Deep learning based RF fingerprinting for device identification and wireless security

Deep learning based RF fingerprinting for device identification and wireless security

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

RF fingerprinting is an emerging technology for identifying hardware-specific features of wireless transmitters and may find important applications in wireless security. In this study, the authors present a new RF fingerprinting scheme using deep neural networks. In particular, a long short-term memory based recurrent neural network is proposed and used for automatically identifying hardware-specific features and classifying transmitters. Experimental studies using identical RF transmitters showed very high detection accuracy in the presence of strong noise (signal-to-noise ratio as low as dB) and demonstrated the effectiveness of the proposed scheme.


    1. 1)
    2. 2)
      • 2. Hall, J., Barbeau, M., Kranakis, E.: ‘Enhancing intrusion detection in wireless networks using radio frequency fingerprinting’, Communications, internet, and information technology, St. Thomas, US Virgin Islands, November 2004, pp. 201206.
    3. 3)
    4. 4)
      • 4. Dolatshahi, S., Polak, A., Goeckel, D.L.: ‘Identification of wireless users via power amplifier imperfections’. Signals, Systems and Computers (ASILOMAR), 2010 Conf. Record of the Forty Fourth Asilomar Conf., Pacific Grove, CA, USA, November 2010, pp. 15531557.
    5. 5)
    6. 6)
      • 6. Brik, V., Banerjee, S., Gruteser, M., et al: ‘Wireless device identification with radiometric signatures’. Proc. of the 14th ACM Int. Conf. on Mobile Computing and Networking, San Francisco, CA, USA, September 2008, pp. 116127.
    7. 7)
      • 7. Nguyen, N.T., Zheng, G., Han, Z., et al: ‘Device fingerprinting to enhance wireless security using nonparametric bayesian method’. 2011 Proceedings IEEE INFOCOM, Shanghai, China, April 2011, pp. 14041412.
    8. 8)
      • 8. Rahman, M.M.U., Yasmeen, A., Gross, J.: ‘Phy layer authentication via drifting oscillators’. 2014 IEEE Global Communications Conference, Austin, TX, USA, December 2014, pp. 716721.
    9. 9)
    10. 10)
      • 10. Graves, A., Mohamed, A.-R., Hinton, G.: ‘Speech recognition with deep recurrent neural networks’. 2013 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, May 2013, pp. 66456649.
    11. 11)
      • 11. Huang, Z., Xu, W., Yu, K.: ‘Bidirectional lstm-crf models for sequence tagging’, arXiv preprint arXiv:1508.01991, 2015.
    12. 12)
      • 12. Kiperwasser, E., Goldberg, Y.: ‘Simple and accurate dependency parsing using bidirectional lstm feature representations’, arXiv preprint arXiv:1603.04351, 2016.

Related content

This is a required field
Please enter a valid email address