{"id":22492,"date":"2025-04-09T12:39:07","date_gmt":"2025-04-09T10:39:07","guid":{"rendered":"https:\/\/www.lites.tf.fau.de\/?p=22492"},"modified":"2025-05-05T16:49:45","modified_gmt":"2025-05-05T14:49:45","slug":"development-of-rf-fingerprintingmethods","status":"publish","type":"post","link":"https:\/\/www.lites.tf.fau.de\/en\/2025\/04\/09\/development-of-rf-fingerprintingmethods\/","title":{"rendered":"Development of RF fingerprinting methods for radio transmitters"},"content":{"rendered":"<h3>Description<\/h3>\n<p>Radio Frequency (RF) Fingerprinting offers the potential for rapid authentication of communication partners in future wireless communication systems. Potential application areas include mobile communications and radar applications. Other hardware-based methods, such as Physically Unclonable Functions (PUF), are related to RF Fingerprinting.<\/p>\n<p>The characteristics that enable RF Fingerprinting are tied to the respective RF hardware through implicit or explicit methods. These include, for example, the nonlinear behavior of amplifiers, phase noise, or I-Q imbalances. In a broader sense, they involve properties of signal integrity.<\/p>\n<p>One challenge in developing authentication methods based on physical properties is estimating the reliability and security of such methods. Simulations can help estimate the actual entropy of the method.<\/p>\n<p>In addition to analyzing the underlying physical processes, capturing unique hardware characteristics is also essential. This &#8220;feature extraction&#8221; can be achieved through various algorithms. Statistical features, frequency or time domain properties, or features generated through machine learning methods can be applied.<\/p>\n<p>In the final step, the authenticity of the features must be verified. This can be done through methods such as classification or fuzzy extraction.<\/p>\n<h3>Research Questions<\/h3>\n<ul>\n<li>How and with what guarantee can the variances of the hardware be represented through simulation?<\/li>\n<li>Which signal properties and features are particularly suitable for RF Fingerprinting?<\/li>\n<li>What are suitable methods for quick and effective authentication on the receiver side?<\/li>\n<\/ul>\n<h3>Goal<\/h3>\n<p>From the description and the research questions, sub-tasks may emerge.<\/p>\n<ul>\n<li>Measurement, characterization, and modeling of transceiver hardware.<\/li>\n<li>Development of a system model and an associated simulation to test RF Fingerprinting methods.<\/li>\n<li>Development of suitable authentication methods for integration into transceivers.<\/li>\n<\/ul>\n<h3>Your Skills<\/h3>\n<p>Interest in IT security and secure hardware. Depending on the goal of the work:<\/p>\n<ul>\n<li>Experience with RF hardware<\/li>\n<li>Fundamentals of information theory<\/li>\n<li>Experience with digital signal processing<\/li>\n<li>Proficiency in Python, C, C++, or Rust<\/li>\n<li>Knowledge in machine learning and familiarity with tools like Keras or TensorFlow<\/li>\n<\/ul>\n<h3>Literaturangaben<\/h3>\n<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">\n<ol>\n<li class=\"csl-right-inline\">C. Spinnler, T. Labs, und N. Franchi, \u201eSoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things\u201c, in <i>Proceedings of the 19th International Conference on Availability, Reliability and Security<\/i>, in ARES \u201924. New York, NY, USA: Association for Computing Machinery, Juli 2024, S. 1\u201312. doi: <a href=\"https:\/\/doi.org\/10.1145\/3664476.3670872\">10.1145\/3664476.3670872<\/a>.<\/li>\n<li class=\"csl-right-inline\">A. Ali und G. Fischer, \u201eSymbol Based Statistical RF Fingerprinting for Fake Base Station Identification\u201c, in <i>2019 29th International Conference Radioelektronika (RADIOELEKTRONIKA)<\/i>, Apr. 2019, S. 1\u20135. doi: <a href=\"https:\/\/doi.org\/10.1109\/RADIOELEK.2019.8733585\">10.1109\/RADIOELEK.2019.8733585<\/a><\/li>\n<li>\n<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">\n<div class=\"csl-right-inline\">A. Jagannath, J. Jagannath, und P. S. P. V. Kumar, \u201eA comprehensive survey on radio frequency (rf) fingerprinting: Traditional approaches, deep learning, and open challenges\u201c, <i>arXiv preprint arXiv:2201.00680<\/i>, 2022.<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<\/li>\n<\/ol>\n<\/div>\n<p>If you are interested in this exciting research work, we look forward to receiving your application with a short resume at<\/p>\n<\/div>\n<hr \/>\n<p><div class=\"fau-person person-card\">Es konnte kein Kontakteintrag mit der angegebenen ID 626 gefunden werden.<\/div><br \/>\n<div class=\"elements-divider\"><\/div><\/p>\n<p style=\"text-align: right\"><a class=\"rrze-elements standard-btn primary-btn\" href=\"mailto:christian.spinnler@fau.de?subject=Anfrage%20f\u00fcr:%20RF%20Fingerprinting\"><span>Anfrage senden<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description Radio Frequency (RF) Fingerprinting offers the potential for rapid authentication of communication partners in future wireless communication systems. Potential application areas include mobile communications and radar applications. Other hardware-based methods, such as Physically Unclonable Functions (PUF), are related to RF Fingerprinting. The characteristics that enable RF Fingerprinting are tied to the respective RF hardware [&hellip;]<\/p>\n","protected":false},"author":5222,"featured_media":22034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_rrze_cache":"enabled","_rrze_multilang_single_locale":"en_US","_rrze_multilang_single_source":"https:\/\/www.lites.tf.fau.de\/?p=22483","footnotes":""},"categories":[583,226],"tags":[239],"workflow_usergroup":[],"class_list":["post-22492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ma_eng","category-offene_stud_arbeiten_eng","tag-spinnler","en-US"],"_links":{"self":[{"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/posts\/22492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/users\/5222"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/comments?post=22492"}],"version-history":[{"count":3,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/posts\/22492\/revisions"}],"predecessor-version":[{"id":22614,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/posts\/22492\/revisions\/22614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/media\/22034"}],"wp:attachment":[{"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/media?parent=22492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/categories?post=22492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/tags?post=22492"},{"taxonomy":"workflow_usergroup","embeddable":true,"href":"https:\/\/www.lites.tf.fau.de\/wp-json\/wp\/v2\/workflow_usergroup?post=22492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}