skip to main content
10.1145/1409944.1409959acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Wireless device identification with radiometric signatures

Published:14 September 2008Publication History

ABSTRACT

We design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This technique, called PARADIS, leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present even in otherwise identical NICs. These imperfections are transmitter-specific and manifest themselves as artifacts of the emitted signals. In PARADIS, we measure differentiating artifacts of individual wireless frames in the modulation domain, apply suitable machine-learning classification tools to achieve significantly higher degrees of NIC identification accuracy than prior best known schemes.

We experimentally demonstrate effectiveness of PARADIS in differentiating between more than 130 identical 802.11 NICs with accuracy in excess of 99%. Our results also show that the accuracy of PARADIS is resilient against ambient noise and fluctuations of the wireless channel.

Although our implementation deals exclusively with IEEE 802.11, the approach itself is general and will work with any digital modulation scheme.

References

  1. AAgilent Technologies. Agilent 802.11a/g Manufacturing Test Application Note : A Guide to Getting Started. Application note 1308-3.Google ScholarGoogle Scholar
  2. Agilent Technologies. Making 802.11g transmitter measurements. Application note 1380-4.Google ScholarGoogle Scholar
  3. Agilent Technologies. RF Testing of WLAN products. Application note 1380-1.Google ScholarGoogle Scholar
  4. Agilent Technologies. Testing and Troubleshooting Digital RF Communications Transmitter Designs. Application note 1313.Google ScholarGoogle Scholar
  5. M. Barbeau, J. Hall, and E. Kranakis. Detecting Impersonation Attacks in Future Wireless and Mobile Networks. MADNES, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. David K. Barton and Sergey A. Leonov. Radar Technology Encyclopedia. Artech House, 1998. See entry on Target Recongnition and Identification.Google ScholarGoogle Scholar
  7. Carl Rasmussen and Christopher Williams. Gaussian Processes for Machine Learning. The MIT Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. http://www.csie.ntu.edu.tw/~cjlin/libsvm.Google ScholarGoogle Scholar
  9. H.C. Choe, C.E. Poole, A.M. Yu, and H.H. Szu. Novel identification of intercepted signals from unknown radio transmitters. SPIE, 2491:504, 2003.Google ScholarGoogle Scholar
  10. D.B. Faria and D.R. Cheriton. Detecting identity-based attacks in wireless networks using signalprints. ACM WiSe, pages 43--52, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. Usenix Security Symposium, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Gerdes, T. Daniels, M. Mina, and S. Russell. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. NDSS, 2006.Google ScholarGoogle Scholar
  13. Gordon Lyon. Nmap network mapper. http://nmap.org.Google ScholarGoogle Scholar
  14. F. Guo and T. Chiueh. Sequence Number-Based MAC Address Spoof Detection. Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Hall, M. Barbeau, and E. Kranakis. Radio frequency fingerprinting for intrusion detection in wirless networks. Defendable and Secure Computing, 2005.Google ScholarGoogle Scholar
  16. Jeyanthi Hall. Detection of rogue devices in wireless networks. PhD thesis, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. IEEE Standards Association. IEEE Std 802.11a. http://standards.ieee.org/getieee802/download/802.11a-1999.pdf.Google ScholarGoogle Scholar
  18. IEEE Standards Association. IEEE Std 802.11b. http://standards.ieee.org/getieee802/download/802.11b-1999.pdf.Google ScholarGoogle Scholar
  19. T. Kohno, A. Broido, and KC Claffy. Remote physical device fingerprinting. Dependable and Secure Computing, 2(2):93--108, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L.E. Langley. Specific emitter identification (SEI) and classical parameter fusion technology. WESCON, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  21. Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. Proceedings of the 5th ACM workshop on Wireless security, pages 33--42, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tom M. Mitchell. Machine Learning. McGraw-Hill, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Motron Electronics. TxID Transmitter FingerPrinter. http://www.motron.com/TransmitterID.html.Google ScholarGoogle Scholar
  24. ORBIT wireless research laboratory. WINLAB, Rutgers University. http://www.orbit-lab.org/.Google ScholarGoogle Scholar
  25. Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99--110, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N. Patwari and S.K. Kasera. Robust location distinction using temporal link signatures. ACM MOBICOM, pages 111--122, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Philip Stepanek and William M. Kilpatrick. Modeling Uncertainties in a Measuring Receiver. Agilent Technologies.Google ScholarGoogle Scholar
  28. K.B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. Proceedings of IEEE SecureComm, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  29. K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, and E. Antonakakis. Electromagnetic Signatures of WLAN Cards and Network Security. ISSPIT, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  30. M.J. Riezenman. Cellular security: better, but foes still lurk. Spectrum, IEEE, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Ross and A. Jain. Information fusion in biometrics. Pattern Recognition Letters, 24(13):2115--2125, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 89600S series VXI-based Vector Signal Analyzer. Agilent technologies.Google ScholarGoogle Scholar
  33. K.I. Talbot, P.R. Duley, and M.H. Hyatt. Specific Emitter Identification and Verification. Technology Review, 2003.Google ScholarGoogle Scholar
  34. P. Tuyls and J. Goseling. Capacity and Examples of Template-Protecting Biometric Authentication Systems. ECCV, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  35. O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27--33, 2007.Google ScholarGoogle Scholar
  36. J. Wright. Detecting Wireless LAN MAC Address Spoofing. White Paper, January, 2003.Google ScholarGoogle Scholar

Index Terms

  1. Wireless device identification with radiometric signatures

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking
                September 2008
                374 pages
                ISBN:9781605580968
                DOI:10.1145/1409944

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 14 September 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate440of2,972submissions,15%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader