Affiliation:
1. Technical University of Darmstadt, Darmstadt, Germany
Abstract
The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint. This fingerprint can be used as an additional means of authentication to enhance security. In fact, recent works propose practical fingerprinting solutions that can be readily implemented in commercial-off-the-shelf devices. In this paper, we prove analytically and experimentally that these solutions are highly vulnerable to impersonation attacks. We also demonstrate that such a unique device-based signature can be abused to violate privacy by tracking the user device, and, as of today, users do not have any means to prevent such privacy attacks other than turning off the device. We propose RF-Veil, a radiometric fingerprinting solution that not only is robust against impersonation attacks but also protects user privacy by obfuscating the radiometric fingerprint of the transmitter for non-legitimate receivers. Specifically, we introduce a randomized pattern of phase errors to the transmitted signal such that only the intended receiver can extract the original fingerprint of the transmitter. In a series of experiments and analyses, we expose the vulnerability of adopting naive randomization to statistical attacks and introduce countermeasures. Finally, we show the efficacy of RF-Veil experimentally in protecting user privacy and enhancing security. More importantly, our proposed solution allows communicating with other devices, which do not employ RF-Veil.
Funder
Deutsche Forschungsgemeinschaft
LOEWE Initiative
Publisher
Association for Computing Machinery (ACM)
Reference40 articles.
1. Chrisil Arackaparambil Sergey Bratus Anna Shubina and David Kotz. 2010. On the Reliability of Wireless Fingerprinting using Clock Skews. In ACM WiSec . 169--174. 10.1145/1741866.1741894 Chrisil Arackaparambil Sergey Bratus Anna Shubina and David Kotz. 2010. On the Reliability of Wireless Fingerprinting using Clock Skews. In ACM WiSec . 169--174. 10.1145/1741866.1741894
2. Hash Function Balance and Its Impact on Birthday Attacks
3. Sergey Bratus Cory Cornelius David Kotz and Daniel Peebles. 2008. Active Behavioral Fingerprinting of Wireless Devices. In ACM WiSec. 56--61. 10.1145/1352533.1352543 Sergey Bratus Cory Cornelius David Kotz and Daniel Peebles. 2008. Active Behavioral Fingerprinting of Wireless Devices. In ACM WiSec. 56--61. 10.1145/1352533.1352543
4. Vladimir Brik Suman Banerjee Marco Gruteser and Sangho Oh. 2008. Wireless Device Identification with Radiometric Signatures. In ACM MobiCom . 116--127. 10.1145/1409944.1409959 Vladimir Brik Suman Banerjee Marco Gruteser and Sangho Oh. 2008. Wireless Device Identification with Radiometric Signatures. In ACM MobiCom . 116--127. 10.1145/1409944.1409959
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献