Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Node forgery or impersonation, in which legitimate cryptographic credentials are captured by an adversary, constitutes one major security threat facing wireless networks. The fact that mobile devices are prone to be compromised and reverse engineered significantly increases the risk of such attacks in which adversaries can obtain secret keys on trusted nodes and impersonate the legitimate node. One promising approach toward thwarting these attacks is through the extraction of unique fingerprints that can provide a reliable and robust means for device identification. These fingerprints can be extracted from transmitted signal by analyzing information across the protocol stack. In this paper, the first unified and comprehensive tutorial in the area of wireless device fingerprinting for security applications is presented. In particular, we aim to provide a detailed treatment on developing novel wireless security solutions using device fingerprinting techniques. The objectives are three-fold: (i) to introduce a comprehensive taxonomy of wireless features that can be used in fingerprinting, (ii) to provide a systematic review on fingerprint algorithms including both white-list based and unsupervised learning approaches, and (iii) to identify key open research problems in the area of device fingerprinting and feature extraction, as applied to wireless security.

[1]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[2]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[3]  Raheem A. Beyah,et al.  A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.

[4]  R.T. Johnk,et al.  Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[5]  Sergey Bratus,et al.  Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.

[6]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[7]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[9]  Ke Gao,et al.  A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[10]  Irwin O. Kennedy,et al.  Feature extraction approaches to RF fingerprinting for device identification in femtocells , 2010, Bell Labs Technical Journal.

[11]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[12]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[13]  James Gross,et al.  PHY layer authentication via drifting oscillators , 2014, 2014 IEEE Global Communications Conference.

[14]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.

[15]  Desmond Loh Chin Choong,et al.  Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.

[16]  Jie Yang,et al.  Detecting sybil attacks inwireless and sensor networks using cluster analysis , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[17]  Xianbin Wang,et al.  Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[18]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[19]  Larry J. Greenstein,et al.  A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.

[20]  James T. Yu,et al.  An Analysis of DoS Attacks on Wireless LAN , 2006, Wireless and Optical Communications.

[21]  Sepideh Dolatshahi,et al.  Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[22]  Chi-Chun Lo,et al.  An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network , 2004, Net-Con.

[23]  Jitendra K. Tugnait,et al.  A channel-based hypothesis testing approach to enhance user authentication in wireless networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[24]  Phivos Mylonas,et al.  Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.

[25]  Raheem A. Beyah,et al.  Passive classification of wireless NICs during active scanning , 2007, International Journal of Information Security.

[26]  Rong Zheng,et al.  Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.

[27]  Haipeng Shen,et al.  Characterizing the duration and association patterns of wireless access in a campus , 2005 .

[28]  Zhu Han,et al.  Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic Clustering in Cognitive Radio Networks , 2014, IEEE Transactions on Mobile Computing.

[29]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[30]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[31]  Ahmed Helmy,et al.  Mining behavioral groups in large wireless LANs , 2006, MobiCom '07.

[32]  Raheem A. Beyah,et al.  Passive Classification of Wireless NICs during Rate Switching , 2008, EURASIP J. Wirel. Commun. Netw..

[33]  Chrisil Arackaparambil,et al.  On the reliability of wireless fingerprinting using clock skews , 2010, WiSec '10.

[34]  Damon McCoy,et al.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.

[35]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[36]  J.A. Copeland,et al.  Using Active Scanning to Identify Wireless NICs , 2006, 2006 IEEE Information Assurance Workshop.

[37]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[38]  K. J. Ray Liu,et al.  Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.

[39]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[40]  Brian M. Sadler,et al.  MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.

[41]  Odysseas G. Koufopavlou,et al.  Mobile Communications World: Security Implementations Aspects - A State of the Art , 2003, Comput. Sci. J. Moldova.

[42]  Christoph Neumann,et al.  An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[43]  Jonathan P. Ellch Fingerprinting 802.11 devices , 2006 .

[44]  Chang-Tien Lu,et al.  On Passive Wireless Device Fingerprinting using Infinite Hidden Markov Random Field , 2012 .

[45]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..