Preventing Radio Fingerprinting through Friendly Jamming

Muhammad Irfan,Savio Sciancalepore,Gabriele Oligeri
2024-07-11
Abstract:Radio Frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools. Authentication is achieved by isolating specific features of the transmitted signal that are unique to the transmitter's hardware. Much research has focused on improving the effectiveness and efficiency of radio frequency fingerprinting to maximize its performance in various scenarios and conditions, while little research examined how to protect devices from being subject to radio fingerprinting in the wild. In this paper, we explore a novel point of view. We examine the hostile usage of radio frequency fingerprinting, which facilitates the unauthorized tracking of wireless devices in the field by malicious entities. We also suggest a method to sanitize the transmitted signal of its fingerprint using a jammer, deployed on purpose to improve devices' anonymity on the channel while still guaranteeing the link's quality of service. Our experimental results and subsequent analysis demonstrate that a friendly jammer can effectively block a malicious eavesdropper from recognizing and tracking a device without affecting the quality of the wireless link, thereby restoring the privacy of the user when accessing the radio spectrum.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: **How to prevent wireless devices from being unauthorizedly tracked and identified by Radio Frequency Fingerprinting (RFF) technology when transmitting signals, thereby protecting users' privacy**. Specifically, the paper focuses on the fact that while the RFF technology improves the efficiency of device authentication and identification, it also brings potential privacy threats. Malicious entities can track and identify these devices by capturing the signal characteristics emitted by wireless devices, and then obtain users' location and behavior information. To solve this problem, the paper proposes a new method - **clearing the radio - frequency fingerprints in the transmission signal through friendly jamming**, thereby protecting the devices from unauthorized tracking. ### Main Contributions 1. **Proposing FingerJam**: A low - power jamming technique that blurs radio - frequency fingerprints by introducing controllable jamming without affecting the quality of the legitimate communication link. 2. **Defining and using two metrics**: k - anonymity and T - anonymity, to quantify the effectiveness of the solution, ensuring that the legitimate sender cannot be distinguished among a group of other devices while maintaining a similar Bit Error Rate (BER) as the unjammed link. 3. **Establishing a defense strategy model**: Demonstrating the effectiveness of FingerJam against attackers using advanced machine - learning classifiers such as CNN and auto - encoders. 4. **Experimental verification**: Through experiments on different communication links (wired and wireless), verifying the ability of the proposed cleaning technique to prevent identification while maintaining data integrity. ### Paper Structure - **Section 2**: Introduces the background of signal representation and deep - learning techniques. - **Section 3**: Describes the reference scenario and the adversarial model. - **Section 4**: Details the experimental setup, including hardware and software tools. - **Section 5 and Section 6**: Show the key findings of cable links and radio links respectively. - **Section 7**: Discusses related work. - **Section 8**: Summarizes the whole paper. ### Core Concepts - **Radio Frequency Fingerprint (RFF)**: Due to its unique physical characteristics, each wireless transmitter injects a unique signature or fingerprint into the transmitted signal. - **Friendly Jamming**: By deploying a low - power jammer, deliberately interfering with the transmission signal to make its fingerprint characteristics blurred, thereby preventing malicious eavesdroppers from identifying specific devices. - **k - anonymity and T - anonymity**: Two metrics used to quantify device anonymity, ensuring that the device cannot be distinguished among a group of other devices. Through these methods, the paper aims to balance the security brought by RFF technology and the need to protect individual privacy, especially in wide - application scenarios such as the Internet of Things (IoT).