Seminar Report Templet
Seminar Report Templet
A Seminar Report
on
by
UNIVERSITY OF PUNE
2017-2018
SCOE TE (Computer)
Pune.
Sinhgad Technical Education Society,
Department of Computer Engineering
Sinhgad College of Engineering, Pune-41
Date:
CERTIFICATE
This is to certify that Mr. Apoorv Pratap Dhaygude has successfully completed his seminar
work titled “Improving Wireless Network Security Based on Radio Fingerprinting’’ at
Department of Computer Engineering, SCOE, Pune for the partial fulfilment of the Bachelor
Degree of Computer Engineering, Savitribai Phule Pune University, in semester-II, academic
Year 2019-2020.
Dr. S. D. Lokhande
Principal
Sinhgad College of Engineering
ABSTRACT
With the rapid development of the popularity of wireless networks, there are also increasing
security threats that follow, and wireless network security issues are becoming increasingly
important. Radio frequency fingerprints generated by device tolerance in wireless device
transmitters have physical characteristics that are difficult to clone, and can be used for
identity authentication of wireless devices. In this paper, we propose a radio frequency
fingerprint extraction method based on fractional Fourier transform for transient signals.
After getting the features of the signal, we use RPCA to reduce the dimension of the features,
and then use KNN to classify them. The results show that when the SNR is 20dB, the
recognition rate of this method is close to 100%.
Acknowledgement
With due respect and gratitude, I take the opportunity to thank those who have helped me
directly and indirectly. I convey my sincere thanks to Prof. M. P. Wankhede , HoD Computer
Dept. and Prof. Dhanashri N. Patil for their help in selecting the seminar topic and support.
I thank to my seminar guide Prof. Dhanashri N. Patil for hes guidance, timely help and
valuable suggestions without which this seminar would not have been possible. Her direction
has always been encouraging as well as inspiring for me. Attempts have been made to
minimize the errors in the report.
I would also like to express my appreciation and thanks to all my friends who knowingly or
unknowingly have assisted and encourage me throughout my hard work
Apoorv Dhaygude
TE Computer Engineering
List of Tables
Page No.
Certificate
Abstract
Acknowledgement
List of Tables
List of Figures
Acronyms
Chapter-1 Introduction
1.1 Motivation
1.2 Relevance
1.3 Security Mechanism
1.4 Timeline/Evolution
Chapter-2 Literature Survey
2.1 Fundamentals
2.1.1 Wireless Network Security
2.1.2 Radio Fingerprinting
2.1.3 Literature Survey table
Chapter-3 Methodology
3.1 Fingerprint Generation
3.2 Robust Principle Component Analysis
3.3 Device Identification
1.1 MOTIVATION
This is the reason why Wireless Network Security came into existence.
1.2 Relevance
The actual wireless network security mechanism often has defects. For example, the IEEE
802.11 wireless local area network (WLAN) security mechanism evolved from IEEE
802.1X authentication to IEEE 802.11i from the original Wired Equivalent Privacy (WEP).
However, this security mechanism still does not guarantee that there are no security issues.
Besides, if the key is compromised, the existing security mechanism simply cannot achieve
its claimed authentication service. Therefore, the current security mechanisms running on the
wireless network link layer and above need to be further enhanced. The security mechanism
running on the physical layer of the wireless network has been studied by many scholars. The
security mechanism running at the physical layer is simply a hardware-based security
mechanism.
The current research mainly divides this security mechanism into three categories.
The first one is the security mechanism based on circuit delay. The method utilizes inevitable
delays within different wireless devices for identification. Due to individual differences in
each wireless device, the delay in operation is unique, and the wireless device is securely
authenticated according to the delay of the device. The disadvantage of this approach is the
need to add additional custom hardware to existing wireless devices.
The second one is the security mechanism based on clock offset. The basis of this method is
that the clocks of different wireless devices have a certain offset. The disadvantage of this
method is that an attacker can record the signal of the wireless device, obtain the clock offset
information of the wireless device, and then forge the clock offset to attack.
The third one is the security mechanism based on “Radio Fingerprinting”. The method is to
confirm the wireless device according to the radio frequency fingerprint of the wireless
device, thereby improving the security of the wireless network. The basis of this mechanism
is that any wireless device, even the same model, the same batch of wire-less devices, will
have individual differences and is difficult to replicate. This mechanism works at the physical
layer and has higher security than traditional security mechanisms.
1.4 Timeline/Evolution
“Radio Fingerprint” and “Radio Fingerprint Identification” are new concepts proposed by
Hall et al in the study of wireless network device identification such as Bluetooth in 2003.
Since then, the concept has mainly appeared in the identification research of wireless network
devices.
The earliest RF fingerprinting technology was proposed in 1995 by Toonstra et al. The
feature extraction method based on transient signals was also developed. Most of the early
researches focused on transient signal RF fingerprinting. In the on/off transient of the device,
the transmitter starts to work. Correspondingly, when the power reaches zero from the rated
power, a signal is sent. The process of extracting the RF fingerprinting of the signal from this
part is the transient signal RF fingerprint technology. The generation of such a transient
signal is only related to the hardware device and is a signal generated by all wireless
communication devices. There is no data information, and it can be used as an independent
signal for subsequent analysis and processing. The detection and separation of on/off
transients relies on device hardware and channel noise and has proven to be critical to
communication systems. Here we propose a radio frequency fingerprint extraction method
based on Fractional Fourier transform for transient signals.
In recent years, Fractional Fourier Transform (FrFT) is a new time-frequency analysis tool,
which is a broad sense form of Fourier transform. The representation of the signal on the
FrFT domain, while merging the information of the signal in the time and the frequency
domain. In recent years, the research on the classification and recognition of the fractional
Fourier transform has received extensive attention and is also a new research topic. Fig.1
shows that the overall framework.
2.1 Fundamentals
Wireless network security is the process of designing, implementing and ensuring security on
a wireless computer network. It is a subset of network security that adds protection for a
wireless computer network.
Wireless network security primarily protects a wireless network from unauthorized and
malicious access attempts. Typically, wireless network security is delivered through wireless
devices (usually a wireless router/switch) that encrypts and secures all wireless
communication by default. Even if the wireless network security is compromised, the hacker
is not able to view the content of the traffic/packet in transit. Moreover, wireless intrusion
detection and prevention systems also enable protection of a wireless network by alerting the
wireless network administrator in case of a security breach.
Some of the common algorithms and standards to ensure wireless network security are Wired
Equivalent Policy (WEP) and Wireless Protected Access (WPA).
RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be
used as an identity, in the same way a biological fingerprint operates, to improve the security
and privacy of wireless communication. This is in contrast to the traditional bit level
algorithmic approaches to securing transmissions.
2+𝑢2 /2𝑐𝑜𝑡𝛼−𝑗𝑢𝑡𝑐𝑜𝑠𝑒𝑐𝛼
Kα (t, u) =√1 − 𝑗𝑐𝑜𝑡𝛼/√2𝜋𝑒𝑗𝑡
After the signal is subjected to the above FrFT transform, information such as mean,
variance, skewness, kurtosis and the like are extracted as fingerprint features of the signal,
and the next fingerprint recognition process is performed.
µ=1 ∑𝑁 𝐴
𝑁 𝑖=1 𝑖
𝐸(𝑥−𝜇)3
S= 𝜎3
𝐸(𝑥−𝜇)4
K= 𝜎4
In the process of identifying the radiation source device, the collected radio frequency
signals themselves are features that can be distinguished from each other, but because of the
high information dimension, it is not convenient to perform fast device identification
processing. Moreover, among the original signals or the extracted high-dimensional features,
there is a large amount of redundant information, and each feature has a certain correlation,
which brings unnecessary burden to subsequent processing. Therefore, it is necessary to
reduce the dimension of high-dimensional information to reduce the feature dimension and
correlation, but this will cause a certain loss of information on the other hand, and introduce
errors into the device. Therefore, the most useful information is retained while reducing the
dimension. Primary purpose. Robust Principle Component Analysis (RPCA) is an excellent
dimensionality reduction method that can achieve this goal.
RPCA can recover the useful low-rank matrix in the data and eliminate the sparse matrix of
noise under certain conditions.
The specific problem solved by RPCA is to decompose the original data matrix X = R l× n
min||𝐿||∗ + 𝜆||𝑆||1
Among them ||. ||∗ and ||. ||1 represent the kernel norm and l1 norm of the solution matrix
respectively. λ > 0 is the balance factor, which is used to adjust the ratio between the low-rank
matrix and the sparse matrix. The k value can be adjusted according to the specific problem
involved to adjust λk =k / √𝑚𝑎𝑥(𝑙, 𝑛) and λ = 1// √𝑚𝑎𝑥(𝑙, 𝑛) are usually taken.
Classification performance is evaluated using the K-Nearest Neighbour (KNN). KNN (K-
Nearest Neighbour) is one of the simplest machine learning algorithms that can be used for
classification and regression. It is a supervised learning algorithm. The idea is that if a
sample has most of the K’s most similar samples in the feature space (i.e., the nearest
neighbour in the feature space) belongs to a certain category, then the sample also belongs
to this category. That is to say, the method determines the category to be divided into
samples according to the category of the nearest one or several samples in the class
decision.
Chapter-4
Experiment and Results
For getting better classification performance and reducing the calculation, the RPCA
method is been used to reduce the dimension of the feature. The features after dimensionality
reduction can be used to replace the original features to perform the classification.
For a better classification performance, the Kfold cross validation is used for evaluation.
Consistent with common practice is used such that samples of each device are divided into
five blocks, among which four blocks of the device are used to train and the rest one to test.
As shown in Fig. 2 is the FrFT-based feature extraction method. When the SNR is 20dB,
the obtained average recognition rate varies with the fractional order. It can be seen that the
best classification identification is obtained when the order is 0.8. So this simulation is
performed at 0.8 order.
Fig. 2. Recognition rate as a function of order when SNR is 20dB.
Fig 3 shows the feature dimensionality reduction visualization image with SNR of 0 dB in
the case of 0.8-order FrFT.
Fig. 5 shows the characteristic dimensionality reduction visualization image with SNR of 20
dB in the case of 0.8-order FrFT.
Fig.5. Reduced dimensional visualization with SNR of 20dB at 0.8-order FrFT and the dimensional is
2
As shown in Fig. 6, the characteristic dimensionality reduction confusion matrix is
obtained when the SNR is 20 dB in the case of 0.8-order FrFT. With the signal collection and
identification system is shown in fig. 1, the identification rate curve under different SNR of 0
20dB is shown in Fig7.
Fig. 7. The recognition rate changes with SNR when the order is 0.8.
Chapter-5
Conclusion
Chapter-6
References
SCOE TE (Computer)
Pune.