Professional Documents
Culture Documents
SUBMITTED BY:
HAJER ALSSNOSY AGHNAYAH
SUPERVISED BY:
DR. ALGHANNAI AGHNAIYA
NOV, 2023
THE COLLEGE OF ELECTRONIC TECHNOLOGY / BANI-WALID
SUBMITTED BY:
HAJER ALSSNOSY AGHNAYAH
SUPERVISED BY:
DR. ALGHANNAI AGHNAIYA
NOV, 2023
Approval of the Graduate Studies Department, College of Electronic Technology /Bani-Walid
This is to certify that we have read the thesis COMMUNICATIONS NETWORK SECURITY
TECHNIQUE BASED ON RADIO FREQUENCY FINGERPRINTING AND VARIATIONAL
MODE DECOMPOSITION
Submitted by HAJER ALSSNOSY AGHNAYAH
and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of
Master of Engineering Science.
Date:
I hereby declare that all information in this document has been obtained and presented in
accordance with academic rules and ethical conduct. I also declare that, as required by these rules
and conduct, I have fully cited and referenced all material and results that are not original to this
work.
Signature:
ABSTRACT
Radio frequency fingerprinting (RFF) is promising method for physical layer security
in wireless networks. RFF is one of the communication network’s security techniques
based on the identification of the unique features of RF transient signals. In this thesis,
we evaluated the performance of RFF technique based on variational mode decomposition
(VMD). Radio frequency fingerprinting (RFF) is based on identification of unique features
of RF transient signals emitted by Bluetooth (BT) devices. RF transient signals of BT
devices are short in duration, non-stationary and nonlinear time series. For this purpose,
VMD is used to decompose Bluetooth (BT) transient signals into a series of band-limited
modes, and then, the transient signal is reconstructed from the modes. Higher order
statistical (HOS) features are extracted from the complex form of VMD-reconstructed
transients. Then, Linear Support Vector Machine (LVM) classifier is used to identify the
BT devices. The technique has been tested experimentally with BT devices of different
mobile brands, and models. For the same dataset the classification performance
demonstrates that (RFF with VMD) technique achieves better performance (~2.3 % higher)
than (RFF without VMD) technique. Finally, it has been shown that the use of variational
mode decomposition (VMD) in extracting features from Bluetooth (BT) transient signals
offers an efficient way to improve the classification accuracy.
iii
الملخص بالعربي
تعد بصمات التردد الالسلكي ) (RFFطريقة واعدة ألمن الطبقة المادية في الشبكات الالسلكية ). (RFFهي إحدى تقنيات أمان
شبكة االتصاالت القائمة على تحديد الميزات الفريدة لإلشارات العابرة للترددات الراديوية .في هذه األطروحة ،قمنا بتقييم أداء
تقنية )(RFFبناء على تحلل الوضع المتغير (VMD).تعتمد بصمات التردد الالسلكي ) (RFFعلى تحديد الميزات الفريدة
إلشارات التردد الالسلكي العابرة المنبعثة من أجهزة Bluetooth (BT).إشارات RFالعابرة ألجهزة ) (BTقصيرة المدة،
سالسل زمنية غير ثابتة وغير خطية .لهذا الغرض ،يتم استخدام )(VMDلتحليل إشارات ) Bluetooth (BTالعابرة إلى سلسلة
من األوضاع محدودة النطاق ،وبعد ذلك ،يتم إعادة بناء اإلشارة العابرة من األوضاع .يتم استخراج الميزات اإلحصائية ذات
الترتيب األعلى ) (HOSمن الشكل المعقد للعابرين المعاد بناؤهم (VMD).بعد ذلك ،يتم استخدام مصنف آلة ناقالت الدعم
الخطي ) (LVMلتحديد أجهزة ). (BTتم اختبار هذه التقنية تجريبيا مع أجهزة ) (BTمن ماركات ونماذج هواتف محمولة
مختلفة .بالنسبة لمجموعة البيانات نفسها ،يوضح أداء التصنيف أن تقنية )(RFFمع )(VMDتحقق أداء أفضل (~ ٪2أعلى)
من تقنية )(RFFبدون ). (VMDأخيرا ،ثبت أن استخدام تحلل الوضع المتغير ) (VMDفي استخراج الميزات من إشارات
)Bluetooth (BTالعابرة يوفر طريقة فعالة لتحسين دقة التصنيف.
v
DEDICATION
I want to dedicate this work to those who have passed away before witnessing its completion.
Your presence may be missed, but your memory lives on in my heart. I hope this achievement
brings you a sense of pride and serves as a tribute to your unwavering belief in me.
vi
ACKNOWLEDGMENTS
I would like to express my sincere gratitude to several individuals who have contributed to the
completion of this Thesis.
Firstly, I would like to thank my supervisor, [DR. ALGHANNAI AGHNAIYA], for his guidance,
support, and valuable insights throughout the entire research process. His expertise and feedback
have been instrumental in shaping this study.
Your expertise in [Teaching and supervision] has been instrumental in shaping my research
direction and methodology. Your patience and willingness to answer my countless questions have
fostered a deep understanding of the subject matter. I am truly grateful for your dedication and the
time you have invested in my academic growth
Finally, To my family and friends, thank you for your unwavering support and encouragement
throughout this journey. Your belief in my abilities and continuous words of motivation have been
instrumental in keeping me inspired and motivated. I dedicate this work to my loved ones who
passed away before seeing it completed, especially to my uncles and grandmother who always had
high hopes for its completion. This achievement is a testament to their unwavering belief in me,
and I hope it brings them a sense of pride wherever they are.
Overall, I would like to express my deepest gratitude to everyone who has contributed to the
completion of this Thesis. Your guidance, support, and encouragement have been invaluable, and
I am truly humbled and grateful for the opportunity to have worked with you all. Thank you for
being a part of my journey and for helping me reach this important milestone.
vii
TABLE OF CONTENTS
CHAPTER
1. INTRODUCTION.........................................................................................1
1.1 Background ............................................................................................1
1.2 Organization ......................................................................................2
1.3 Related Works ..................................................................................3
1.4 Problem statement ..................................................................................8
1.5 Research goal ....................................................................................8
2. RADIO FREQUENCY FINGERPRINTING ............................................9
2.1 Radio Frequencies ..................................................................................9
2.2 Radio Frequency Fingerprints ....................................................10
2.3 Traditional RFF Approaches................................................................10
2.3.1 Steady-state Analysis....................................................... 10
viii
3. VARIATIONAL MODE DECOMPOSITION (VMD) ...........................15
3.1 Theoretical Basics of VMD .................................................................15
3.1.1 Construction and solution of optimization problem ................... 15
3.1.2 Evaluation criteria for denoising algorithm ................................ 18
3.1.3 Advantages and disadvantages of VMD ................................... 21
3.2 Implementation of VMD ...................................................................... 22
3.2.1 Noise Robustness ........................................................................ 22
3.2.2 Decomposition of Complex Multimode Signal .......................... 24
3.2.2.1 Decomposition of Piecewise Stationary Signal .................... 24
3.2.2.2 Decomposition of Chirp signal ............................................. 24
3.2.2.3 Decomposition of General linear Trend with Two Harmonics
................................................................................................. 27
3.2.2.4 Decomposition of General Quadratic Trend with Chirp Signal
and Piecewise Harmonics ........................................................ 27
6. CONCLUSIONS ......................................................................................... 44
REFERENCES ....................................................................................................... 45
ix
LIST OF TABLES
TABLES
Table 3.1 VMD main parameters and their functions ............................................. 18
Table 4.1. Brands and models of mobile phones ...................................................... 35
x
LIST OF FIGURES
FIGURES
xi
LIST OF SYMBOLS/ABBREVIATIONS
xii
PUF Physical Unclonable Function
ASK Amplitude-Shift Keying
PSK Phase-Shift Keying
KNN K-Nearest Neighbors
BSCD Bayesian Step Change Detection
PD Phase Detection
WPA Wi-Fi Protected Access
TKIP Temporal Key Integrity Protocol
MAC Media Access Control
FT Fourier Transform
VAR Variance
KURT Kurtosis
xiii