Wireless Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 65142 Experts worldwide ranked by ideXlab platform

Hsiao-hwa Chen - One of the best experts on this subject based on the ideXlab platform.

  • A Survey on Multiple-Antenna Techniques for Physical Layer Security
    IEEE Communications Surveys and Tutorials, 2017
    Co-Authors: Xiaoming Chen, Derrick Wing Kwan Ng, Wolfgang H. Gerstacker, Hsiao-hwa Chen
    Abstract:

    As a complement to high-layer encryption techniques, physical layer Security has been widely recognised as a promising way to enhance Wireless Security by exploiting the characteristics of Wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer Security to improve secrecy performance via exploiting spatial degrees of freedom. This article provides a comprehensive survey on various multipleantenna techniques in physical layer Security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multipleantenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.

  • secrecy Wireless information and power transfer challenges and opportunities
    IEEE Wireless Communications, 2016
    Co-Authors: Xiaoming Chen, Hsiao-hwa Chen
    Abstract:

    Wireless information and power transfer (WIPT) enables more sustainable and resilient communications due to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of Wireless channels. Compared to traditional secure communications, secrecy Wireless information and power transfer (SWIPT) has several distinct characteristic features. Wireless power transfer may increase vulnerability to eavesdropping, since a power receiver as a potential eavesdropper usually has a shorter access distance than an information receiver. On the other hand, Wireless power transfer can be exploited to enhance Wireless Security. This article reviews the Security issues in various SWIPT scenarios, with an emphasis on revealing the challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer Security techniques to improve secrecy performance. In particular, we propose to use massive MIMO techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the Security in SWIPT systems.

  • Secrecy Wireless information and power transfer: challenges and opportunities
    IEEE Wireless Communications, 2016
    Co-Authors: Xiaoming Chen, Derrick Wing Kwan Ng, Hsiao-hwa Chen
    Abstract:

    Wireless information and power transfer (WIPT) enables more sustainable and resilient communications owing to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of Wireless channels. Compared to traditional secure communications, secrecy Wireless information and power transfer (SWIPT) carries several distinct characteristics. On one hand, Wireless power transfer may increase the vulnerability of eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver. On the other hand, Wireless power transfer can be exploited to enhance Wireless Security. This article reviews the Security issues in various SWIPT scenarios, with an emphasis on revealing the corresponding challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer Security techniques to improve secrecy performance. In particular, we propose to use massive multiple-input multiple-output (MIMO) techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the Security in SWIPT systems.

  • Multi-antenna relay aided Wireless physical layer Security
    IEEE Communications Magazine, 2015
    Co-Authors: Xiaoming Chen, Chau Yuen, Caijun Zhong, Hsiao-hwa Chen
    Abstract:

    With the growing popularity of mobile Internet, providing secure Wireless services has become a critical issue. Physical layer Security (PHY-Security) has been recognized as an effective means to enhance Wireless Security by exploiting Wireless medium characteristics, for example, fading, noise, and interference. A particularly interesting PHY-Security technology is cooperative relay due to the fact that it helps to provide distributed diversity and shorten access distance. This article offers a tutorial on various multi-antenna relaying technologies to improve Security at physical layer. The state-of-the-art research results on multi-antenna relay aided PHY-Security as well as some secrecy performance optimization schemes are presented. In particular, we focus on large-scale MIMO relaying technology, which is effective in tackling various challenging issues for implementing Wireless PHY-Security, such as short-distance interception without eavesdropper CSI and with imperfect legitimate CSI. Moreover, the future directions are identified for further enhancement of secrecy performance.

Xiaoming Chen - One of the best experts on this subject based on the ideXlab platform.

  • A Survey on Multiple-Antenna Techniques for Physical Layer Security
    IEEE Communications Surveys and Tutorials, 2017
    Co-Authors: Xiaoming Chen, Derrick Wing Kwan Ng, Wolfgang H. Gerstacker, Hsiao-hwa Chen
    Abstract:

    As a complement to high-layer encryption techniques, physical layer Security has been widely recognised as a promising way to enhance Wireless Security by exploiting the characteristics of Wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer Security to improve secrecy performance via exploiting spatial degrees of freedom. This article provides a comprehensive survey on various multipleantenna techniques in physical layer Security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multipleantenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.

  • secrecy Wireless information and power transfer challenges and opportunities
    IEEE Wireless Communications, 2016
    Co-Authors: Xiaoming Chen, Hsiao-hwa Chen
    Abstract:

    Wireless information and power transfer (WIPT) enables more sustainable and resilient communications due to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of Wireless channels. Compared to traditional secure communications, secrecy Wireless information and power transfer (SWIPT) has several distinct characteristic features. Wireless power transfer may increase vulnerability to eavesdropping, since a power receiver as a potential eavesdropper usually has a shorter access distance than an information receiver. On the other hand, Wireless power transfer can be exploited to enhance Wireless Security. This article reviews the Security issues in various SWIPT scenarios, with an emphasis on revealing the challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer Security techniques to improve secrecy performance. In particular, we propose to use massive MIMO techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the Security in SWIPT systems.

  • Secrecy Wireless information and power transfer: challenges and opportunities
    IEEE Wireless Communications, 2016
    Co-Authors: Xiaoming Chen, Derrick Wing Kwan Ng, Hsiao-hwa Chen
    Abstract:

    Wireless information and power transfer (WIPT) enables more sustainable and resilient communications owing to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of Wireless channels. Compared to traditional secure communications, secrecy Wireless information and power transfer (SWIPT) carries several distinct characteristics. On one hand, Wireless power transfer may increase the vulnerability of eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver. On the other hand, Wireless power transfer can be exploited to enhance Wireless Security. This article reviews the Security issues in various SWIPT scenarios, with an emphasis on revealing the corresponding challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer Security techniques to improve secrecy performance. In particular, we propose to use massive multiple-input multiple-output (MIMO) techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the Security in SWIPT systems.

  • large scale mimo relaying techniques for physical layer Security af or df
    arXiv: Information Theory, 2015
    Co-Authors: Xiaoming Chen, Huazi Zhang, Chau Yuen
    Abstract:

    In this paper, we consider a large scale multiple input multiple output (LS-MIMO) relaying system, where an information source sends the message to its intended destination aided by an LS-MIMO relay, while a passive eavesdropper tries to intercept the information forwarded by the relay. The advantage of a large scale antenna array is exploited to improve spectral efficiency and enhance Wireless Security. In particular, the challenging issue incurred by short-distance interception is well addressed. Under very practical assumptions, i.e., no eavesdropper channel state information (CSI) and imperfect legitimate CSI at the relay, this paper gives a thorough secrecy performance analysis and comparison of two classic relaying techniques, i.e., amplify-and-forward (AF) and decode-and-forward (DF). Furthermore, asymptotical analysis is carried out to provide clear insights on the secrecy performance for such an LS-MIMO relaying system. We show that under large transmit powers, AF is a better choice than DF from the perspectives of both secrecy performance and implementation complexity, and prove that there exits an optimal transmit power at medium regime that maximizes the secrecy outage capacity.

  • Multi-antenna relay aided Wireless physical layer Security
    IEEE Communications Magazine, 2015
    Co-Authors: Xiaoming Chen, Chau Yuen, Caijun Zhong, Hsiao-hwa Chen
    Abstract:

    With the growing popularity of mobile Internet, providing secure Wireless services has become a critical issue. Physical layer Security (PHY-Security) has been recognized as an effective means to enhance Wireless Security by exploiting Wireless medium characteristics, for example, fading, noise, and interference. A particularly interesting PHY-Security technology is cooperative relay due to the fact that it helps to provide distributed diversity and shorten access distance. This article offers a tutorial on various multi-antenna relaying technologies to improve Security at physical layer. The state-of-the-art research results on multi-antenna relay aided PHY-Security as well as some secrecy performance optimization schemes are presented. In particular, we focus on large-scale MIMO relaying technology, which is effective in tackling various challenging issues for implementing Wireless PHY-Security, such as short-distance interception without eavesdropper CSI and with imperfect legitimate CSI. Moreover, the future directions are identified for further enhancement of secrecy performance.

Rui Zhang - One of the best experts on this subject based on the ideXlab platform.

  • securing uav communications via trajectory optimization
    Global Communications Conference, 2017
    Co-Authors: Guangchi Zhang, Miao Cui, Rui Zhang
    Abstract:

    Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due to many advantages such as low cost, high mobility, and on-demand deployment. This paper addresses the issue of physical-layer Security in a UAV communication system, where a UAV sends confidential information to a legitimate receiver in the presence of a potential eavesdropper which are both on the ground. We aim to maximize the secrecy rate of the system by jointly optimizing the UAV's trajectory and transmit power over a finite horizon. In contrast to the existing literature on Wireless Security with static nodes, we exploit the mobility of the UAV in this paper to enhance the secrecy rate via a new trajectory design. Although the formulated problem is non-convex and challenging to solve, we propose an iterative algorithm to solve the problem efficiently, based on the block coordinate descent and successive convex optimization methods. Specifically, the UAV's transmit power and trajectory are each optimized with the other fixed in an alternating manner until convergence. Numerical results show that the proposed algorithm significantly improves the secrecy rate of the UAV communication system, as compared to benchmark schemes without transmit power control or trajectory optimization.

  • surveillance and intervention of infrastructure free mobile communications a new Wireless Security paradigm
    IEEE Wireless Communications, 2017
    Co-Authors: Lingjie Duan, Rui Zhang
    Abstract:

    Conventional Wireless Security assumes Wireless communications are legitimate, and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging infrastructure- free mobile communication networks can be illegally used (e.g., by criminals or terrorists) but are difficult to monitor, thus imposing new challenges in public Security. To tackle this issue, this article presents a paradigm shift of Wireless Security to the surveillance and intervention of infrastructure-free suspicious and malicious Wireless communications, by exploiting legitimate eavesdropping and jamming jointly. In particular, proactive eavesdropping (via jamming) is proposed to intercept and decode information from suspicious communication links for the purpose of inferring their intentions and deciding further measures against them. Cognitive jamming (via eavesdropping) is also proposed to disrupt, disable, and even spoof the targeted malicious Wireless communications to achieve various intervention tasks.

  • surveillance and intervention of infrastructure free mobile communications a new Wireless Security paradigm
    arXiv: Information Theory, 2016
    Co-Authors: Lingjie Duan, Rui Zhang
    Abstract:

    Conventional Wireless Security assumes Wireless communications are rightful and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging infrastructure-free mobile communication networks are likely to be illegally used (e.g., by criminals or terrorists) but difficult to be monitored, thus imposing new challenges on the public Security. To tackle this issue, this article presents a paradigm shift of Wireless Security to the surveillance and intervention of infrastructure-free suspicious and malicious Wireless communications, by exploiting legitimate eavesdropping and jamming jointly. In particular, {\emph{proactive eavesdropping}} (via jamming) is proposed to intercept and decode information from suspicious communication links for the purpose of inferring their intentions and deciding further measures against them. {\emph{Cognitive jamming}} (via eavesdropping) is also proposed so as to disrupt, disable, and even spoof the targeted malicious Wireless communications to achieve various intervention tasks.

  • proactive eavesdropping via jamming for rate maximization over rayleigh fading channels
    IEEE Wireless Communications Letters, 2016
    Co-Authors: Lingjie Duan, Rui Zhang
    Abstract:

    This letter proposes a paradigm shift in Wireless Security from preventing conventional eavesdropping attacks to a new legitimate surveillance objective by studying how a legitimate monitor (e.g., a government agency) efficiently eavesdrops a suspicious Wireless communication link. The suspicious transmitter controls its communication rate over Rayleigh fading channels to maintain a target outage probability at the receiver, and the legitimate monitor can successfully eavesdrop only when its achievable rate is no smaller than the suspicious communication rate. We propose proactive eavesdropping via a jamming approach to maximize the average eavesdropping rate, where the legitimate monitor sends jamming signals with optimized power control to moderate the suspicious communication rate.

  • proactive eavesdropping via jamming for rate maximization over rayleigh fading channels
    arXiv: Information Theory, 2015
    Co-Authors: Lingjie Duan, Rui Zhang
    Abstract:

    Instead of against eavesdropping, this letter proposes a new paradigm in Wireless Security by studying how a legitimate monitor (e.g., government agencies) efficiently eavesdrops a suspicious Wireless communication link. The suspicious transmitter controls its communication rate over Rayleigh fading channels to maintain a target outage probability at the receiver, and the legitimate monitor can successfully eavesdrop only when its achievable rate is no smaller than the suspicious communication rate. We propose a proactive eavesdropping via jamming approach to maximize the average eavesdropping rate, where the legitimate monitor sends jamming signals with optimized power control to moderate the suspicious communication rate.

Lajos Hanzo - One of the best experts on this subject based on the ideXlab platform.

  • a survey on Wireless Security technical challenges recent advances and future trends
    arXiv: Information Theory, 2016
    Co-Authors: Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the Wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes Wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless network Security. We first summarize the Security requirements of Wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless networks is presented in view of the network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer Security techniques are reviewed and compared, including information-theoretic Security, artificial-noise-aided Security, Security-oriented beamforming, diversity-assisted Security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate Wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

  • a survey on Wireless Security technical challenges recent advances and future trends
    Proceedings of the IEEE, 2016
    Co-Authors: Yu Long Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the Wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes Wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless network Security. We first summarize the Security requirements of Wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless networks is presented in view of the network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer Security techniques are reviewed and compared, including information-theoretic Security, artificial-noise-aided Security, Security-oriented beamforming, diversity-assisted Security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate Wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

  • Physical-layer authentication for Wireless Security enhancement: current challenges and future developments
    IEEE Communications Magazine, 2016
    Co-Authors: Peng Hao, Lajos Hanzo
    Abstract:

    While the open nature of radio propagation enables convenient “anywhere” Wireless access, it becomes the root of Security vulnerabilities in Wireless communications. In light of this, physical-layer authentication, which is based on exploitation of the dynamics of physical layer attributes, is emerging as an effective approach to enhancing Wireless Security. In this article, we first review the existing physical-layer authentication techniques and identify their current limitations, ranging from low authentication reliability to the difficulties of integrating these techniques with the existing Wireless infrastructure and applying them in complex future networks. We then present three promising research areas in addressing these challenges. Specifically, we propose the use of the multi-attribute multi-observation technique for enhancing the authentication reliability. In order to apply pointto- point physical-layer authentication techniques into existing Wireless networks, we propose a cross-layer authentication approach relying on a composite Security key that can seamlessly integrate physical-layer and upper-layer authentication schemes. We also discuss possible ways of invoking physical-layer authentication to reduce both the complexity and latency of the Security processes in complex heterogeneous networks with the aid of the proposed physical Security context sharing.

  • a survey on Wireless Security technical challenges recent advances and future trends
    arXiv: Information Theory, 2015
    Co-Authors: Yu Long Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    This paper examines the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless network Security. We first summarize the Security requirements of Wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless networks is presented in view of the network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

Zhu Han - One of the best experts on this subject based on the ideXlab platform.

  • securing small cell networks under interference constraint a quasi variational inequality approach
    Global Communications Conference, 2018
    Co-Authors: Xiao Tang, Pinyi Ren, Zhu Han
    Abstract:

    Small cell networks are envisioned as one of the critical enabling technologies for the next-generation Wireless systems. However, due to the limited capability of small cell base stations as compared with the macro-cell base stations, the secure Wireless communication faces significant challenges. Towards this issue, we target at enhancing the Wireless Security for small cell networks by employing the physical layer Security techniques. Specifically, we maximize the secrecy rate for each individual small cell in a distributed manner, while protecting the transmissions in the macro-cell by imposing the aggregate interference constraint over the small cell transmissions. The distributed secrecy competition is formulated as a generalized Nash equilibrium problem, for which we adopt its equivalence in the form of the quasi-variational inequality to analyze the existence and uniqueness of the Nash equilibrium. Furthermore, we tackle the interference constraint as the penalty over the secrecy rate of the small cells and introduce the Nash equilibrium problem formulation. Then, the distributed algorithm is proposed based on the best-response strategy to solve for the Nash equilibrium of the secrecy competition game. Finally, simulation results are provided to corroborate our theoretical findings.

  • Applications of Economic and Pricing Models for Wireless Network Security: A Survey
    IEEE Communications Surveys & Tutorials, 2017
    Co-Authors: Nguyen Cong Luong, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Zhu Han
    Abstract:

    This paper provides a comprehensive literature review on applications of economic and pricing theory to Security issues in Wireless networks. Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to Security design in Wireless networks. While the Security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers and prevent attacks to be performed. In this paper, we review economic and pricing approaches proposed to address major Security issues in Wireless networks including eavesdropping attack, denial-of-service (DoS) attack such as jamming and distributed DoS, and illegitimate behaviors of malicious users. Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information in Wireless networks. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to Wireless Security issues.

  • Device Fingerprinting in Wireless Networks: Challenges and Opportunities
    IEEE Communications Surveys & Tutorials, 2016
    Co-Authors: Rong Zheng, Walid Saad, Zhu Han
    Abstract:

    Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major Security threat facing Wireless networks. The fact that mobile devices are prone to be compromised and reverse engineered significantly increases the risk of such attacks in which adversaries can obtain secret keys on trusted nodes and impersonate the legitimate node. One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification. These fingerprints can be extracted from transmitted signal by analyzing information across the protocol stack. In this paper, the first unified and comprehensive tutorial in the area of Wireless device fingerprinting for Security applications is presented. In particular, we aim to provide a detailed treatment on developing novel Wireless Security solutions using device fingerprinting techniques. The objectives are three-fold: (i) to introduce a comprehensive taxonomy of Wireless features that can be used in fingerprinting, (ii) to provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches, and (iii) to identify key open research problems in the area of device fingerprinting and feature extraction, as applied to Wireless Security.