scispace - formally typeset
Open AccessJournal ArticleDOI

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Reads0
Chats0
TLDR
In this paper, the authors provide a comprehensive taxonomy of wireless features that can be used in fingerprinting, and provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches.
Abstract
Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major security threat facing wireless networks. The fact that mobile devices are prone to be compromised and reverse engineered significantly increases the risk of such attacks in which adversaries can obtain secret keys on trusted nodes and impersonate the legitimate node. One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification. These fingerprints can be extracted from transmitted signal by analyzing information across the protocol stack. In this paper, the first unified and comprehensive tutorial in the area of wireless device fingerprinting for security applications is presented. In particular, we aim to provide a detailed treatment on developing novel wireless security solutions using device fingerprinting techniques. The objectives are three-fold: (i) to introduce a comprehensive taxonomy of wireless features that can be used in fingerprinting, (ii) to provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches, and (iii) to identify key open research problems in the area of device fingerprinting and feature extraction, as applied to wireless security.

read more

Citations
More filters
Journal ArticleDOI

Indoor Positioning Systems Based on Visible Light Communication: State of the Art

TL;DR: This paper surveys over 100 papers ranging from pioneering papers to the state-of-the-art in the field to present the positioning technology, and emphasizes and analyzes the accuracy of VLC-based-IPS in the experiment and simulation environments.
Journal ArticleDOI

Security, Privacy, and Safety Aspects of Civilian Drones: A Survey

TL;DR: It is forecast that security will be a central enabling technology for the next generation of civilian unmanned aerial vehicles and the security properties required by their critical operation environment.
Journal ArticleDOI

Deep Learning Convolutional Neural Networks for Radio Identification

TL;DR: A method for uniquely identifying a specific radio among nominally similar devices using a combination of SDR sensing capability and machine learning (ML) techniques, demonstrating up to 90-99 percent experimental accuracy at transmitter- receiver distances varying between 2-50 ft over a noisy, multi-path wireless channel.
Journal ArticleDOI

Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking

TL;DR: A taxonomy is provided and the state of the art in IoT security research is surveyed, and a roadmap of concrete research challenges related to the application of ML and SDN to address existing and next-generation IoT security threats is offered.
Journal ArticleDOI

Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme

TL;DR: The hybrid classification scheme has been demonstrated effective in classifying a large amount of ZigBee devices and validated the robustness by carrying out the classification process 18 months after the training, which is the longest time gap.
References
More filters
Book

Pattern Recognition and Machine Learning

TL;DR: Probability Distributions, linear models for Regression, Linear Models for Classification, Neural Networks, Graphical Models, Mixture Models and EM, Sampling Methods, Continuous Latent Variables, Sequential Data are studied.
Journal ArticleDOI

Pattern Recognition and Machine Learning

Radford M. Neal
- 01 Aug 2007 - 
TL;DR: This book covers a broad range of topics for regular factorial designs and presents all of the material in very mathematical fashion and will surely become an invaluable resource for researchers and graduate students doing research in the design of factorial experiments.
Journal ArticleDOI

An introduction to variable and feature selection

TL;DR: The contributions of this special issue cover a wide range of aspects of variable selection: providing a better definition of the objective function, feature construction, feature ranking, multivariate feature selection, efficient search methods, and feature validity assessment methods.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book ChapterDOI

How unique is your web browser

TL;DR: The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed.
Related Papers (5)