作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 专栏 • 上一篇    下一篇

蓝牙通信中的射频指纹识别技术

李文龙1,陈 悦2,许金勇3,梁 涛3   

  1. (1. 解放军理工大学通信工程学院,南京 210007;2. 南京理工大学,南京 210094;3. 解放军总参谋部第63研究所,南京 210007)
  • 收稿日期:2013-07-30 出版日期:2014-01-15 发布日期:2014-01-13
  • 作者简介:李文龙(1982-),男,博士研究生,主研方向:射频指纹识别,无线网络编码;陈 悦,本科生;许金勇,工程师、博士;梁 涛,研究员、博士生导师
  • 基金资助:

    国家自然科学基金资助项目(61102092);中国博士后科学基金资助项目(20070411066)

Radio Frequency Fingerprinting Technology in Bluetooth Communication

LI Wen-long  1, CHEN Yue  2, XU Jin-yong  3, LIANG Tao  3   

  1. (1. Institute of Communication Engineering, PLA University of Science and Technology, Nanjing 210007, China; 2. Nanjing University of Science and Technology, Nanjing 210094, China; 3. The 63rd Research Institute of PLA General Staff Headquarters, Nanjing 210007, China)
  • Received:2013-07-30 Online:2014-01-15 Published:2014-01-13

摘要:

利用开机瞬态特征对蓝牙传输设备进行射频指纹识别时,开机瞬态信号的捕获与提取存在一定的局限性。为此,提出将频率跳变瞬态特征用于蓝牙设备的唯一性鉴别,以克服开机瞬态特征的局限性。在射频指纹识别中的数据获取、瞬态信号检测、指纹提取和分类过程中对该特征进行验证,根据实验数据对鉴别性能进行评估。分析结果表明,利用频率跳变瞬态特征能够成功鉴别蓝牙设备。以对虫洞攻击的检测和防御为例,进一步分析射频指纹识别在蓝牙网络安全协议中的应用,并给出基于蓝牙指纹识别的安全链路管理协议。

关键词: 蓝牙指纹识别, 率跳变瞬态特征, 机瞬态特征, 频指纹识别

Abstract:

It is limitary to classify the radio devices by utilizing the turn-on transients character, when the turn-on transient signals are captured and extracted. Aiming at this problem, this paper investigates Frequency Hopping(FH) transients character which can be used to classify the bluetooth devices alike the Turn-on Transients(TOT) character but get rid of the limitation which the RFF based TOT character has. The FHT-Character based on the Radio Frequency Fingerprinting(RFF) process is validated, which includes data acquisition, transient detection, radio frequency fingerprint extraction, and classification subsystems. A classification performance of the identification system is evaluated from experimental data. It is demonstrated that the FHT character can be used to classify the bluetooth devices successfully. It further analyzes the implications of device fingerprinting on the security of bluetooth networking protocols which is illustrated by the example of the detection and combat for wormhole attacks. From this, a safe link management protocol is given which is based on bluetooth fingerprinting.

Key words: bluetooth fingerprinting, Frequency Hopping(FH) transients character, Turn-on Transients(TOT) character, Radio Frequency Fingerprinting(RFF)

中图分类号: