Next Article in Journal
Adaptive Lifting Index (aLI) for Real-Time Instrumental Biomechanical Risk Assessment: Concepts, Mathematics, and First Experimental Results
Next Article in Special Issue
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT
Previous Article in Journal
A New Model of Air–Oxygen Blender for Mechanical Ventilators Using Dynamic Pressure Sensors
Previous Article in Special Issue
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bluetooth Device Identification Using RF Fingerprinting and Jensen-Shannon Divergence

by
Rene Francisco Santana-Cruz
1,
Martin Moreno-Guzman
2,
César Enrique Rojas-López
3,
Ricardo Vázquez-Morán
3 and
Rubén Vázquez-Medina
1,*
1
Instituto Politécnico Nacional, Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada, Santiago de Querétaro 76090, Mexico
2
Universidad Tecnológica de San Juan del Río, San Juan del Río 76800, Mexico
3
Instituto Politécnico Nacional, Escuela Superior de Ingeniería Mecánica y Eléctrica, San Francisco Culhuacan, Mexico City 04440, Mexico
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(5), 1482; https://doi.org/10.3390/s24051482
Submission received: 26 January 2024 / Revised: 10 February 2024 / Accepted: 21 February 2024 / Published: 24 February 2024
(This article belongs to the Special Issue Security, Cybercrime, and Digital Forensics for the IoT)

Abstract

:
The proliferation of radio frequency (RF) devices in contemporary society, especially in the fields of smart homes, Internet of Things (IoT) gadgets, and smartphones, underscores the urgent need for robust identification methods to strengthen cybersecurity. This paper delves into the realms of RF fingerprint (RFF) based on applying the Jensen-Shannon divergence (JSD) to the statistical distribution of noise in RF signals to identify Bluetooth devices. Thus, through a detailed case study, Bluetooth RF noise taken at 5 Gsps from different devices is explored. A noise model is considered to extract a unique, universal, permanent, permanent, collectable, and robust statistical RFF that identifies each Bluetooth device. Then, the different JSD noise signals provided by Bluetooth devices are contrasted with the statistical RFF of all devices and a membership resolution is declared. The study shows that this way of identifying Bluetooth devices based on RFF allows one to discern between devices of the same make and model, achieving 99.5% identification effectiveness. By leveraging statistical RFFs extracted from noise in RF signals emitted by devices, this research not only contributes to the advancement of the field of implicit device authentication systems based on wireless communication but also provides valuable insights into the practical implementation of RF identification techniques, which could be useful in forensic processes.

1. Introduction

In the realm of IoT ecosystems, especially those characterized by high device density, Bluetooth is emerging as the first choice for wireless communication among IoT gadgets. This preference is due to Bluetooth’s minimal energy requirements, the cost-effectiveness of its radio components, and its innate ability to establish direct connections with smartphones, thus providing a seamless interface for users [1,2,3]. Concurrently, the development and integration of sophisticated RFF methods for IoT devices are underscored by the critical need for identifying and mitigating unauthorized access. This capability not only strengthens the security framework of network infrastructures, but also protects against intrusion into critical systems [4,5]. In alignment with these security measures, RFF is recognized for its pivotal role in strengthening the security of wireless devices [6]. By leveraging unique identifiers, RFF enhances the accuracy of device recognition, significantly reducing the risks associated with spoofing attacks and thereby strengthening the resilience of network defenses. IoT applications use the 2.4 GHz ISM band of Bluetooth technology, referred to as RF signals, for short-range communication [7,8,9]. The technology has difficulty distinguishing individual devices within the radio frequency spectrum, requiring the use of advanced identification techniques. These techniques typically involve machine learning approaches.
The adoption of machine learning for RF device identification, including SVM and deep learning, faces significant challenges. These methods require extensive and varied datasets, which are often scarce. The Multisampling Convolutional Neural Network (MSCNN) for RFF has demonstrated high accuracy in IoT device identification, achieving up to 97.00% under line-of-sight conditions [10]. However, it requires large datasets and may encounter scalability issues due to model complexity. CNNs for RFF offer scalability and rich feature-extraction capabilities, but exhibit inconsistent performance in different environments, with accuracy dropping to below 78.00%, and demanding high computational resources, making them unsuitable for real-time applications in resource-constrained environments [11]. The Full Neural Network (FNN) distinguishes NFC tags with up to 96.16% accuracy, outperforming both CNN and RNN in NFC security applications [12]. Conversely, the Dense Neural Network (DNN) achieves 98.69% accuracy in RFF, although its effectiveness is highly dependent on the quality and size of the images, indicating potential limitations under varying conditions [13]. This highlights a trade-off between accuracy and resource requirements, underlining the need for optimization to improve applicability. Additionally, the lightweight CNN for Zigbee device identification records an accuracy of 93.47% in low SNR conditions, questioning its robustness [14]. CNNs that incorporate multi-channel inputs and feature fusion represent an improved approach, offering better identification accuracy and robustness [15].
SVMs and Neural Networks (NN) have been scrutinized, with SVM using a polynomial kernel function to achieve higher accuracy, in particular demonstrating remarkable effectiveness in Bluetooth device identification with a classification accuracy of 97.90% [16,17,18]. Nevertheless, the reliability of SVM in Bluetooth RFF is questioned at low Signal-to-Noise Ratio (SNR) levels, showing a reduced accuracy of 90.53% and highlighting concerns in weak signal scenarios for network security applications [19]. The use of SVMs, while advantageous for dealing with high-dimensional data and nonlinear relationships through the kernel, encounters skepticism due to the complexity of kernel selection, parameter tuning, scalability issues, and limited interpretability, challenging their feasibility in large-scale RFF systems [20]. Moreover, an accuracy of 94.20% in some RFF cases indicates potential overfitting, computational intensity, and the complexity of hyperparameter tuning, which could limit their practicality [21]. Additionally, while achieving a 90.00% accuracy in RFF for device-to-device (D2D) security, concerns remain regarding scalability and kernel selection, which could impact performance in various scenarios [22]. A study using Variational Mode Decomposition (VMD) for feature extraction with Linear SVM (LSVM) showed an improved accuracy of 97.10% for Bluetooth device classification at lower SNR levels, suggesting that extracting Higher Order Statistics (HOS) features could enhance classification performance by approximately 4%. However, the effectiveness of this method decreases significantly below certain SNR thresholds, highlighting the limitations in noisy conditions [23]. The innovative RF-DNA and SVM-based approach for IoT security, despite its high complexity, faces critical implementation challenges for effective robust device authentication due to its 93.20% accuracy rate, making it a resource-intensive solution [24].
This paper introduces a novel RFF technique derived from intrinsic noise and analyzed using the Probability Density Function (PDF) specifically for Bluetooth devices in IoT applications. The innovation of this study lies in its simplicity and the unique application of the PDF of RFF for Bluetooth device classification, using the JSD for enhanced accuracy. Unlike previous studies that have used RFF, none have applied the PDF of RFF to Bluetooth devices, which marks a distinctive approach in this research. Central to this method is the collection of noise reference signals during the steady-state operation of Bluetooth devices, collected at the receiver end in a controlled experimental setup. This setup is essential to minimize external interference and ensure data the consistency and reliability, and to accurately represent the unique RF emissions of each Bluetooth transmitter. The PDF of each noise signal is then calculated, providing a statistical profile of the noise level distribution within the signal, which serves as a unique RFF for each transmitter. The process culminates in the calculation of a concatenated PDF, representing the statistical RFF of the device. By using JSD to compare the probability distributions of disputed signals and RFFs, the method achieves a remarkable device identification accuracy of 99.50%, demonstrating the potential of this approach for accurate Bluetooth device identification in IoT applications.
The rest of this paper is structured into six sections. Section 2 defines the five specifications for device RFFs: uniqueness, universality, persistence, collectability, and robustness. These criteria ensure that each RFF is unique, applicable to a wide range of devices, stable over time, easy to collect and robust under various conditions. Section 3 delves into the specifics of Bluetooth signal processing. It covers the necessary steps, such as signal filtering, state detection, and the RFF definition based on noise signals in Bluetooth communication. In Section 4, a case study is presented, using the noise signal database developed by Uzundurukan et al. [16,17]. This section introduces an MSE-based criterion for determining the number of reference noise signals to be evaluated to set up a Bluetooth RFF. It also proposes a method to compensate for the amplitude difference of noise signals received at different distances between the receiver and the transmitter. The section culminates in demonstrating the practical application of the estimated RFF for device discrimination using JSD. Section 5 provides a critical analysis of the results, comparing the proposed discrimination method with Uzudurukan’s method when applied to the same case study. Finally, Section 6 gives the conclusions of this paper.

2. RFF Specifications

The study of device identification based on RFFs defined from noise signals in the Bluetooth frequency band has been a central topic in wireless communication research [10,11,12,13,14,15,16,17,19,20,21,22,23,24,25,26,27,28,29]. Numerous influential studies have significantly advanced on this topic, using various methods and innovative approaches to improve the precision and dependability of RFF techniques [10,11,12,14,15,17,22,25]. A Bluetooth signal can be treated as an investigative object to identify potential threats or attacks. In this context, RFF is a promising technique for secure device discrimination, identification or authentication. According to Soltanieh et al. [6], RFF methods are scrutinized against five fundamental specifications to ensure their efficacy and reliability as follows:
  • Uniqueness. It ensures distinctiveness by preventing any two devices from sharing identical RFF, thus facilitating individual device identification.
  • Universality. It guarantees unique RFF features for each device, providing complete coverage of all devices on a given network.
  • Persistence. It requires the RFF to remain constant over time, unaffected by environmental fluctuations, ensuring stability and reliability in device identification.
  • Collectability. It requires that the RFF be quantitatively measurable, allowing for accurate data analysis and device identification using rigorous measurement techniques.
  • Robustness. It preserves the integrity of the RFF against environmental changes and device-related factors, ensuring consistent and reliable authentication regardless of varying conditions.

3. Bluetooth Signals for the Device Discrimination

This section focuses on the intricate realm of Bluetooth signal manipulation, exploring key techniques such as signal filtering, state identification and RFF. Rooted in the meticulous analysis of noise signals in Bluetooth transmissions, these procedures are fundamental components of understanding and effectively manipulating Bluetooth signals. This section highlights the nuanced methods used to navigate the complexities of Bluetooth signal processing, providing insights essential for further exploration and application in the field.

3.1. Noise Model

The analysis of the noise model is defined as:
η = η T x + η R x .
This equation represents the total noise received,  η , from a Bluetooth transmitter. The term  η T x  denotes the intrinsic noise from the transmitter under study, while  η R x  denotes the additional noise introduced from the receiver. This model is crucial for analyzing and understanding the characteristics of the composite noise in Bluetooth communication. Then, solving Equation (1) yields Equation (2), which allows one to isolate the transmitter-specific noise signal from the total noise.
η T x = η η R x .
Figure 1 visually presents the noise model as described in Equation (2). It is noteworthy that in the initial state, the noise mainly comes from the receiver Rx. However, during the transient state, the transmitter Tx is activated, and total noise then embodies both the transmitter and receiver noise components. This transient state gradually stabilizes, reflecting the integration of Tx and Rx, and thus transitions to a stable state. This visual representation helps to understand the dynamic interaction between transmitter and receiver noise within the Bluetooth communication system.
This analysis describes the interaction between the intrinsic noise of the transmitter  η T x  and the additive noise from the receiver  η R x , and their impact on the total noise  η . It analyzes how noise dominance shifts from the receiver to the transmitter during a transitional phase, culminating in a combined transmitter-receiver noise state. This approach provides insight into the dynamics of noise in Bluetooth systems.

3.2. Signal Filtering

Because the signals received at the Bluetooth receiver span contain a variety of components over a wide frequency spectrum, it is required to apply a bandpass filter. This filter is specifically designed to isolate and extract the Bluetooth ISM band from 2.4 GHz to 2.485 GHz (as depicted in Figure 2). In addition, the choice of sampling frequency for this process must adhere to the Nyquist theorem. This theorem states that the sampling frequency must be at least twice the highest frequency component of the signal in order to accurately reconstruct the signal without aliasing. Therefore, the sampling frequency was chosen to be equal to or greater than 4.97 GHz to ensure the integrity and fidelity of the Bluetooth signal. Note that Figure 2 shows two different signals. The first signal shows the wide range of frequencies in the original, unfiltered signal. The second signal shows the ISM band, illustrating how the bandpass filter narrows the frequencies down to only those present inside the Bluetooth band.

3.3. State Detection

Figure 3 provides a clear representation of the different states of a Bluetooth signal as it is received by a Bluetooth receiver. The signal is divided into three distinct parts: the initial state, the transient state, and the steady state. The transient state marks the transition of the signal from its initial state to a steady state. The transient state is identified by specific changes in the signal amplitude. It begins when the signal amplitude is just above its lowest level.
This starting point is mathematically defined as  M i n M a x M i n 20 , where  M i n  and  M a x  are the minimum and maximum values, respectively, of the smoothed envelope of the Bluetooth signal. In contrast, the end of the transient state is marked when the signal’s amplitude approaches, but does not quite reach, its maximum level. This end point is described by the expression  M a x M a x M i n 20 . This expression helps to determine exactly when the signal goes from changing to reaching a steady state. In summary, Figure 3 is a tool for analyzing a Bluetooth signal, providing a guide to follow the progression of the signal through its initial, transient and steady states, with special emphasis on the transient state because of its significant effect in highlighting the change between the initial and steady states of the Bluetooth signal.

3.4. RFFs for Bluetooth Devices

To create the RFF, it is necessary to concatenate a set of noise signals extracted from the steady state of the RF signals at the Bluetooth receiver for each Bluetooth transmitter. This set of noise signals forms the noise reference signals, which are extracted from the Bluetooth signal at the receiver under the assumption that these signals are collected in a controlled experimental setup. For each noise signal in this set, its PDF is calculated. The median PDF, derived from the average of all calculated PDFs, constitutes the statistical RFF to be used in this work. It should be noted that each PDF of the noise signal is calculated using Equation (2), and this process is visually demonstrated in Figure 4.
In signal analysis, especially when dealing with noise reference signals in Bluetooth communication, a crucial step is to identify the optimal number of these signals needed for accurate analysis. This process is guided by the MSE criterion, a statistical method for evaluating the accuracy of signal representation. The method involves a comparative analysis of the PDF computed using n noise reference signals against the PDF obtained using  n + 1  noise reference signals. The aim here is to find the point at which increasing the number of signals does not significantly improve the accuracy of the PDF representation. However, the number of noise reference signals that are required should be determined. For this purpose, the MSE criterion was applied between PDF with n noise reference signals and PDF with  n + 1  noise reference signals. According to Figure 5, thirty noise reference signals were considered assuming that MSE is less than  3.5 . Note in Figure 5a that the MSE has been calculated from n = 2 up to n = 100 and when  n 30 , the MSE is very small compared to the initial values when  n < 30 . As depicted in Figure 5, a critical threshold is identified at 30 noise reference signals. This decision is based on the assumption that an MSE value of less than 3.5 is acceptable for accurate signal representation. When examining the MSE values for n ranging from 2 to 100, as shown in Figure 5a, a notable pattern emerges. It is observed that once the number of noise reference signals reaches 30 or more, the MSE decreases to a level significantly smaller than its values for  n < 30 . This implies that beyond the count of thirty signals, the gain in accuracy, as quantified by the MSE, reaches a plateau, suggesting that additional signals provide minimal improvement.

4. Discrimination of Bluetooth Devices

This section delves into the case study discussed and presents a basic scaling method for data analysis and interpretation. It also defines a statistical RFF to uniquely identify each device in the study. Using the JSD, the devices are distinguished by their statistical RFFs, and a detailed description of the methodological framework and the tools used in the analysis is provided.

4.1. Case Study

The study uses a comprehensive database of Bluetooth devices, meticulously prepared and compiled in 2020 by Uzundurukan et al. [16]. This database encompasses eight distinct models from four different smartphone brands, as detailed in Table 1. The methodology adopts a systematic approach for device designation, categorizing smartphone name-1 as the original and smartphone name-2 as the corresponding twin. The inclusion of a wide range of models and brands facilitates a comprehensive analysis, and ensure the study’s completeness in examining the distribution and characteristics of Bluetooth devices.
In the database, each smartphone model is paired with a twin variant, leading to a total of sixteen devices. A significant number of signals, specifically one hundred and fifty unique signals per device, are available for analysis. All signals in the database were sampled at a high frequency (5 Gsps), ensuring the acquisition of high-resolution data. This results in a comprehensive collection of two thousand four hundred signals, providing a rich and varied dataset for the study.

4.2. Bluetooth Signal Matching

In this work, a statistical method is proposed to define RFF for Bluetooth devices. Statistical characteristics, such as the mean or standard deviation, although commonly used, are often insufficient to provide insight into the behavior of a device. Therefore, the PDF is selected for further analysis. The PDFs calculated for three noise signals in the steady state from a single device are shown in Figure 4. This representation carefully considers the integration of receiver noise with the noise generated by the Bluetooth transmitter, providing a nuanced view of the signal characteristics unique to the device.
In order to minimize potential errors, a scaling method has been proposed, as detailed in Equation (3). It is designed to normalize the amplitude of signals received from different transmitters. In this framework,  a ( i )  is defined as the signal detected at the receiver by monitoring the transmitter i a M A X ( i )  represents the maximum amplitude of  a ( i )  and  a M A X ( 1 )  indicates the highest amplitude of  a ( 1 ) . In particular, the transmitter signal 1, when monitored, is used as the reference point for scaling. Note, however, it should be noted that any other signal can be used as a reference in this scaling process.
a e ( i ) = a ( i ) a M A X ( i ) · a M A X ( 1 )
In the graphs of Figure 6, a general overview of the scaling method used is noted. Figure 6a shows a visual representation of the PDF of the three unique noise signals from a single Bluetooth device before the scaling method has been applied. Note the inherent amplitude variation found between PDFs of noise signals of that device. However, Figure 6b demonstrates the result of the applied scaling. Note that the PDFs of the three unique noise signals are more uniform and consistent with each other, showing the ability of the method to standardize the signal characteristics.

4.3. Statistical RFF for Case Study

Figure 7 illustrates the results obtained from the sixteen devices that were examined in the case study. It is important to note that only the positive part of the PDFs of the noise signals was considered. This decision is based on the bimodal and symmetric properties of these statistical distributions. It should be noted that each RFF associated with the devices is unique. This uniqueness of the RFFs accentuates the individual characteristics of each device signal, highlighting the distinctiveness and specificity that the RFF methodology brings to the analysis of device signals. This distinctiveness is useful for understanding and identifying the unique aspects of each noise signal profile within the broader context of the study.

4.4. Device Identification by Using Statistical RFF and JSD

For this work, the JSD was used to discriminate the Bluetooth devices in the process of defining a RFF for each, according to Section 3.4. An integral part of this methodology is the use of fifty dispute signals for each device in the discrimination process. The signal that provides the lowest JSD, calculated according to Equation (4), is then assigned to the respective device. The disputed PDF P is compared to the reference PDF, which is the RFF extracted from the noise component of the RF signal emitted by a device Q. Using the JSD given in Equation (4) for this comparison ensures that disputed signals are assigned to their respective devices, thereby increasing the accuracy of device identification within the study.
J S D ( P Q ) = 1 2 K L D ( P M ) + 1 2 K L D ( Q M ) ,
where  M = 1 2 ( P + Q ) .
The findings of this research are presented in Table 2, which shows the confusion matrix derived from the case study. To construct the confusion matrix, the 50 disputed signals are taken into account. Once all the classifications have been made, the model’s accuracy percentage is calculated. This percentage is obtained by dividing the total number of correct predictions by the total number of predictions made and multiplying it by 100 to express it as a percentage. To obtain the effectiveness percentage, the values on the main diagonal of the confusion matrix are averaged. This matrix reveals an accuracy rate of 99.5%. Within this matrix, a notable discrepancy is observed, with an 8% error rate in distinguishing between devices twelve and seven. This specific issue is further explored in Figure 7, which shows the RFF of both devices, in addition to a signal that was assigned to the incorrect device.
The cause of this misattribution can be attributed to the peculiarities of the disputed signal. In particular, its oscillation pattern appears to be the key factor in the error. This pattern differs significantly from the standard patterns observed in the RFFs of these devices. Normally, RFFs are expected to be consistent and distinctive for each device, allowing for accurate identification. However, when a signal exhibits atypical patterns, such as unique oscillations that are not characteristic of the device’s standard RFF, it can lead to misidentification.

5. Discussions and Comparisons

In this section, the discussion focuses on the analysis of the results obtained in the previous section of the study. The aim is to delve deeper into the findings and provide a deep understanding of their implications and meaning within the context of the study. The methodological approach and results of Uzundurukan et al. [16] will also be examined in detail in Section 5.2.

5.1. Discussion

The results achieved in this study strengthen the concept of developing systems for authenticating individuals using mobile devices identified within an IoT network. In this context, the findings facilitate the creation of algorithms tailored to uniquely identify devices. These algorithms are capable of identifying devices in IoT networks using unique identifiers such as MAC addresses, communication patterns, or unique signatures/RFFs that are both universal and unique to each device. Such technological advances are crucial to strengthening the security of networked environments, where the accurate authentication and identification are essential to prevent unauthorized access and to maintain network integrity, thereby guaranteeing the security and reliability of interconnected systems.
The proposed scaling method for signals in the database is introduced to address the amplitude disparities among the sampled signals. These disparities may arise due to various factors, with the variation in the acquisition distance of each signal being a primary candidate. In an environment where signals are captured from different distances, it is likely that the amplitude of the sampled signal will vary accordingly. It is noteworthy that although some signals were observed to be discretized, they were not discarded in the analysis. The rationale behind this decision lies in the fundamental assumption of the study that all signals are properly acquired. In this context, it is assumed that the differences identified between the signals are due exclusively to variations in the distance between the Bluetooth transmitter and the receiver, rather than errors in the data acquisition process. In Figure 8, an example illustrating the implications of these variations in signal classification is shown. A signal has been incorrectly assigned to a different device due to this discrepancy. This misclassification is suggested to stem from the fact that the signal in question was discretely sampled. This discrete sampling is manifested in the oscillations observed in the dispute signal, implying a non-continuous representation of the data, which may impact the accuracy of the classification process.

5.2. Device Identification by Uzundurukan’s Method

A comprehensive comparison is made between the results obtained with the proposed method and with Uzundurukan’s method applied to the case study defined in Section 4.3. This comparison not only evaluates the effectiveness but also takes into account the implementation time, which includes the resources and time required for both the training process and the identification phase. According to Uzundurukan et al. [16,17], Uzundurukan’s method uses a nonlinear SVM with a quadratic kernel, and it applies a process to scale the amplitude of the noise signals similar to that used in the proposed method and detailed in Section 4.2. Although they reported that their SVM-based method achieved an accuracy rate of 97.9%, it could be determined that this accuracy rate was 80.13% when applied to the case study mentioned in Section 4.1. These results, shown in Table 3, allowed us to establish a baseline for the comparative analysis. The discrepancy found could be attributed to the fact that the original method uses the transient state of the noise signals, while the current application focuses on their steady state. First, it is assumed that the noise signal extracted from the transient state is analyzed against the RFF using a SVM. The discrimination process of the RFF consists of two main stages: (a) the training phase, in which the SVM model is applied to a dataset representative of the noise signal using the transient state of the noise signals, allowing the SVM model to learn and adapt, and (b) the discrimination phase, in which the trained RFF is used to analyze new signals and evaluate their congruence with the trained model. This bifurcated methodology, which integrates both training and practical application, facilitates effective device identification.
Uzundurukan’s SVM approach integrates three statistical metrics—kurtosis, skewness, and variance—of the intrinsic noise to provide a comprehensive understanding of system behavior within a pre-trained SVM framework. This SVM was developed using a quadratic kernel when running in MATLAB R23b on an AMD Ryzen 5 2500U computer, with 32 GB of RAM and an AMD Radeon TM Vega 8 processor. This approach provides a global perspective on system statistical dynamics. In contrast, the proposed method uses the PDF of the intrinsic noise to facilitate a detailed examination of system behavior. By using the JSD for comparison against a reference PDF, the method enables a granular assessment. This emphasis on detailed statistical analysis enhances the accuracy of the proposed method. Importantly, both approaches focus their analysis on the steady state of the noise signal, ensuring consistency and reliability in the evaluation process.

6. Conclusions

This study concludes that the RFF can be accurately defined by using the PDF of RF noise signals, which are carefully collected from each Bluetooth device in a well-controlled laboratory environment. The statistically derived RFFs satisfy the fundamental characteristics of a device RFF, including aspects such as uniqueness, universality, persistence, collectability, and robustness. In addition, the application of JSD to the PDFs of noise signals, especially in the steady state of the RF signal received by the Bluetooth receiver, and their subsequent comparison with the RFFs of corresponding Bluetooth devices, has proven effective for device classification. The proposed statistical classifier shows promise for broad applicability across different radio frequency technologies, requiring only the computation of statistical distributions of noise signals according to their operating frequency bands. The results of this study clearly highlight the improved efficiency of the proposed statistical method compared to the machine learning approach advocated by Uzundurukan et al. [17]. Remarkably, the statistical classifier achieves a processing time of only 0.21 s, significantly outperforming the machine learning method based on a nonlinear SVM, which requires about 5.35 s. This significant discrepancy in processing time underscores the exceptional speed and computational efficiency of the statistical model, making it particularly advantageous for scenarios requiring rapid data processing. The findings in this work underscore the practical utility of the statistical methodology, especially in situations where time-sensitive data processing is essential for decision making or real-time applications. The efficiency of the statistical classifier, as evidenced by its fast computational capabilities, also makes it a viable option for resource-intensive tasks. This study not only reaffirms the importance of considering processing speed in the selection of analytical methods, but also contributes valuable insights to the field of data analysis, underscoring the importance of using statistical techniques for efficient data-driven solutions in various contexts. This study highlights the effectiveness of statistical methods in the rapid analysis of data, which is essential for decision-making and real-time applications in IoT solutions and cybersecurity. The rapid processing capabilities of the statistical classifier make it an ideal choice for tasks that require fast and efficient data processing, highlighting the critical role of processing speed in the selection of analytical methods. These results support the use of statistical techniques to improve communications security and device authentication. By demonstrating that RFFs, as defined by PDFs, can robustly identify and classify devices, this research offers a transformative strategy for strengthening the security of the IoT ecosystem. The ability to quickly and accurately identify devices through their RFFs significantly strengthens the security framework of IoT networks, reducing the risk of unauthorized access and ensuring secure data transmission. This approach not only reaffirms the importance of statistical analysis for efficient, data-driven solutions across multiple domains, but also marks a significant advancement in securing increasingly pervasive IoT infrastructures against cyber threats.

Author Contributions

Conceptualization, M.M.-G. and R.V.-M. (Rubén Vázquez-Medina); Methodology, R.F.S.-C. and R.V.-M. (Rubén Vázquez-Medina); Software, R.F.S.-C.; Validation, R.V.-M. (Rubén Vázquez-Medina); Formal analysis, M.M.-G. and R.V.-M. (Rubén Vázquez-Medina); Investigation, M.M.-G. and R.V.-M. (Ricardo Vázquez-Morán); Data curation, R.F.S.-C. and C.E.R.-L.; Writing—original draft, R.F.S.-C. and R.V.-M. (Rubén Vázquez-Medina); Writing—review & editing, M.M.-G., C.E.R.-L., R.V.-M. (Ricardo Vázquez-Morán) and R.V.-M. (Rubén Vázquez-Medina); Visualization, C.E.R.-L. and R.V.-M. (Ricardo Vázquez-Morán); Supervision, M.M.-G.; Project administration, R.V.-M. (Rubén Vázquez-Medina); Funding acquisition, R.V.-M. (Rubén Vázquez-Medina). All authors have read and agreed to the published version of the manuscript.

Funding

Authors thank to the Instituto Politécnico Nacional (IPN-México) for the financial support granted under the project number SIP–20240745 (R. Vázquez–Medina).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be made available on request.

Acknowledgments

R. F. Santana-Cruz (CVU 1242157) thanks to CONAHCYT-Mexico and C. E. Rojas-López thanks to COTEBAL-IPN for the financial support granted by the Postgraduate Scholarship.

Conflicts of Interest

The authors declare no conflict of interest. The founders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Hortelano, D.; Olivares, T.; Ruiz, M.; Garrido-Hidalgo, C.; López, V. From Sensor Networks to Internet of Things. Bluetooth Low Energy, a Standard for This Evolution. Sensors 2017, 17, 372. [Google Scholar] [CrossRef]
  2. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Math-Semicolon Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  3. Gomathi, R.; Krishna, G.H.S.; Brumancia, E.; Dhas, Y.M. A Survey on IoT Technologies, Evolution and Architecture. In Proceedings of the 2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP), Chennai, India, 22–23 February 2018. [Google Scholar] [CrossRef]
  4. Wang, H.; Eklund, D.; Oprea, A.; Raza, S. FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning. ACM Trans. Internet Things 2023, 4, 1–24. [Google Scholar] [CrossRef]
  5. Schiller, E.; Aidoo, A.; Fuhrer, J.; Stahl, J.; Ziörjen, M.; Stiller, B. Landscape of IoT security. Comput. Sci. Rev. 2022, 44, 100467. [Google Scholar] [CrossRef]
  6. Soltanieh, N.; Norouzi, Y.; Yang, Y.; Karmakar, N.C. A Review of Radio Frequency Fingerprinting Techniques. IEEE J. Radio Freq. Identif. 2020, 4, 222–233. [Google Scholar] [CrossRef]
  7. Pau, G.; Arena, F.; Gebremariam, Y.E.; You, I. Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services. Sensors 2021, 21, 3589. [Google Scholar] [CrossRef]
  8. Callebaut, G.; Leenders, G.; Mulders, J.V.; Ottoy, G.; Strycker, L.D.; der Perre, L.V. The Art of Designing Remote IoT Devices—Technologies and Strategies for a Long Battery Life. Sensors 2021, 21, 913. [Google Scholar] [CrossRef] [PubMed]
  9. Bisdikian, C. An overview of the Bluetooth wireless technology. IEEE Commun. Mag. 2001, 39, 86–94. [Google Scholar] [CrossRef]
  10. Yu, J.; Hu, A.; Li, G.; Peng, L. A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network. IEEE Internet Things J. 2019, 6, 6786–6799. [Google Scholar] [CrossRef]
  11. Jian, T.; Rendon, B.C.; Ojuba, E.; Soltani, N.; Wang, Z.; Sankhe, K.; Gritsenko, A.; Dy, J.; Chowdhury, K.; Ioannidis, S. Deep Learning for RF Fingerprinting: A Massive Experimental Study. IEEE Internet Things Mag. 2020, 3, 50–57. [Google Scholar] [CrossRef]
  12. Lee, W.; Baek, S.Y.; Kim, S.H. Deep-Learning-Aided RF Fingerprinting for NFC Security. IEEE Commun. Mag. 2021, 59, 96–101. [Google Scholar] [CrossRef]
  13. Li, B.; Cetin, E. Waveform Domain Deep Learning Approach for RF Fingerprinting. In Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea, 22–28 May 2021. [Google Scholar] [CrossRef]
  14. Qing, G.; Wang, H.; Zhang, T. Radio frequency fingerprinting identification for Zigbee via lightweight CNN. Phys. Commun. 2021, 44, 101250. [Google Scholar] [CrossRef]
  15. Zeng, Y.; Gong, Y.; Liu, J.; Lin, S.; Han, Z.; Cao, R.; Huang, K.; Letaief, K.B. Multi-Channel Attentive Feature Fusion for Radio Frequency Fingerprinting. IEEE Trans. Wirel. Commun. 2023, 1–12. [Google Scholar] [CrossRef]
  16. Uzundurukan, E.; Dalveren, Y.; Kara, A. A Database for the Radio Frequency Fingerprinting of Bluetooth Devices. Data 2020, 5, 55. [Google Scholar] [CrossRef]
  17. Uzundurukan, E.; Ali, A.M.; Dalveren, Y.; Kara, A. Performance Analysis of Modular RF Front End for RF Fingerprinting of Bluetooth Devices. Wirel. Pers. Commun. 2020, 112, 2519–2531. [Google Scholar] [CrossRef]
  18. Feng, W.; Li, Y.; Wu, C.; Zhang, J. RF fingerprint extraction and device recognition algorithm based on multi-scale fractal features and APWOA-LSSVM. EURASIP J. Adv. Signal Process. 2023, 2023, 131. [Google Scholar] [CrossRef]
  19. Ali, A.M.; Uzundurukan, E.; Kara, A. Assessment of Features and Classifiers for Bluetooth RF Fingerprinting. IEEE Access 2019, 7, 50524–50535. [Google Scholar] [CrossRef]
  20. Robinson, J.; Kuzdeba, S.; Stankowicz, J.; Carmack, J.M. Dilated Causal Convolutional Model For RF Fingerprinting. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020. [Google Scholar] [CrossRef]
  21. Zamora, G.O.; Bergin, S.; Kennedy, I.O. Using Support Vector Machines for Passive Steady State RF Fingerprinting. In Novel Algorithms and Techniques in Telecommunications and Networking; Springer: Dordrecht, The Netherlands, 2009; pp. 183–188. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Guo, X.; Lin, Y. Trust Management Method of D2D Communication Based on RF Fingerprint Identification. IEEE Access 2018, 6, 66082–66087. [Google Scholar] [CrossRef]
  23. Aghnaiya, A.; Dalveren, Y.; Kara, A. On the Performance of Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices. Sensors 2020, 20, 1704. [Google Scholar] [CrossRef] [PubMed]
  24. Reising, D.; Cancelleri, J.; Loveless, T.D.; Kandah, F.; Skjellum, A. Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM. IEEE Internet Things J. 2021, 8, 8356–8371. [Google Scholar] [CrossRef]
  25. Wang, S.; Peng, L.; Fu, H.; Hu, A.; Zhou, X. A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020. [Google Scholar] [CrossRef]
  26. Reus-Muns, G.; Jaisinghani, D.; Sankhe, K.; Chowdhury, K.R. Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR Platform. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020. [Google Scholar] [CrossRef]
  27. Shi, J.; Lu, S.; Zhang, J.; Zhou, P.; Yang, F.; Gao, Y.; Wu, H.; Feng, W. A Radio Frequency Fingerprint Identification Method for Wireless Devices Based on ShuffleNet-SVM. In Proceedings of the 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, China, 9–12 December 2022. [Google Scholar] [CrossRef]
  28. Ji, W.; Zhao, K.; Zheng, Z.; Yu, C.; Huang, S. Multivariable Fingerprints With Random Forest Variable Selection for Indoor Positioning System. IEEE Sens. J. 2022, 22, 5398–5406. [Google Scholar] [CrossRef]
  29. Batres, A.E.; Ouarab, T.; Talbi, L. Passive Radio Localization System Using Channel Impulse Response and Deep Learning. In Proceedings of the 2023 International Electrical Engineering Congress (iEECON), Krabi, Thailand, 8–10 March 2023. [Google Scholar] [CrossRef]
Figure 1. Noise model dynamics in Bluetooth communication systems.
Figure 1. Noise model dynamics in Bluetooth communication systems.
Sensors 24 01482 g001
Figure 2. Spectral analysis of bandpass filtered signals in the frequency domain.
Figure 2. Spectral analysis of bandpass filtered signals in the frequency domain.
Sensors 24 01482 g002
Figure 3. Quantitative assessment of signal state identification and detection from the reference transient state.
Figure 3. Quantitative assessment of signal state identification and detection from the reference transient state.
Sensors 24 01482 g003
Figure 4. Steady state using three signals on a single device: (a) signal analysis in time domain, and (b) PDF projection derived from (a).
Figure 4. Steady state using three signals on a single device: (a) signal analysis in time domain, and (b) PDF projection derived from (a).
Sensors 24 01482 g004
Figure 5. Convergence analysis of the estimated PDF by MSE comparison for n and  n + 1  noise signals. (a) Analysis over the full signal range, and (b) detailed zoom in on (a).
Figure 5. Convergence analysis of the estimated PDF by MSE comparison for n and  n + 1  noise signals. (a) Analysis over the full signal range, and (b) detailed zoom in on (a).
Sensors 24 01482 g005
Figure 6. PDF of three noise signals from a single Bluetooth device. (a) Before scaling and (b) after scaling.
Figure 6. PDF of three noise signals from a single Bluetooth device. (a) Before scaling and (b) after scaling.
Sensors 24 01482 g006
Figure 7. Characterization and analysis of unique RFF patterns from multiple Bluetooth devices.
Figure 7. Characterization and analysis of unique RFF patterns from multiple Bluetooth devices.
Sensors 24 01482 g007
Figure 8. Error analysis in case of signal confusion by comparison of PDFs of RFF signals extracted from Bluetooth devices.
Figure 8. Error analysis in case of signal confusion by comparison of PDFs of RFF signals extracted from Bluetooth devices.
Sensors 24 01482 g008
Table 1. Smartphone classes and models in the case study extracted from database compiled in 2020 by Uzundurukan et al. [16].
Table 1. Smartphone classes and models in the case study extracted from database compiled in 2020 by Uzundurukan et al. [16].
Class NumberSmartphone Name
1iPhone 5(1)
2iPhone 5(2)
3iPhone 6(1)
4iPhone 6(2)
5iPhone 5s(1)
6iPhone 5s(2)
7iPhone 6s(1)
8iPhone 6s(1)
9LG G4(1)
10LG G4(2)
11Samsung Note3(1)
12Samsung Note3(2)
13Samsung S5(1)
14Samsung S5(2)
15Sony Xperia M5(1)
16Sony Xperia M5(2)
Table 2. Confusion matrix from the results obtained using the proposed method.
Table 2. Confusion matrix from the results obtained using the proposed method.
Predicted Device
12345678910111213141516
Real device11.000.000.000.000.000.000.000.000.000.000.000.000.000.000.000.00
20.001.000.000.000.000.000.000.000.000.000.000.000.000.000.000.00
30.000.001.000.000.000.000.000.000.000.000.000.000.000.000.000.00
40.000.000.001.000.000.000.000.000.000.000.000.000.000.000.000.00
50.000.000.000.001.000.000.000.000.000.000.000.000.000.000.000.00
60.000.000.000.000.001.000.000.000.000.000.000.000.000.000.000.00
70.000.000.000.000.000.001.000.000.000.000.000.080.000.000.000.00
80.000.000.000.000.000.000.001.000.000.000.000.000.000.000.000.00
90.000.000.000.000.000.0000.000.001.000.000.000.000.000.000.000.00
100.000.000.000.000.000.000.000.000.001.000.000.000.000.000.000.00
110.000.000.000.000.000.000.000.000.000.001.000.000.000.000.000.00
120.000.000.000.000.000.000.000.000.000.000.000.920.000.000.000.00
130.000.000.000.000.000.000.000.000.000.000.000.001.000.000.000.00
140.000.000.000.000.000.000.000.000.000.000.000.000.001.000.000.00
150.000.000.000.000.000.000.000.000.000.000.000.000.000.001.000.00
160.000.000.000.000.000.000.000.000.000.000.000.000.000.000.001.00
Table 3. Confusion matrix from the results of Uzundurukan’s method.
Table 3. Confusion matrix from the results of Uzundurukan’s method.
Predicted Device
12345678910111213141516
Real device10.570.000.000.000.000.030.000.000.000.000.000.170.000.000.030.00
20.000.130.000.000.000.000.000.000.100.000.000.000.030.000.000.00
30.030.000.970.030.030.000.000.000.000.030.000.030.000.000.000.00
40.000.030.030.770.000.000.000.000.000.370.000.000.000.000.000.00
50.000.000.000.000.900.100.030.000.000.000.000.000.000.000.000.00
60.100.000.000.000.030.770.000.000.000.000.000.000.000.000.100.00
70.000.000.000.000.000.000.930.000.000.000.000.130.000.000.000.00
80.000.000.000.000.000.000.001.000.000.000.000.000.000.000.000.00
90.000.770.000.030.030.000.000.000.870.100.000.000.100.000.000.00
100.000.000.000.170.000.000.000.000.030.500.000.000.000.000.000.00
110.030.000.000.000.000.000.000.000.000.001.000.000.000.000.000.00
120.230.000.000.000.000.000.030.000.000.000.000.670.000.000.000.00
130.000.070.000.000.000.030.000.000.000.000.000.000.870.000.000.00
140.000.000.000.000.000.000.000.000.000.000.000.000.001.000.000.00
150.030.000.000.000.000.070.000.000.000.000.000.000.000.000.870.00
160.000.000.000.000.000.000.000.000.000.000.000.000.000.000.001.00
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Santana-Cruz, R.F.; Moreno-Guzman, M.; Rojas-López, C.E.; Vázquez-Morán, R.; Vázquez-Medina, R. Bluetooth Device Identification Using RF Fingerprinting and Jensen-Shannon Divergence. Sensors 2024, 24, 1482. https://doi.org/10.3390/s24051482

AMA Style

Santana-Cruz RF, Moreno-Guzman M, Rojas-López CE, Vázquez-Morán R, Vázquez-Medina R. Bluetooth Device Identification Using RF Fingerprinting and Jensen-Shannon Divergence. Sensors. 2024; 24(5):1482. https://doi.org/10.3390/s24051482

Chicago/Turabian Style

Santana-Cruz, Rene Francisco, Martin Moreno-Guzman, César Enrique Rojas-López, Ricardo Vázquez-Morán, and Rubén Vázquez-Medina. 2024. "Bluetooth Device Identification Using RF Fingerprinting and Jensen-Shannon Divergence" Sensors 24, no. 5: 1482. https://doi.org/10.3390/s24051482

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop