The Community for Technology Leaders
2009 IEEE/ACS International Conference on Computer Systems and Applications (2009)
Rabat, Morocco
May 10, 2009 to May 13, 2009
ISBN: 978-1-4244-3807-5
pp: 523-530
Alaaedine Chouchane , Communication Networks and Security Research Lab. University of 7th of November at Carthage. Tunisia
Slim Rekhis , Communication Networks and Security Research Lab. University of 7th of November at Carthage. Tunisia
Noureddine Boudriga , Communication Networks and Security Research Lab. University of 7th of November at Carthage. Tunisia
ABSTRACT
While radio fingerprinting has shown its efficiency in detecting rogue base stations and cloned wireless devices, the techniques proposed in this context focused on analyzing the turn-on transient portion of the signal. The proposed parameters do not allow building an accurate fingerprint. In addition, the detection of the transient requires that the transition between noise and transient does not occur gradually. We propose in this work a new signal fingerprinting approach based on discrete wavelet transformer. Instead of being extracted from the transient part, the signal fingerprint is computed on a part of the signal related to the transmission of a definite sequence of bits. This sequence is expected to be transmitted by every base station antenna in the network. To detect rogue base stations, we integrated the proposed technique to an existing security architecture called CODERA.
INDEX TERMS
CITATION

N. Boudriga, A. Chouchane and S. Rekhis, "Defending against rogue base station attacks using wavelet based fingerprinting," 2009 IEEE/ACS International Conference on Computer Systems and Applications(AICCSA), Rabat, Morocco, 2009, pp. 523-530.
doi:10.1109/AICCSA.2009.5069374
89 ms
(Ver 3.3 (11022016))