Physical-layer identification of wireless sensor nodes

Identification of wireless sensor nodes based on the physical characteristics of their radio transmissions can potentially provide additional layer of security in all-wireless multi-hop sensor networks. Reliable identification can be means for detection and/or prevention of wormhole, Sybil and replication attacks, and for complementing cryptographic message authentication protocols. In this paper, we propose an improved method for capturing and analysis of sensor node radio signals for reliable and accurate recognition. We investigate the performance accuracy of our approach in terms of parameters such as distance, antenna polarization, voltage and show that it achieves recognition with EER=0.24%. We also propose and perform practical attacks on the recognition to further evaluate the robustness of the proposed method under security threats.

[1]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[2]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[3]  Rama Chellappa,et al.  Discriminant analysis of principal components for face recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[4]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Sigeru Omatu,et al.  Identification of the defective transmission devices using the wavelet transform , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[8]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[9]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[10]  Michel Barbeau,et al.  Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks , 2005 .

[11]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[12]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[13]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[14]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[15]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[16]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses 2008 (Updated from the CHES 2000 version) , 2008 .

[17]  Sergey Bratus,et al.  Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.

[18]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[19]  Alex Pentland,et al.  Probabilistic Visual Learning for Object Representation , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[20]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[21]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[22]  Damon McCoy,et al.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.

[23]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[24]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[25]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[26]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[27]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[28]  C. Frank Most Secret War: British Scientific Intelligence 1939–1945 , 1978 .

[29]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[30]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[31]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.