Implications of radio fingerprinting on the security of sensor networks

We demonstrate the feasibility of finger-printing the radio of wireless sensor nodes (Chipcon 1000 radio, 433MHz). We show that, with this type of devices, a receiver can create device radio finger-prints and subsequently identify origins of messages exchanged between the devices, even if message contents and device identifiers are hidden. We further analyze the implications of device fingerprinting on the security of sensor networking protocols, specifically, we propose two new mechanisms for the detection of wormholes in sensor networks.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[3]  George V. Moustakides Performance of CUSUM tests for detecting changes in continuous time processes , 2002, Proceedings IEEE International Symposium on Information Theory,.

[4]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[5]  T. Lindh,et al.  Signal Discrimination Based on Power Spectrum of Filter Response , 2002 .

[6]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[7]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[8]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[9]  Reginald Victor Jones,et al.  Most Secret War , 1978 .

[10]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  Milos Doroslovacki,et al.  Automatic radio station detection by clustering power spectrum components , 2002, ICASSP.

[13]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[14]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[15]  Michel Barbeau,et al.  Intrusion detection and radio frequency fingerprinting in mobile and wireless networks , 2003 .

[16]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[17]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[18]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[19]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[20]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[22]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[23]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[24]  Bodhi Priyantha,et al.  The Cricket indoor location system , 2005 .

[25]  Yalcin Payal Identification of Push-To-Talk Transmitters Using Wavelets. , 1995 .

[26]  Jesse Hansen Selected Approaches to Estimation of Signal Phase , 2003 .

[27]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[28]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[29]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[30]  马克斯·B·弗雷德里克 Cellular telephone anti-fraud system , 1994 .

[31]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[32]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.