and IEEE 802.11, in which a security level is required.
To demonstrate the applicability of our proposition, we considered two properties: efficiency and effectiveness. Efficiency evaluates the impact of IfrPS on message communication, while effectiveness quantifies the accuracy improvement achieved by IfrPS-aided, MFS-based RFFA compared to an SFS-based one. The main contributions of this paper are summarized as follows:
This study is the first to identify a security threat associated with MFS-based RFFA. In the CSMA/CA scenario, an attacker can inject forged frames into legitimate traffic. The MFS-based RFFA would be compromised when such an injection is not detected. We further substantiate this security threat through a Proof-of-Concept experiment;
To address this security threat and provide a robust MFS-based RFFA scheme, we propose the IfrPS design. The designed IfrPS can be integrated into the MFS-based RFFA to enable the receiver to detect injected frames within valid traffic. Moreover, IfrPS requires no pre-shared key between the transceiver and is compatible with old receivers because it does not need to authenticate the transmitter;
We analyze the potential impact of the IfrPS design on message demodulation for different constellations, including BPSK, QPSK, and 16QAM. Theoretical analysis and numerical evaluations demonstrate that the IfrPS design causes minimal degradation to message demodulation, with approximately −0.5 dB observed for the BPSK modulation system;
To quantify the accuracy improvement in the IfrPS-aided, MFS-based RFFA compared with the SFS-based one, we conducted a case study using CFO as the authentication feature. Through theoretical analysis and numerical evaluations, we assessed the false reject ratio (FRR) at different false accept ratio (FAR) levels. The results indicate that the proposed approach can achieve up to 5 dB gain compared to the SFS-based RFFA.
The remainder of this paper is organized as follows. Related work is introduced in
Section 2.
Section 3 presents the system model and security threat. In
Section 4, we present the designed IfrPS and the IfrPS-aided, MFS-based RFFA scheme. In
Section 5, we study the efficiency of the IfrPS design, and, in
Section 6, we study the effectiveness of the IfrPS-aided, MFS-based RFFA. This paper is concluded in
Section 7.
The abbreviations used in this paper are summarized in
Table 1.
4. IfrPS Design and IfrPS-Aided, MFS-Based RFFA Scheme
In this section, we propose the IfrPS design and the IfrPS-aided, MFS-based RFFA scheme. At the end, we give a brief discussion of the security properties of our propositions.
4.1. IfrPS Design
The rationale behind the designed IfrPS is to associate each transmitted frame with unique information that cannot be forged by attackers. To this end, the transmitter attaches an HMAC to each transmitted frame signal and then discloses the key in the next transmitted frame signal (see the flow diagram of the IfrPS design illustrated in
Figure 6). To elaborate further, we summarize the IfrPS design in three key steps.
First, we generate the unique information that needs to be attached in each transmitted frame signal. Let us denote the message data of the
m-th frame by
, where
m is interpreted as the frame index. It is worth noting that the re-transmitted frame is considered to have the same index
m. Then, we can denote the unique information of the
m-th frame by
. Here,
satisfies
and
is obtained by
where
represents the hash function. Note that, for each value of
m, the transmitter randomly generates
, and
and
are independent of each other when
. Based on the above, the receiver can detect whether two received frames, with signals
and
, originate from the same transmitter by calculating whether the demodulated unique information and message satisfy Equation (
2).
Second, we convert the unique information
into symbols before attaching it to the transmitted frame signal, as shown in
Figure 6. Since the bit sizes of
and
are, at most, 128, which is a number less than the frame length in most applications, we spread the unique information
to match the frame length. To this end, we use the spreading code, denoted by
, with each element as
or
(
j is the complex symbol), where
N represents the frame length and
represents the bit size of
and
. To simplify the description, we assume that
N is a multiple of
. Let us denote the converted symbols
and
by
and
, respectively.
and
are given by
where “|” and “mod” are the symbols for division and modulus, respectively.
Third, we attach the converted BPSK symbols of
into the modulated frame symbols. Let us denote the
m-th frame without unique information being attached by
dm = [
dm,1,
dm2,…,
dm,n], and its version with unique information being attached by
xm, Here,
xm is given by
where
ρd and
ρt represent the power allocation for the message and unique information, respectively. Due to power constraint, we have
. To provide readers with a clearer understanding of the attaching method, we also present, in
Figure 7, an illustrative example of the message being modulated with BPSK.
4.2. IfrPS-Aided, MFS-Based RFFA Scheme
Considering that the transmitter has sequential frames for transmission, denoted by
, and taking into account the retransmission mechanism at the MAC layer, we assume that all these frames can be successfully received and demodulated by the receiver, denoted by
. However, each of the received frames may be forged and injected. In the IfrPS-aided, MFS-based RFFA scheme, the receiver needs to select the frames in
that originate from the same transmitter as the first frame
and construct a selected frames set denoted as
. The receiver then inputs
into Equation (
1) to obtain the authentication result of the first frame
. Similarly, for authenticating
, the receiver selects frames from
and constructs the corresponding
. We summarize the procedure for leveraging the property of IfrPS to obtain
for the authentication of
by using an
M-frame signal as follows. This method can be extended to the authentication of other frames.
is initialized as
. Frames in
are, in turn, examined to be appended to
or not. We use
and
as an example to explain how to examine the IfrPS relationship between two consecutively frames. Note that each entry of
and
is given by
where
represents the channel fading, and
represents the Gaussian noise. We assume block fading, so
remains constant for the same value of
m and varies independently across different values of
m. Similarly,
varies independently across different values of
m and
n. To extract the unique information attached in
, the receiver first equalizes
and demodulates the message
. Then, it demodulates the unique information using
where we assume accurate estimation of
and decoding of
. Based on the obtained
from Equation (
7), the receiver can obtain the unique information through BPSK demodulation and de-spreading. Let
and
represent the estimated HMAC and key, respectively. The receiver can determine whether
and
originate from the same transmitter using the following binary hypothesis test:
where
represents the code distance. If
is accepted, the receiver appends
to
; otherwise,
is not appended to
. The receiver iteratively examines the last element in
and the first element in
, until either the size of
is
M or the pair of frames to be examined has already been examined.
Remarks: In our proposed IfrPS-aided, MFS-based RFFA scheme, we focus on authenticating the first frame . This differs from previous MFS-based RFFA schemes where the authentication result is used for all frame signals. This is because we cannot ensure whether the previous frame originates from the same transmitter by testing the IfrPS, as Eve, with significant computational resources, can deduce by listening to and (see the detailed discussion in the previous subsection).
4.3. Security Property
In this subsection, we discuss the security property of the designed IfrPS, to demonstrate its ability to counter forged frame injection in MFS-based RFFA.
In MFS-based RFFA, where one forged frame is injected into valid traffic, there are two favorable cases for Eve in constructing the MFS. The first case occurs when the forged frame blends in with past valid frames, while the second case occurs when the forged frame blends in with the following valid frames. We have found that the proposed IfrPS design cannot prevent the first case, but it can effectively prevent the second case. Refer to
Figure 8 for an illustrative explanation, where the marked numbers represent the frame index. In the following discussion, we analyze the security of the IfrPS design against these two cases separately.
The injected frame may blend in with the following two legitimate frames for MFS-based RFFA. This can be achieved if the conveyed in the third frame matches the conveyed in the fourth frame. However, this scenario cannot be achieved, since Eve has to transmit the third frame before the fourth frame. It is important to note that, if the third frame is transmitted after the fourth frame, the receiver will discard the third frame due to the incorrect sequence number. Thus, Eve cannot obtain any knowledge about the conveyed in the fourth frame to crack it. In other words, Eve has no way to generate the correct that should conveyed by the third frame for a successful injection.
Overall, we observe that the IfrPS design can prevent the injected frame from blending in with the following valid frames in MFS-based RFFA. Therefore, we deduce that our proposed IfrPS-aided, MFS-based RFFA scheme is secure, since the receiver explores the following frames to form the MFS for each received frame.
5. Efficiency
Since the designed IfrPS requires a portion of transmission power to convey the unique information, the message demodulation BER will inevitably be affected. We measured the efficiency of the IfrPS design by evaluating its impact on message demodulation error. To this end, we considered the BPSK, QPSK, and 16QAM, with the constellation with IfrPS design shown in
Figure 9, and performed both theoretical analysis and numerical evaluation towards these three modulation systems to assess the efficiency of the IfrPS design.
With perfect channel estimation, the
n-th received frame signal after channel compensation, denoted by
, can be expressed as
where we define
to denote the transmission symbol-to-noise power ratio. On the basis, we have the transmission bit-to-noise power ratio of
for BPSK,
for QPSK, and
for 16QAM. Let us denote the message demodulation BER of the IfrPS for BPSK, QPSK, and 16QAM systems by
,
, and
, respectively. By considering the Gray code mapping (refer to [
27]), we can derive
, and approximate
and
by
and
respectively.
We present both theoretical and numerical results for the message demodulation BER of IfrPS in the presence of BPSK, QPSK, and 16QAM modulations, as well as the BER of the normal signal (without IfrPS), for comparison.
Figure 10 illustrates these results.
The first observation from the figure is that the theoretical and numerical results for the message demodulation BER of IfrPS exhibit a small discrepancy. This suggests that our theoretical analysis serves as a reliable predictor for the message demodulation BER of IfrPS. The second observation is that the message demodulation BER of IfrPS is only slightly higher than that of the normal signal across various signal-to-noise ratio (SNR) levels. When , the obtained BERs are nearly identical. This indicates that IfrPS introduces only a minor performance degradation in message demodulation, making it suitable for applications with stringent requirements on demodulation accuracy. The third observation is that the message demodulation BER of IfrPS is influenced by , where a larger results in a higher BER. This implies that we can adapt the parameter to meet different requirements for message demodulation BER in practical applications. The fourth observation is that, under the same system parameters, the impact of IfrPS on the message demodulation BER varies across different modulation systems. For example, when , the equivalent SNR degradation in message demodulation is approximately dB for BPSK, whereas it is around 2 dB for 16QAM. This suggests that the effect of IfrPS on BER is less pronounced in low-order modulation systems.
In summary, the results in
Figure 10 demonstrate the effectiveness of IfrPS, as the message demodulation BER is only slightly increased when
is appropriately set. In the next section, we further explore the resulting accuracy gain in RFFA using the same
setting for IfrPS.
6. Effectiveness
The ability to securely construct an MFS inevitably affects the accuracy of an MFS-based RFFA scheme. Thus, we evaluate the effectiveness of the IfrPS-aided, MFS-based RFFA scheme in terms of the resultant RFFA accuracy that can be achieved. To measure the effectiveness, we define two types of error as follows:
Note that these two types of error affect both the processes of IfrPS detection and RFFA at the receiver side, i.e., the Equations (
1) and (
8). In the context of IfrPS detection, a valid sample refers to a frame signal originating from the same transmitter as the previous frames, while an invalid sample refers to a frame signal originating from a different transmitter. In the context of RFFA, a valid sample refers to a frame signal originating from Alice, while an invalid sample refers to a frame signal originating from Eve. In the following, we first analyze and evaluate these two types of error for the IfrPS detection process and then, on that basis, analyze and evaluate these for the RFFA process.
6.1. FRR and FAR in IfrPS Detection
We derived the closed-form expression of the FRR and the numerical solution of the FAR in the IfrPS detection process.
Theorem 1. The FRR in IfrPS detection, denoted by , is given byand the FAR of IfrPS, denoted by , is given by Proof. For two consecutively received frame signals originating from the same transmitter, let us denote the channel fading coefficient of the first frame signal by
and that of the second frame by signal
. We can express the probability that the unique information attached into these two frames are accurately demodulated by
and
respectively. Then, by integrating
and
, we can obtain the probability that these two frames signal match with the demodulated unique information by
Substituting
into Equation (
17), we can prove Theorem 1. □
We plot the theoretical and numerical results of the FRR and FAR in IfrPS detection process in
Figure 11. The first observation is that the theoretical results match the numerical results well, which indicates that our theoretical expressions can be used to predict the performance. The second observation is that the resultant FRR and FAR perform a trade-off relationship over
N and
L. This indicates that, in practical applications, the values of
N and
L need to be optimized to achieve the required FRR and FAR levels. The third observation is that the resultant FRR and FAR can be refined with a larger
and a smaller
. This indicates that, for a communication with larger SNR and tolerance on message demodulation degradation, we can always obtain better performance in IfrPS detection.
Furthermore, to provide a visual presentation of the IfrPS detection performance, we calculate the expected sequence length of the detected MFS, denoted by
M. Note that the calculation can be expressed by
Additionally, we plot the results in
Figure 12. The first observation is that the expected sequence length increases over
and decreases over
. This is easy to understand, since we have demonstrated above that the IfrPS detection performance is positive in relation to
and negative to
. The second observation is that, for different levels of FAR in IfrPS detection, the obtained
M has quite a significant value. For instance, when the FAR is fixed at
, i.e., the attacker can only compromise the IfrPS detection with the probability of
, the obtained
M is more than 10 when
and
. Since such parameters are easy to satisfy in practical applications, whereas the corresponding parameter (
) results in only about 2 dB degradation to message demodulation, the results in
Figure 12 demonstrate the potential of enhancing the RFFA by adopting the IfrPS design and using the MFS-based approach.
6.2. FRR and FAR in RFFA
To quantify the FRR and FAR in RFFA, we used the CFO as the authentication feature as a case study. Following [
28,
29], we know that the CFO estimates follow the Gaussian distribution
, where
represents the expectation of CFO estimate,
represents the received SNR, and
and
are two parameters in CFO estimation following
. In this study, we fixed
and calculated
by
. Moreover, we can deduce that the averaged CFO estimate with
M frames follows the distribution
, where
.
We consider that the CFO of the randomly selected attacker follows the uniform distribution
, where
R denotes the allowable CFO range, which we set to be
[
28]. Thus, we can express the FAR in RFFA by
for the SFS-based RFFA, and by
for the MFS-based RFFA.
Theorem 2. With the threshold δ, the FRR in the IfrPS-aided, MFS-based RFFA can be expressed bywhere is given in Theorem 1, and follows To prove the above theorem, we illustrate, in
Figure 13, both the theoretical and numerical FRR in RFFA, where we fix
,
, and
. It can be observed from
Figure 13 that the theoretical results of FRR in RFFA match the numerical results well. This indicates that our theoretical result can be used for predicting the FRR in IfrPS-aided, MFS-based RFFA. From Equations (
19) and (
20), we know that using a smaller threshold in IfrPS-aided, MFS-based RFFA system can achieve the same FAR as that using a smaller threshold in the SFS-based RFFA system, which indicates that we need to use a smaller threshold to ensure a smaller FRR at the same FAR level in RFFA through the IfrPS-aided, MFS-based one than the SFS-based one.
Lemma 1. To ensure the same FAR level of RFFA in the IfrPS-aided, MFS-based RFFA as that in the SFS-based one, and minimize the achieved FRR, the transmitter needs to optimize L.
To prove the feasibility of using the above method for optimizing
L and, thus, to reduce the FRR under the same FAR levels, we illustrate in
Figure 14 the obtained FRR by searching the optimal
L. Note that the optimal
L is numerically searched using the FRR and FAR expressions in Equations (
20) and (
21). The first observation from
Figure 14 is that the searched
L is the optimal one since it leads to the minimal FRR for both the theoretical and numerical results. The second observation is that the relationship between FRR and
L is the convex function and, thus, we can always search the optimal
L.
Finally, in oder to demonstrate the FRR gain in IfrPS-aided, MFS-based RFFA over the MFS-based RFFA, we illustrate the numerical results under different levels of FAR in
Figure 15. The first observation from
Figure 15 is that we can always achieve a positive FRR gain. Furthermore, the FRR gain increases with a smaller
. The second observation from
Figure 15 is that equivalent SNR gain is mainly related to
rather than
N. This is because using a larger
N requires a larger
L to ensure the FAR level, which inevitably limits the improvement in RFFA achieved by a larger
N. The third observation from
Figure 15 is that the equivalent SNR gain is about 5 dB when
,
, and
dB. Note that the corresponding equivalent SNR degradation to message demodulation is only 2 dB for 16QAM, 1 dB for QPSK, and
dB for BPSk. This demonstrates the effectiveness of the proposed IfrPS-aided, MFS-based RFFA scheme in securely improving the RFFA accuracy.