{"title":"Survey of Mobile Device Authentication Methods Based on RF Fingerprint","authors":"Xinghao Guo, Zhen Zhang, Jie Chang","doi":"10.1109/infocomwkshps47286.2019.9093755","DOIUrl":null,"url":null,"abstract":"Radio frequency (RF) fingerprint is the physical layer nature of wireless communication devices. It is like different people have different fingerprints, different wireless devices also have different RF fingerprints, which can be used for identification and access authentication of wireless devices in mobile communication. This paper mainly reviews the research progress of RF fingerprint technology in the past ten years. According to the typical process of RF fingerprint authentication, the basic concept of RF fingerprint and the overall framework of identity authentication are introduced. Then, the paper expounds two kinds of RF fingerprint authentication models of \"1 to 1\" and \"1 to N\" respectively, and briefly describes its implementation process. Subsequently, this paper has reviewed the papers on RF fingerprint authentication in recent years, and we select representative papers for introduction. This paper also conducts experiments on 10 communication devices of the same model, and we divide them into legal devices and illegal devices. The RF fingerprint authentication model is used to classify legal devices and reject illegal devices.","PeriodicalId":321862,"journal":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/infocomwkshps47286.2019.9093755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Radio frequency (RF) fingerprint is the physical layer nature of wireless communication devices. It is like different people have different fingerprints, different wireless devices also have different RF fingerprints, which can be used for identification and access authentication of wireless devices in mobile communication. This paper mainly reviews the research progress of RF fingerprint technology in the past ten years. According to the typical process of RF fingerprint authentication, the basic concept of RF fingerprint and the overall framework of identity authentication are introduced. Then, the paper expounds two kinds of RF fingerprint authentication models of "1 to 1" and "1 to N" respectively, and briefly describes its implementation process. Subsequently, this paper has reviewed the papers on RF fingerprint authentication in recent years, and we select representative papers for introduction. This paper also conducts experiments on 10 communication devices of the same model, and we divide them into legal devices and illegal devices. The RF fingerprint authentication model is used to classify legal devices and reject illegal devices.