On calibrating measurements of packet transit times
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
A Maximum Variance Cluster Algorithm
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE 802.11 rate adaptation: a practical approach
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
IEEE Transactions on Pattern Analysis and Machine Intelligence
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Snort Intrusion Detection and Prevention Toolkit
Snort Intrusion Detection and Prevention Toolkit
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
IEEE Transactions on Information Forensics and Security
Using the physical layer for wireless authentication in time-variant channels
IEEE Transactions on Wireless Communications
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
Towards a trust aware cognitive radio architecture
ACM SIGMOBILE Mobile Computing and Communications Review
The directional attack on wireless localization: how to spoof your location with a tin can
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Source attribution for network address translated forensic captures
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Experience with heterogenous clock-skew based device fingerprinting
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
IEEE 802.11 chipset fingerprinting by the measurement of timing characteristics
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Who do you sync you are?: smartphone fingerprinting via application behaviour
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
ArrayTrack: a fine-grained indoor location system
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Signals from the crowd: uncovering social relationships through smartphone probes
Proceedings of the 2013 conference on Internet measurement conference
Hi-index | 0.01 |
We propose a new fingerprinting technique that differentiates between unique devices over a Wireless Local Area Network (WLAN) simply through the timing analysis of 802.11 probe request frames. Our technique can be applied to spoof detection, network reconnaissance, and implementation of access control against masquerading attacks. Experimental results indicate that our technique is consistent and accurate in differentiating between unique devices. In contrast with existing wireless fingerprinting techniques, our technique is passive, non-invasive and does not require the co-operation of fingerprintee hosts.