Self-Organizing Maps
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Identifying unique devices through wireless fingerprinting
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Hi-index | 0.00 |
In this paper we present a technique to create WLAN device fingerprints by measuring timing properties without the use of special-purpose hardware. Our proposed process is absolutely passive and cannot be detected by the targeted device. The timing measurement is based on a delay caused by the hardware implementation of the CRC checksum algorithm at the network interface card (NIC) of the client. This delay turned out to be significant for a large number of different chipset implementations. The ability of identifying connected devices could improve the security of a wireless network significantly. It could help to enhance access control mechanisms and would deliver valuable real time information about the connected clients. As a proof of our concept we present a prototype implementation called WiFinger to evaluate our approach.