{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:14:46Z","timestamp":1760242486483,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T00:00:00Z","timestamp":1505433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Falsifying Global Navigation Satellite System (GNSS) data with a simulator or with a fake receiver can have a significant economic or safety impact in many transportation applications where Position, Velocity and Time (PVT) are used to enforce a regulation. In this context, the authentication of the source of the PVT data (i.e., the GNSS receiver) is a requirement since data faking can become a serious threat. Receiver fingerprinting techniques represent possible countermeasures to verify the authenticity of a GNSS receiver and of its data. Herein, the potential of clock-derived metrics for GNSS receiver fingerprinting is investigated, and a filter approach is implemented for feature selection. Novel experimental results show that three intrinsic features are sufficient to identify a receiver. Moreover, the adopted technique is time effective as data blocks of about 40 min are sufficient to produce stable features for fingerprinting.<\/jats:p>","DOI":"10.3390\/s17092120","type":"journal-article","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T10:22:10Z","timestamp":1505470930000},"page":"2120","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["GNSS Receiver Identification Using Clock-Derived Metrics"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3573-5093","authenticated-orcid":false,"given":"Daniele","family":"Borio","sequence":"first","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), Directorate for Space, Security and Migration, 21027 Ispra (VA), Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6510-9240","authenticated-orcid":false,"given":"Ciro","family":"Gioia","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), Directorate for Space, Security and Migration, 21027 Ispra (VA), Italy"}]},{"given":"Eduardo","family":"Cano Pons","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), Directorate for Space, Security and Migration, 21027 Ispra (VA), Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4830-1227","authenticated-orcid":false,"given":"Gianmarco","family":"Baldini","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), Directorate for Space, Security and Migration, 21027 Ispra (VA), Italy"}]}],"member":"1968","published-online":{"date-parts":[[2017,9,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/COMST.2015.2476338","article-title":"Device Fingerprinting in Wireless Networks: Challenges and Opportunities","volume":"18","author":"Xu","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","unstructured":"Shen, C., Lu, R., Samizade, S., and He, L. (2017, January 22\u201324). Passive fingerprinting for wireless devices: A multi-level decision approach. Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), New Delhi, India."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TDSC.2014.2369033","article-title":"GTID: A Technique for Physical Device and Device Type Fingerprinting","volume":"12","author":"Radhakrishnan","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_4","unstructured":"Azarmehr, M., Mehta, A., and Rashidzadeh, R. (May, January 30). Wireless device identification using oscillator control voltage as RF fingerprint. Proceedings of the IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1049\/el.2013.2759","article-title":"Radiofrequency identification of wireless devices based on RF fingerprinting","volume":"49","author":"Padilla","year":"2013","journal-title":"Electron. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Baldini, G., Dimc, F., Kamnik, R., Steri, G., Giuliani, R., and Gentile, C. (2017). Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns. Sensors, 17.","DOI":"10.3390\/s17040783"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Baldini, G., Steri, G., Dimc, F., Giuliani, R., and Kamnik, R. (2016). Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS). Sensors, 16.","DOI":"10.3390\/s16060818"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MWC.2015.7368831","article-title":"Remote fingerprinting of mobile phones","volume":"22","author":"Khanna","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TDSC.2005.26","article-title":"Remote physical device fingerprinting","volume":"2","author":"Kohno","year":"2005","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TMC.2009.145","article-title":"On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews","volume":"9","author":"Jana","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1049\/iet-rsn.2014.0292","article-title":"Radiolocation and tracking of automatic identification system signals for maritime situational awareness","volume":"9","author":"Papi","year":"2015","journal-title":"IET Radar Sonar Navig."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Pilosu, L., Autolitano, A., Brevi, D., and Scopigno, R. (2015, January 24). Exploring TV white spaces for the mitigation of AIS weaknesses. Proceedings of the IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT), Luxembourg.","DOI":"10.1109\/SCVT.2015.7374243"},{"key":"ref_13","unstructured":"(2017, September 11). Regulation (EU) No 165\/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport. Available online: http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32014R0165from=EN."},{"key":"ref_14","first-page":"48","article-title":"Paving the Way for New Smartphone Apps","volume":"9","author":"Pujante","year":"2014","journal-title":"Inside GNSS"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/navi.125","article-title":"A Navigation Message Authentication Proposal for the Galileo Open Service","volume":"63","author":"Rijmen","year":"2016","journal-title":"Navigation"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Williams, M.D., Munns, S.A., Temple, M.A., and Mendenhall, M.J. (2010, January 1\u20133). RF-DNA Fingerprinting for Airport WiMax Communications Security. Proceedings of the 2010 Fourth International Conference on Network and System Security, Melbourne, Australia.","DOI":"10.1109\/NSS.2010.21"},{"key":"ref_17","unstructured":"Dubendorfer, C.K., Ramsey, B.W., and Temple, M.A. (November, January 29). An RF-DNA verification process for ZigBee networks. Proceedings of the IEEE Military Communications Conference (MILCOM), Orlando, FL, USA."},{"key":"ref_18","first-page":"127072","article-title":"GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques","volume":"2012","author":"Broumandan","year":"2012","journal-title":"Int. J. Navig. Obs."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","article-title":"GNSS Spoofing and Detection","volume":"104","author":"Psiaki","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/JPROC.2016.2535898","article-title":"Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques","volume":"104","author":"Ioannides","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Borio, D., Gioia, C., Baldini, G., and Fortuny, J. (2016, January 12\u201316). GNSS Receiver Fingerprinting for Security-Enhanced Applications. Proceedings of the 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+), Portland, OR, USA.","DOI":"10.33012\/2016.14688"},{"key":"ref_22","unstructured":"Kaplan, E.D., and Hegarty, C. (2005). Understanding GPS: Principles and Applications, Artech House. [2nd ed.]."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1109\/TIFS.2015.2464778","article-title":"Wireless Device Identification Based on RF Oscillator Imperfections","volume":"10","author":"Polak","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Lanze, F., Panchenko, A., Braatz, B., and Zinnen, A. (2012, January 3\u20137). Clock skew based remote device fingerprinting demystified. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA.","DOI":"10.1109\/GLOCOM.2012.6503213"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sharma, S., Hussain, A., and Saran, H. (2012, January 18\u201319). Experience with Heterogenous Clock-skew Based Device Fingerprinting. Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, Arlington, VA, USA.","DOI":"10.1145\/2379616.2379618"},{"key":"ref_26","first-page":"1157","article-title":"An Introduction to Variable and Feature Selection","volume":"3","author":"Guyon","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","article-title":"A survey on feature selection methods","volume":"40","author":"Chandrashekar","year":"2014","journal-title":"Comput. Electr. Eng."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bregni, S. (2002). Synchronization of Digital Telecommunications Networks, Wiley.","DOI":"10.1002\/0470845880"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/PROC.1966.4634","article-title":"Statistics of atomic frequency standards","volume":"54","author":"Allan","year":"1966","journal-title":"Proc. IEEE"},{"key":"ref_30","unstructured":"Xu, G. (2003). GPS: Theory, Algorithms and Applications, Springer."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/19.536708","article-title":"Measurement of Maximum Time Interval Error for Telecommunications Clock Stability Characterization","volume":"45","author":"Bregni","year":"1996","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Murty, M.N., and Devi, V.S. (2011). Pattern Recognition: An Algorithmic Approach, Springer.","DOI":"10.1007\/978-0-85729-495-1"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2120\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:44:58Z","timestamp":1760208298000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,15]]},"references-count":32,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["s17092120"],"URL":"https:\/\/doi.org\/10.3390\/s17092120","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,9,15]]}}}