2015
DOI: 10.1109/tdsc.2014.2366455
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation

Abstract: Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Recent works investigate physical layer features such as received signal strength or radio frequency fingerprints to localize and identify malicious devices. In this paper we demonstrate a novel and complementary approach to exploiting physical layer differences among wireless devices that is more energy efficient and invariant with respect to the environment. Specifically, we exploit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Some interesting works focus on the characterization of the device behaviour when faced with specific errors or alterations of the packets. For instance, in [11], the authors study the reception rate of different devices when packet headers are modified, to uniquely identify devices based on their tolerance to those modified packets. Some physical fingerprinting methods have been also proposed for specific applications or devices, for example to distinguish two brands of mobile phones [12], or in [13].…”
Section: Related Workmentioning
confidence: 99%
“…Some interesting works focus on the characterization of the device behaviour when faced with specific errors or alterations of the packets. For instance, in [11], the authors study the reception rate of different devices when packet headers are modified, to uniquely identify devices based on their tolerance to those modified packets. Some physical fingerprinting methods have been also proposed for specific applications or devices, for example to distinguish two brands of mobile phones [12], or in [13].…”
Section: Related Workmentioning
confidence: 99%
“…The classification decision tree in Fig. 3 is a proof‐of‐concept modelled after those in [4], for IEEE 802.11b, and [7], for IEEE 802.15.4. The tree is designed using fewest states (STF length) such that the number of required test packets at each step ( n ) is minimised.…”
Section: Transceiver Fingerprinting Proof Of Conceptmentioning
confidence: 99%
“…For example, wireless packets manipulated to have a physical layer preamble shorter than the protocol specification become unreceivable by some hardware designs, while reception by other hardware designs remains unaffected. Applications of this phenomenon are numerous, from obfuscated encryption key distribution [5] and wireless intrusion detection system evasion [6], to device fingerprinting [4, 7]. Once implementation differences are discovered and published, they can be immediately leveraged in conjunction with any of the millions of such devices worldwide.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations