计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2014年
1期
11-14,19
,共5页
李文龙%陈悦%许金勇%梁涛
李文龍%陳悅%許金勇%樑濤
리문룡%진열%허금용%량도
蓝牙指纹识别%频率跳变瞬态特征%开机瞬态特征%射频指纹识别
藍牙指紋識彆%頻率跳變瞬態特徵%開機瞬態特徵%射頻指紋識彆
람아지문식별%빈솔도변순태특정%개궤순태특정%사빈지문식별
bluetooth fingerprinting%Frequency Hopping(FH) transients character%Turn-on Transients(TOT) character%Radio Frequency Fingerprinting(RFF)
利用开机瞬态特征对蓝牙传输设备进行射频指纹识别时,开机瞬态信号的捕获与提取存在一定的局限性。为此,提出将频率跳变瞬态特征用于蓝牙设备的唯一性鉴别,以克服开机瞬态特征的局限性。在射频指纹识别中的数据获取、瞬态信号检测、指纹提取和分类过程中对该特征进行验证,根据实验数据对鉴别性能进行评估。分析结果表明,利用频率跳变瞬态特征能够成功鉴别蓝牙设备。以对虫洞攻击的检测和防御为例,进一步分析射频指纹识别在蓝牙网络安全协议中的应用,并给出基于蓝牙指纹识别的安全链路管理协议。
利用開機瞬態特徵對藍牙傳輸設備進行射頻指紋識彆時,開機瞬態信號的捕穫與提取存在一定的跼限性。為此,提齣將頻率跳變瞬態特徵用于藍牙設備的唯一性鑒彆,以剋服開機瞬態特徵的跼限性。在射頻指紋識彆中的數據穫取、瞬態信號檢測、指紋提取和分類過程中對該特徵進行驗證,根據實驗數據對鑒彆性能進行評估。分析結果錶明,利用頻率跳變瞬態特徵能夠成功鑒彆藍牙設備。以對蟲洞攻擊的檢測和防禦為例,進一步分析射頻指紋識彆在藍牙網絡安全協議中的應用,併給齣基于藍牙指紋識彆的安全鏈路管理協議。
이용개궤순태특정대람아전수설비진행사빈지문식별시,개궤순태신호적포획여제취존재일정적국한성。위차,제출장빈솔도변순태특정용우람아설비적유일성감별,이극복개궤순태특정적국한성。재사빈지문식별중적수거획취、순태신호검측、지문제취화분류과정중대해특정진행험증,근거실험수거대감별성능진행평고。분석결과표명,이용빈솔도변순태특정능구성공감별람아설비。이대충동공격적검측화방어위례,진일보분석사빈지문식별재람아망락안전협의중적응용,병급출기우람아지문식별적안전련로관리협의。
It is limitary to classify the radio devices by utilizing the turn-on transients character, when the turn-on transient signals are captured and extracted. Aiming at this problem, this paper investigates Frequency Hopping(FH) transients character which can be used to classify the bluetooth devices alike the Turn-on Transients(TOT) character but get rid of the limitation which the RFF based TOT character has. The FHT-Character based on the Radio Frequency Fingerprinting(RFF) process is validated, which includes data acquisition, transient detection, radio frequency fingerprint extraction, and classification subsystems. A classification performance of the identification system is evaluated from experimental data. It is demonstrated that the FHT character can be used to classify the bluetooth devices successfully. It further analyzes the implications of device fingerprinting on the security of bluetooth networking protocols which is illustrated by the example of the detection and combat for wormhole attacks. From this, a safe link management protocol is given which is based on bluetooth fingerprinting.