Radio frequency (RF) signals generated by different transmitters
are known to possess certain salient characteristics. These characteristics
are due to the transient response of the transmitter following its turn-on.
Therefore, essentially the behavior in the transient can be exploited so as
to identify the signal's original source by creating a profile of the
transmitter. Our ongoing research investigates the potential for extending
RF fingerprinting methodology to go beyond transient response and deploying
it for network-security purposes. This capability brings a new level of
functionality to wireless networks with stringent security requirements. The
results of this study will be used to develop new forensics techniques and
to enable alternate mechanisms for access control and authentication as well
as mitigating the threat of attacks in the wireless medium.
Participants:Taha SencarKurt RosenfeldVikram PadmanNasir Memon