PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling
Pages 5015 - 5029
Abstract
This paper presents a novel radio frequency fingerprint (RFF) enhancement strategy by exploiting the physical unclonable function (PUF) to tune the RF hardware impairments in a unique and secure manner, which is exemplified by taking power amplifiers (PAs) in RF chains as an example. This is achieved by intentionally and slightly tuning the PA non-linearity characteristics using the active load-pulling technique. The motivation driving the proposed research is to enlarge the RFF feature differences among wireless devices of same vendor, in order to massively improve their RFF classification accuracy in low to medium signal to noise ratio (SNR) channel conditions. PUF is employed to dynamically tune the PA’s RFF feature which guarantees the security since the PUF response cannot be cloned. Specifically, a ring oscillator (RO)-based PUF is implemented to control the PA non-linearity by selecting unique but random configuration parameters. This approach is proposed to amplify the distinctions across same model PAs, thereby enhancing the RFF classification performance. In the meantime, our innovative strategy of PUF-assisted RFF does not noticeably compromise communication link performance which is experimentally tested. The resulting RFF features can be extracted from the received distorted constellation diagrams with the help of image recognition-based machine learning classification algorithms. Extensive experimental evaluations are carried out using both cable-connected and over-the-air (OTA) measurements. Our proposed approach, when classifying eight PAs from a same vendor, achieves 11% to 24% average classification accuracy improvement by enlarging the RFF feature differences arising from the PA non-linearity.
References
[1]
N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, pp. 2702–2733, 3rd Quart., 2019.
[2]
J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, 2020.
[3]
Q. Xu, R. Zheng, W. Saad, and Z. Han, “Device fingerprinting in wireless networks: Challenges and opportunities,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 94–104, 1st Quart., 2016.
[4]
L. Xie, L. Peng, J. Zhang, and A. Hu, “Radio frequency fingerprint identification for Internet of Things: A survey,” Secur. Saf., vol. 3, 2024, Art. no.
[5]
W. Wang, Z. Sun, S. Piao, B. Zhu, and K. Ren, “Wireless physical-layer identification: Modeling and validation,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 9, pp. 2091–2106, Sep. 2016.
[6]
J. Zhang, R. Woods, M. Sandell, M. Valkama, A. Marshall, and J. Cavallaro, “Radio frequency fingerprint identification for narrowband systems, modelling and classification,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3974–3987, 2021.
[7]
J. Zhang, G. Shen, W. Saad, and K. Chowdhury, “Radio frequency fingerprint identification for device authentication in the Internet of Things,” IEEE Commun. Mag., vol. 61, no. 10, pp. 110–115, Oct. 2023.
[8]
S. Rajendran, Z. Sun, F. Lin, and K. Ren, “Injecting reliable radio frequency fingerprints using metasurface for the Internet of Things,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1896–1911, 2021.
[9]
L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, “Design of a hybrid RF fingerprint extraction and device classification scheme,” IEEE Internet Things J., vol. 6, no. 1, pp. 349–360, Feb. 2019.
[10]
R. Xieet al., “A generalizable model-and-data driven approach for open-set RFF authentication,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 4435–4450, 2021.
[11]
G. Shen, J. Zhang, A. Marshall, and J. R. Cavallaro, “Towards scalable and channel-robust radio frequency fingerprint identification for LoRa,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 774–787, 2022.
[12]
S. Rajendran and Z. Sun, “RF impairment model-based IoT physical-layer identification for enhanced domain generalization,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 1285–1299, 2022.
[13]
J. Xu and D. Wei, “Polarization fingerprint-based LoRaWAN physical layer authentication,” IEEE Trans. Inf. Forensics Security, vol. 18, pp. 4593–4608, 2023.
[14]
H. Givehchianet al., “Evaluating physical-layer BLE location tracking attacks on mobile devices,” in Proc. IEEE Symp. Secur. Privacy (SP), May 2022, pp. 1690–1704.
[15]
A. C. Polak and D. L. Goeckel, “Wireless device identification based on RF oscillator imperfections,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2492–2501, Dec. 2015.
[16]
A. C. Polak, S. Dolatshahi, and D. L. Goeckel, “Identifying wireless users via transmitter imperfections,” IEEE J. Sel. Areas Commun., vol. 29, no. 7, pp. 1469–1479, Aug. 2011.
[17]
S. S. Hanna and D. Cabric, “Deep learning based transmitter identification using power amplifier nonlinearity,” in Proc. Int. Conf. Comput. Netw. Commun. (ICNC), 2019, pp. 674–680.
[18]
J. Xu, Y. Shen, E. Chen, and V. Chen, “Bayesian neural networks for identification and classification of radio frequency transmitters using power amplifiers’ nonlinearity signatures,” IEEE Open J. Circuits Syst., vol. 2, pp. 457–471, 2021.
[19]
Y. Li, Y. Ding, J. Zhang, G. Goussetis, and S. K. Podilchak, “Radio frequency fingerprinting exploiting non-linear memory effect,” IEEE Trans. Cognit. Commun. Netw., vol. 8, no. 4, pp. 1618–1631, Dec. 2022.
[20]
V. Chen, J. Xu, Y. Shen, and E. Chen, “RF fingerprint classification with combinatorial-randomness-based power amplifiers and convolutional neural networks: Secure analog/RF electronics and electromagnetics,” IEEE Solid StateCircuits Mag., vol. 14, no. 4, pp. 28–36, 2022.
[21]
Y. Ma and Y. Hao, “Antenna classification using Gaussian mixture models (GMM) and machine learning,” IEEE Open J. Antennas Propag., vol. 1, pp. 320–328, 2020.
[22]
S. Balakrishnan, S. Gupta, A. Bhuyan, P. Wang, D. Koutsonikolas, and Z. Sun, “Physical layer identification based on spatial–temporal beam features for millimeter-wave wireless networks,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 1831–1845, 2020.
[23]
Q. Zhou, Y. He, K. Yang, and T. Chi, “Physical-layer identification of wireless IoT nodes through PUF-controlled transmitter spectral regrowth,” IEEE Trans. Microw. Theory Techn., vol. 72, no. 2, pp. 1045–1055, Feb. 2024.
[24]
C. Chang, Y. Zheng, and L. Zhang, “A retrospective and a look forward: Fifteen years of physical unclonable function advancement,” IEEE Circuits Syst. Mag., vol. 17, no. 3, pp. 32–62, 3rd Quart., 2017.
[25]
B. Chatterjee, D. Das, S. Maity, and S. Sen, “RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning,” IEEE Internet Things J., vol. 6, no. 1, pp. 388–398, Feb. 2019.
[26]
A. Ashtari, A. Shabani, and B. Alizadeh, “A new RF-PUF based authentication of Internet of Things using random forest classification,” in Proc. 16th Int. ISC (Iranian Soc. Cryptology) Conf. Inf. Secur. Cryptol. (ISCISC), Aug. 2019, pp. 21–26.
[27]
M. F. Bari, B. Chatterjee, K. Sivanesan, L. L. Yang, and S. Sen, “High accuracy RF-PUF for EM security through physical feature assistance using public Wi-Fi dataset,” in Proc. IEEE MTT-S Int. Microw. Symp. Dig., Jun. 2021, pp. 108–111.
[28]
S. Yoon, S. Han, and E. Hwang, “Joint heterogeneous PUF-based security-enhanced IoT authentication,” IEEE Internet Things J., vol. 10, no. 20, pp. 18082–18096, 2023.
[29]
X. Qi, A. Hu, and T. Chen, “Lightweight radio frequency fingerprint identification scheme for V2X based on temporal correlation,” IEEE Trans. Inf. Forensics Security, vol. 19, pp. 1056–1070, 2024.
[30]
A. Ghorbani and M. Sheikhan, “The effect of solid state power amplifiers (SSPAs) nonlinearities on MPSK and M-QAM signal transmission,” in Proc. 6th Int. Conf. Digit. Process. Signals Commun., Sep. 1991, pp. 193–197.
[31]
A. Saleh, “Frequency-independent and frequency-dependent nonlinear models of TWT amplifiers,” IEEE Trans. Commun., vol. COM-29, no. 11, pp. 1715–1720, Nov. 1981.
[32]
C. Rapp, “Effects of HPA-nonlinearity on 4-DPSK/OFDM-signal for a digital sound broadcasting system,” in Proc. 2nd Eur. Conf. Satell. Communi., Oct. 1991, pp. 179–184.
[33]
J. C. Fuenzalida, O. Shimbo, and W. L. Cook, “Time domain analysis of intermodulation effects caused by non-linear amplifiers,” COM-SAT Tech. Rev., vol. 2, no. 1, pp. 89–143, 1973.
[34]
M. J. C. Sanchez, A. Segneri, A. T. Georgiadis, S. A. Kosmopoulos, G. Goussetis, and Y. Ding, “System performance evaluation of power amplifier behavioural models,” in Proc. IET Active Passive RF Devices Seminar, London, U.K., Apr. 30, 2018, pp. 1–6.
[35]
V. Teppati, A. Ferrero, and G. L. Madonna, “Load- and source-pull techniques,” in Modern RF and Microwave Measurement Techniques. Cambridge, U.K.: Cambridge Univ. Press, 2013, pp. 345–383.
[36]
Maury Microwave. (Aug. 28, 2023). High-gamma Automated Tuners (HGTT) and High Power Automated Tuners. [Online]. Available: https://www.maurymw.com/pdf/datasheets/4T-050G06.pdf
[37]
Mini-Circuits. (Aug. 28, 2023). Ultra Flat Gain, Low Noise, Monolithic Amplifier, PGA-105+ Datasheet. [Online]. Available: https://www.minicircuits.com/pdfs/PGA-105+.pdf
[38]
T. Bauer and J. Hamlet, “Physical unclonable functions: A primer,” IEEE Secur. Privacy, vol. 12, no. 6, pp. 97–101, Nov. 2014.
Recommendations
A radio frequency CMOS band pass amplifier using high-Q active inductor loads with binary code for multi-band selecting
IMCAS'07: Proceedings of the 6th WSEAS International Conference on Instrumentation, Measurement, Circuits and SystemsIn this paper, a CMOS radio frequency (RF) multi-band band-pass amplifier using a high-Q active inductor load with a binary code band selector suitable for multi-standards wireless applications is proposed. By employing the improved high-Q active ...
Design scheme for broadband Doherty power amplifier using broadband load combiner
This article proposes a design strategy for broadband Doherty power amplifier PA using broadband load combiner. The bandwidth of the Doherty PA based on the proposed combiner using packaged transistor is about 2.5 times the bandwidth of conventional ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
1556-6021 © 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.
Publisher
IEEE Press
Publication History
Published: 01 January 2024
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025