Attacks on Physical-layer Identification

被引:0
|
作者
Danev, Boris [1 ]
Luecken, Heinrich
Capkun, Srdjan [1 ]
El Defrawy, Karim
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
关键词
Wireless Security; Attacks; Physical Layer; Identification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperfections exhibited by its radio transceiver. It can be used to improve access control in wireless networks, prevent device cloning and complement message authentication protocols. This paper studies the feasibility of performing impersonation attacks on the modulation-based and transient-based fingerprinting techniques. Both techniques are vulnerable to impersonation attacks; however, transient-based techniques are more difficult to reproduce due to the effects of the wireless channel and antenna in their recording process. We assess the feasibility of performing impersonation attacks by extensive measurements as well as simulations using collected data from wireless devices. We discuss the implications of our findings and how they affect current device identification techniques and related applications.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [31] Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks
    Harshan, J.
    Chang, Sang-Yoon
    Hu, Yih-Chun
    [J]. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [32] A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments
    Farraj, Abdallah
    Hammad, Eman
    [J]. SENSORS, 2024, 24 (16)
  • [33] Feature Selection and Cross Validation for Physical-Layer RFID Counterfeit Tag Identification
    Wu, Haifeng
    Gao, Wei
    Pu, Chongrong
    Yu, Zeng
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [34] User Capacity of Wireless Physical-layer Identification: An Information-theoretic Perspective
    Wang, Wenhao
    Sun, Zhi
    Ren, Kui
    Zhu, Bocheng
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [35] A physical-layer Rogue ONU identification method based on hardware fingerprint technology
    Liu, Kaiyu
    Huang, Danming
    Tang, Chengzhe
    Deng, Lei
    Yang, Qi
    Dai, Xiaoxiao
    Liu, Deming
    Cheng, Mengfan
    [J]. 2024 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2024,
  • [36] On Transmit Beamforming for Physical-Layer Multicasting
    Li, Jiangyuan
    Petropulu, Athina P.
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [37] Physical-Layer Encryption with Stream Ciphers
    Zuquete, Andre
    Barros, Joao
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 106 - +
  • [38] A primer on physical-layer network coding
    Liew, Soung Chang
    Lu, Lu
    Zhang, Shengli
    [J]. Synthesis Lectures on Communication Networks, 2015, 16
  • [39] A Rateless Approach to Physical-Layer Security
    Johnson, Matthew H.
    Harrison, Willie K.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [40] Multilevel Coding for Physical-Layer Security
    Pfeiffer, Johannes
    Fischer, Robert F. H.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (03) : 1999 - 2009