TY - GEN
T1 - Shifting Signatures
T2 - 13th Annual IEEE Conference on Communications and Network Security, CNS 2025
AU - Irfan, Muhammad
AU - Oligeri, Gabriele
AU - Sciancalepore, Savio
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software-Defined Radios (SDR). Previous works have highlighted that the radio power cycle of SDRs leads to fingerprint mutations. In this work, we first show that fingerprint mutations also appear when reloading the firmware of the transmitter, not only when power cycling the device. Moreover, we introduce a new methodology for abstracting fingerprint mutations into a graph and provide a theoretical framework for assessing fingerprint reliability. Our results show that the common assumption that the RF fingerprint is unique and persistent is incorrect. Through real-world measurements collected via the popular USRP X310 and using state-of-the-art deep learning techniques, we exper-imentally demonstrate that the considered SDR (USRP X310) features multiple fingerprints that can be clustered according to shared features. Moreover, we show that the RF fingerprint is a time-independent probabilistic phenomenon, which requires the collection of multiple samples across various reloads to achieve the necessary reliability.
AB - Radio Frequency Fingerprinting (RFF) offers a unique method for identifying devices at the physical (PHY) layer based on their RF emissions due to intrinsic hardware differences. Nevertheless, RFF techniques depend on the ability to extract information from the PHY layer of the radio spectrum by resorting to Software-Defined Radios (SDR). Previous works have highlighted that the radio power cycle of SDRs leads to fingerprint mutations. In this work, we first show that fingerprint mutations also appear when reloading the firmware of the transmitter, not only when power cycling the device. Moreover, we introduce a new methodology for abstracting fingerprint mutations into a graph and provide a theoretical framework for assessing fingerprint reliability. Our results show that the common assumption that the RF fingerprint is unique and persistent is incorrect. Through real-world measurements collected via the popular USRP X310 and using state-of-the-art deep learning techniques, we exper-imentally demonstrate that the considered SDR (USRP X310) features multiple fingerprints that can be clustered according to shared features. Moreover, we show that the RF fingerprint is a time-independent probabilistic phenomenon, which requires the collection of multiple samples across various reloads to achieve the necessary reliability.
UR - https://www.scopus.com/pages/publications/105020935682
U2 - 10.1109/CNS66487.2025.11194974
DO - 10.1109/CNS66487.2025.11194974
M3 - Conference contribution
AN - SCOPUS:105020935682
T3 - 2025 IEEE Conference on Communications and Network Security, CNS 2025
BT - 2025 IEEE Conference on Communications and Network Security, CNS 2025
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 8 September 2025 through 11 September 2025
ER -