skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

Journal Article · · International Journal of Critical Infrastructure Protection
 [1];  [1];  [1];  [1];  [2]
  1. Air Force Inst. of Technology, OH (United States). Wright-Patterson Air Force Base
  2. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

We report that low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against replay and spoofing attacks. However, radio frequency (RF) fingerprinting typically uses expensive signal collection systems; this is because fingerprinting wireless devices with low-cost receivers has been reported to have inconsistent accuracy. In conclusion, this paper demonstrates a robust radio frequency fingerprinting process that is consistently accurate with both high-end and low-cost receivers. Indeed, the results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.154-based infrastructure networks such as ZigBee.

Research Organization:
Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC05-00OR22725
OSTI ID:
1261413
Journal Information:
International Journal of Critical Infrastructure Protection, Vol. 8, Issue C; ISSN 1874-5482
Publisher:
Elsevier
Country of Publication:
United States
Language:
English