CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFi
Publication in refereed journal

Altmetrics Information
.

Other information
AbstractThis paper introduces CSI-RFF, a new framework that leverages micro-signals embedded within C hannel S tate I nformation (CSI) curves to realize R adio- F requency F ingerprinting of commodity off-the-shelf (COTS) WiFi devices for open-set authentication. The micro-signals that serve as RF fingerprints are termed “micro-CSI”. Through experimentation, we have found that the presence of micro-CSI can primarily be attributed to imperfections in the RF circuitry. Furthermore, this characteristic signal is detectable in WiFi 4/5/6 network interface cards (NICs). We have conducted further experiments to determine the most effective CSI collection configurations to stabilize micro-CSI. Yet, extracting micro-CSI for authentication purposes poses a significant challenge. This complexity arises from the fact that CSI measurements inherently include both micro-CSI and the distortions introduced by wireless channels. These two elements are intricately intertwined, making their separation non-trivial. To tackle this challenge, we have developed a signal space-based extraction technique for line-of-sight (LoS) scenarios, which can effectively separate the distortions caused by wireless channels and micro-CSI. Over the course of our comprehensive CSI data collection period extending beyond one year, we found that the extracted micro-CSI displays unique characteristics specific to each WiFi device and remains invariant over time. This establishes micro-CSI as a suitable candidate for device fingerprinting. Finally, we conduct a case study focusing on area access control for mobile robots. In particular, we applied our CSI-RFF framework to identify mobile robots operating in real-world indoor LoS environments based on their transmitted WiFi signals. To accomplish this, we have compared and employed anomaly detection algorithms for the authentication of 15 COTS WiFi 4/5/6 NICs that were carried by a mobile robot under both static and mobile conditions, maintaining an average sig...
All Author(s) ListRuiqi Kong, He Chen
Journal nameIEEE Transactions on Information Forensics and Security
Year2024
Month5
Volume Number19
PublisherIEEE
Pages5301 - 5315
ISSN1556-6013
eISSN1556-6021
LanguagesEnglish-United States

Last updated on 2024-12-08 at 10:48