{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:02:03Z","timestamp":1774630923009,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4300300"],"award-info":[{"award-number":["2022YFB4300300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["62001106"],"award-info":[{"award-number":["62001106"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["62171120"],"award-info":[{"award-number":["62171120"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020B0303010001"],"award-info":[{"award-number":["2020B0303010001"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["2022YFB4300300"],"award-info":[{"award-number":["2022YFB4300300"]}]},{"name":"National Natural Science Foundation of China","award":["62001106"],"award-info":[{"award-number":["62001106"]}]},{"name":"National Natural Science Foundation of China","award":["62171120"],"award-info":[{"award-number":["62171120"]}]},{"name":"National Natural Science Foundation of China","award":["2020B0303010001"],"award-info":[{"award-number":["2020B0303010001"]}]},{"name":"National Natural Science Foundation of China","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"Guangdong Key Research and Development Program","award":["2022YFB4300300"],"award-info":[{"award-number":["2022YFB4300300"]}]},{"name":"Guangdong Key Research and Development Program","award":["62001106"],"award-info":[{"award-number":["62001106"]}]},{"name":"Guangdong Key Research and Development Program","award":["62171120"],"award-info":[{"award-number":["62171120"]}]},{"name":"Guangdong Key Research and Development Program","award":["2020B0303010001"],"award-info":[{"award-number":["2020B0303010001"]}]},{"name":"Guangdong Key Research and Development Program","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["2022YFB4300300"],"award-info":[{"award-number":["2022YFB4300300"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["62001106"],"award-info":[{"award-number":["62001106"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["62171120"],"award-info":[{"award-number":["62171120"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["2020B0303010001"],"award-info":[{"award-number":["2020B0303010001"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["2022YFB4300300"],"award-info":[{"award-number":["2022YFB4300300"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["62001106"],"award-info":[{"award-number":["62001106"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["62171120"],"award-info":[{"award-number":["62171120"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["2020B0303010001"],"award-info":[{"award-number":["2020B0303010001"]}]},{"name":"Purple Mountain Laboratories for Network and Communication Security","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The fifth-generation (5G) mobile cellular network is vulnerable to various security threats. Radio frequency fingerprint (RFF) identification is an emerging physical layer authentication technique which can be used to detect spoofing and distributed denial of service attacks. In this paper, the performance of RFF identification is studied for 5G mobile phones. The differential constellation trace figure (DCTF) is extracted from the physical random access channel (PRACH) preamble. When the database of all 64 PRACH preambles is available at the gNodeB (gNB), an index-based DCTF identification scheme is proposed, and the classification accuracy reaches 92.78% with a signal-to-noise ratio of 25 dB. Moreover, due to the randomness in the selection of preamble sequences in the random access procedure, when only a portion of the preamble sequences can be trained, a group-based DCTF identification scheme is proposed. The preamble sequences generated from the same root value are grouped together, and the untrained sequences can be identified based on the trained sequences within the same group. The classification accuracy of the group-based scheme is 89.59%. An experimental system has been set up using six 5G mobile phones of three models. The 5G gNB is implemented on the OpenAirInterface platform.<\/jats:p>","DOI":"10.3390\/e26010038","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T11:19:21Z","timestamp":1703848761000},"page":"38","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Radio Frequency Fingerprint Identification for 5G Mobile Devices Using DCTF and Deep Learning"],"prefix":"10.3390","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-2989","authenticated-orcid":false,"given":"Hua","family":"Fu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"},{"name":"Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China"}]},{"given":"Hao","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"}]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"}]},{"given":"Linning","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China"},{"name":"Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Rao, R., Marojevic, V., Reed, J., and Jover, R.P. (2018, January 20\u201324). 5G NR jamming, spoofing, and sniffing: Threat assessment and mitigation. Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA.","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1109\/TIFS.2015.2400426","article-title":"Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints","volume":"10","author":"Reising","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/MCOM.2016.7498103","article-title":"Physical-layer authentication for wireless security enhancement: Current challenges and future developments","volume":"54","author":"Wang","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","article-title":"A Survey of Physical-Layer Authentication in Wireless Communications","volume":"23","author":"Xie","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1109\/OJCOMS.2021.3103735","article-title":"Physical-Layer Security in 6G Networks","volume":"2","author":"Mucchi","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/JIOT.2021.3099028","article-title":"Machine Learning for the Detection and Identification of Internet of Things Devices: A Survey","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhu, S., and Gan, L. (2017). Specific emitter identification based on the natural measure. Entropy, 19.","DOI":"10.3390\/e19030117"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Gao, J., Fan, H., Zhao, Y., and Shi, Y. (2023). Leveraging Deep Learning for IoT Transceiver Identification. Entropy, 25.","DOI":"10.3390\/e25081191"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2379776.2379782","article-title":"On physical-layer identification of wireless devices","volume":"45","author":"Danev","year":"2012","journal-title":"ACM Comput. Surv."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wang, S., Peng, L., Fu, H., Hu, A., and Zhou, X. (2020, January 2\u20135). A convolutional neural network-based RF fingerprinting identification scheme for mobile phones. Proceedings of the IEEE International Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual.","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163058"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Brik, V., Banerjee, S., Gruteser, M., and Oh, S. (2008, January 14\u201319). Wireless device identification with radiometric signatures. Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, San Francisco, CA, USA.","DOI":"10.1145\/1409944.1409959"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1049\/el.2010.1220","article-title":"Preamble-based detection of Wi-Fi transmitter RF fingerprints","volume":"46","author":"Yuan","year":"2010","journal-title":"Electron. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1049\/iet-com.2013.0568","article-title":"Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios","volume":"8","author":"Rehman","year":"2014","journal-title":"IET Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TCCN.2020.3043332","article-title":"Open set wireless transmitter authorization: Deep learning approaches and dataset considerations","volume":"7","author":"Hanna","year":"2021","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TCCN.2019.2949308","article-title":"No radio left behind: Radio fingerprinting through deep learning of physical-layer hardware impairments","volume":"6","author":"Sankhe","year":"2019","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1109\/TIFS.2022.3158553","article-title":"RF impairment model-based IoT physical-layer identification for enhanced domain generalization","volume":"17","author":"Rajendran","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1186\/s13638-019-1542-x","article-title":"Physical layer identification of LoRa devices using constellation trace figure","volume":"2019","author":"Jiang","year":"2019","journal-title":"EURASIP J. Wireless Commun. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TVT.2019.2950670","article-title":"Deep learning based RF fingerprint identification using differential constellation trace figure","volume":"69","author":"Peng","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"101250","DOI":"10.1016\/j.phycom.2020.101250","article-title":"Radio frequency fingerprinting identification for Zigbee via lightweight CNN","volume":"44","author":"Qing","year":"2021","journal-title":"Phys. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/TMTT.2010.2095030","article-title":"RF fingerprinting physical objects for anticounterfeiting applications","volume":"59","author":"Lakafosis","year":"2010","journal-title":"IEEE Trans. Microw. Theory Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Yin, P., Peng, L., Zhang, J., Liu, M., Fu, H., and Hu, A. (2021, January 7\u201311). LTE device identification based on RF fingerprint with multi-channel convolutional neural network. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Madrid, Spain.","DOI":"10.1109\/GLOBECOM46510.2021.9685067"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Demers, F., and St-Hilaire, M. (2013, January 9\u201313). Radiometric identification of LTE transmitters. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA.","DOI":"10.1109\/GLOCOM.2013.6831718"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"9036","DOI":"10.1109\/JIOT.2021.3119319","article-title":"Orientation and Channel-Independent RF Fingerprinting for 5G IEEE 802.11 ad Devices","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1109\/TIFS.2015.2464778","article-title":"Wireless Device Identification Based on RF Oscillator Imperfections","volume":"10","author":"Polak","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wheeler, C.G., and Reising, D.R. (2017, January 26\u201329). Assessment of the impact of CFO on RF-DNA fingerprint classification performance. Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Santa Clara, CA, USA.","DOI":"10.1109\/ICCNC.2017.7876111"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Aziz, A.A., Hamzah, N.A.A., Ghani, H.A., Hamid, A.N.A., and Mahmud, A. (2022, January 4\u20136). A Comparative Study of In-phase and Quadrature (IQ) Imbalance Estimation and Compensation Algorithms for OFDM Receivers. Proceedings of the 2022 International Conference on Engineering & MIS (ICEMIS), Istanbul, Turkey.","DOI":"10.1109\/ICEMIS56295.2022.9914041"},{"key":"ref_27","unstructured":"Moseley, N.A., and Slump, C.H. (2006, January 23\u201324). A low-complexity feed-forward I\/Q imbalance compensation algorithm. Proceedings of the 17th Annual Workshop on Circuits, Systems and Signal Processing, ProRISC 2006, Veldhoven, The Netherlands."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TIFS.2016.2552146","article-title":"Wireless Physical-Layer Identification: Modeling and Validation","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Hanna, S.S., and Cabric, D. (2019, January 18\u201321). Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity. Proceedings of the International Conference on Computing, Networking and Communication (ICNC), Honolulu, HI, USA.","DOI":"10.1109\/ICCNC.2019.8685569"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/JSTSP.2018.2796446","article-title":"Deep learning for RF device fingerprinting in cognitive communication networks","volume":"12","author":"Merchant","year":"2018","journal-title":"IEEE J. Sel. Topics Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Fu, H., Yin, J., and Peng, L. (2023, January 8\u201310). RF Fingerprint Identification for 5G Mobile Device Based on Transient Features. Proceedings of the 8th International Conference on Signal and Image Processing (ICSIP), Wuxi, China.","DOI":"10.1109\/ICSIP57908.2023.10270822"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TIT.1963.1057798","article-title":"Polyphase codes with good nonperiodic correlation properties","volume":"9","author":"Frank","year":"1963","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/TIT.1972.1054840","article-title":"Polyphase codes with good periodic correlation properties (Corresp.)","volume":"18","author":"Chu","year":"1972","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_34","unstructured":"(2023, November 06). 3GPP. 5G; NR; Physical Channels and Modulation (Release 16). Technical Specification (TS) 38.211, 3rd Generation Partnership Project (3GPP), Version 16.7.0. Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/138200_138299\/138211\/16.02.00_60\/ts_138211v160200p.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"1998","journal-title":"Proc. IEEE"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Rekoputra, N.M., Harwahyu, R., and Sari, R.F. (2019, January 5\u20136). Performance study of OpenAirInterface 5G System on the Cloud Platform Managed by Juju Orchestration. Proceedings of the 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia.","DOI":"10.1109\/ISRITI48646.2019.9034647"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Thakkar, P., Sanadhya, S., Gandotra, P., and Lall, B. (2023, January 3\u20137). A 5G OpenAirInterface (OAI) Testbed with MEC: Deployment, Application testing and Slicing Support. Proceedings of the 15th International Communication Systems and Networks and Workshops (COMSNETS), Bangalore, India.","DOI":"10.1109\/COMSNETS56262.2023.10041332"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/1\/38\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:44:22Z","timestamp":1760132662000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/1\/38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,29]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["e26010038"],"URL":"https:\/\/doi.org\/10.3390\/e26010038","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,29]]}}}