skip to main content


This content will become publicly available on December 11, 2016

Title: Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

We report that low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against replay and spoofing attacks. However, radio frequency (RF) fingerprinting typically uses expensive signal collection systems; this is because fingerprinting wireless devices with low-cost receivers has been reported to have inconsistent accuracy. In conclusion, this paper demonstrates a robust radio frequency fingerprinting process that is consistently accurate with both high-end and low-cost receivers. Indeed, the results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.154-based infrastructure networks such as ZigBee.
 [1] ;  [1] ;  [1] ;  [1] ;  [2]
  1. Air Force Inst. of Technology, OH (United States). Wright-Patterson Air Force Base
  2. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Publication Date:
OSTI Identifier:
Grant/Contract Number:
Accepted Manuscript
Journal Name:
International Journal of Critical Infrastructure Protection
Additional Journal Information:
Journal Volume: 8; Journal Issue: C; Journal ID: ISSN 1874-5482
Research Org:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Org:
Country of Publication:
United States
97 MATHEMATICS AND COMPUTING Radio frequency fingerprinting; Physical layer security; WPAN; Spoofing; ZigBee Networks