Device Fingerprinting in Wireless Networks: Challenges and Opportunities
Reads0
Chats0
TLDR
In this paper, the authors provide a comprehensive taxonomy of wireless features that can be used in fingerprinting, and provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches.Abstract:
Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major security threat facing wireless networks. The fact that mobile devices are prone to be compromised and reverse engineered significantly increases the risk of such attacks in which adversaries can obtain secret keys on trusted nodes and impersonate the legitimate node. One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification. These fingerprints can be extracted from transmitted signal by analyzing information across the protocol stack. In this paper, the first unified and comprehensive tutorial in the area of wireless device fingerprinting for security applications is presented. In particular, we aim to provide a detailed treatment on developing novel wireless security solutions using device fingerprinting techniques. The objectives are three-fold: (i) to introduce a comprehensive taxonomy of wireless features that can be used in fingerprinting, (ii) to provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches, and (iii) to identify key open research problems in the area of device fingerprinting and feature extraction, as applied to wireless security.read more
Citations
More filters
Journal ArticleDOI
Indoor Positioning Systems Based on Visible Light Communication: State of the Art
Junhai Luo,Liying Fan,Husheng Li +2 more
TL;DR: This paper surveys over 100 papers ranging from pioneering papers to the state-of-the-art in the field to present the positioning technology, and emphasizes and analyzes the accuracy of VLC-based-IPS in the experiment and simulation environments.
Journal ArticleDOI
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey
Riham AlTawy,Amr M. Youssef +1 more
TL;DR: It is forecast that security will be a central enabling technology for the next generation of civilian unmanned aerial vehicles and the security properties required by their critical operation environment.
Journal ArticleDOI
Deep Learning Convolutional Neural Networks for Radio Identification
TL;DR: A method for uniquely identifying a specific radio among nominally similar devices using a combination of SDR sensing capability and machine learning (ML) techniques, demonstrating up to 90-99 percent experimental accuracy at transmitter- receiver distances varying between 2-50 ft over a noisy, multi-path wireless channel.
Journal ArticleDOI
Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking
TL;DR: A taxonomy is provided and the state of the art in IoT security research is surveyed, and a roadmap of concrete research challenges related to the application of ML and SDN to address existing and next-generation IoT security threats is offered.
Journal ArticleDOI
Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme
TL;DR: The hybrid classification scheme has been demonstrated effective in classifying a large amount of ZigBee devices and validated the robustness by carrying out the classification process 18 months after the training, which is the longest time gap.
References
More filters
Book
Pattern Recognition and Machine Learning
TL;DR: Probability Distributions, linear models for Regression, Linear Models for Classification, Neural Networks, Graphical Models, Mixture Models and EM, Sampling Methods, Continuous Latent Variables, Sequential Data are studied.
Journal ArticleDOI
Pattern Recognition and Machine Learning
TL;DR: This book covers a broad range of topics for regular factorial designs and presents all of the material in very mathematical fashion and will surely become an invaluable resource for researchers and graduate students doing research in the design of factorial experiments.
Journal ArticleDOI
An introduction to variable and feature selection
Isabelle Guyon,André Elisseeff +1 more
TL;DR: The contributions of this special issue cover a wide range of aspects of variable selection: providing a better definition of the objective function, feature construction, feature ranking, multivariate feature selection, efficient search methods, and feature validity assessment methods.
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book ChapterDOI
How unique is your web browser
TL;DR: The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed.