Cellular security: better, but foes still lurk
IEEE Spectrum
Machine Learning
Information fusion in biometrics
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Remote Physical Device Fingerprinting
IEEE Transactions on Dependable and Secure Computing
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)
Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Detection of rogue devices in wireless networks
Detection of rogue devices in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Detecting impersonation attacks in future wireless and mobile networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
Proactive attacker localization in wireless LAN
ACM SIGCOMM Computer Communication Review
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Proactive attacker localization in WLAN
ACM SIGMOBILE Mobile Computing and Communications Review
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Physical Layer Attacks on Unlinkability in Wireless LANs
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Identifying spectrum usage by unknown systems using experiments in machine learning
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Detecting identity spoofs in IEEE 802.11e wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
CSMA/CN: carrier sense multiple access with collision notification
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Security-capacity trade-off in large wireless networks using keyless secrecy
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Strengthening forensic investigations of child pornography on P2P networks
Proceedings of the 6th International COnference
Non-cryptographic authentication and identification in wireless networks
IEEE Wireless Communications
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Using differential evolution to optimize 'learning from signals' and enhance network security
Proceedings of the 13th annual conference on Genetic and evolutionary computation
Low-cost mitigation of privacy loss due to radiometric identification
VANET '11 Proceedings of the Eighth ACM international workshop on Vehicular inter-networking
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Poster: mimicry attacks against wireless link signature
Proceedings of the 18th ACM conference on Computer and communications security
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
Enforcing dynamic spectrum access with spectrum permits
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
CSMA/CN: carrier sense multiple access with collision notification
IEEE/ACM Transactions on Networking (TON)
Building efficient spectrum-agile devices for dummies
Proceedings of the 18th annual international conference on Mobile computing and networking
Zee: zero-effort crowdsourcing for indoor localization
Proceedings of the 18th annual international conference on Mobile computing and networking
Experience with heterogenous clock-skew based device fingerprinting
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
Robust authentication of public access points using digital certificates: a novel approach
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Secret agent radio: covert communication through dirty constellations
IH'12 Proceedings of the 14th international conference on Information Hiding
Who do you sync you are?: smartphone fingerprinting via application behaviour
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Forensic identification of GSM mobile phones
Proceedings of the first ACM workshop on Information hiding and multimedia security
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Secure and resilient proximity-based access control
Proceedings of the 2013 international workshop on Data management & analytics for healthcare
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Journal of Computer and System Sciences
Hi-index | 0.00 |
We design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This technique, called PARADIS, leverages minute imperfections of transmitter hardware that are acquired at manufacture and are present even in otherwise identical NICs. These imperfections are transmitter-specific and manifest themselves as artifacts of the emitted signals. In PARADIS, we measure differentiating artifacts of individual wireless frames in the modulation domain, apply suitable machine-learning classification tools to achieve significantly higher degrees of NIC identification accuracy than prior best known schemes. We experimentally demonstrate effectiveness of PARADIS in differentiating between more than 130 identical 802.11 NICs with accuracy in excess of 99%. Our results also show that the accuracy of PARADIS is resilient against ambient noise and fluctuations of the wireless channel. Although our implementation deals exclusively with IEEE 802.11, the approach itself is general and will work with any digital modulation scheme.