On Physical-Layer Identication of Wireless Devices BORIS DANEV, DAVIDE ZANETTI, and SRDJAN CAPKUN, 2012 Presented by: Vinit Patel Wichita State University.

Slides:



Advertisements
Similar presentations
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Advertisements

Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Fundamentals of Data & Signals (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (February18, 2015)
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
FIT3105 Smart card based authentication and identity management Lecture 4.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Security Awareness: Applying Practical Security in Your World
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Chapter 2 Fundamentals of Data and Signals
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Chapter 2: Fundamentals of Data and Signals. 2 Objectives After reading this chapter, you should be able to: Distinguish between data and signals, and.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Department Of Computer Engineering
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Chapter 10: Authentication Guide to Computer Network Security.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Lecture 1 Signals in the Time and Frequency Domains
Data Communications & Computer Networks, Second Edition1 Chapter 2 Fundamentals of Data and Signals.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Software Defined Radio
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Wireless Communication Technologies 1 Outline Introduction OFDM Basics Performance sensitivity for imperfect circuit Timing and.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
EC 2401*** WIRELESS COMMUNICATION. Why Wireless Benefits – Mobility: Ability to communicate anywhere!! – Easier configuration, set up and lower installation.
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
EDGE AND EDGE+ BY P.SAI LALITH ROHIT
Sniffer for Detecting Lost Mobiles
Smartphone-based Wi-Fi Pedestrian-Tracking System Tolerating the RSS Variance Problem Yungeun Kim, Hyojeong Shin, and Hojung Cha Yonsei University Bing.
DIGITAL COMMUNICATION. Introduction In a data communication system, the output of the data source is transmitted from one point to another. The rate of.
EDGE TECHNOLOGY AN EVOLUTION IN MOBILE TECHNOLOGY PRESENTED BY KIRAN KUMAR.
Wireless Technologies
Hand Geometry Recognition
Packet Leashes: Defense Against Wormhole Attacks
FACE RECOGNITION TECHNOLOGY
A maximum likelihood estimation and training on the fly approach
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security vs. Sequence Length Considerations]
Presentation transcript:

On Physical-Layer Identication of Wireless Devices BORIS DANEV, DAVIDE ZANETTI, and SRDJAN CAPKUN, 2012 Presented by: Vinit Patel Wichita State University

Outline of the Paper Introduction on Physical-layer device identification Physical-Layer Device Identification system and its components Physical-Layer Identification techniques and approaches Attacks within Physical-Layer Identification Implication and examples. Conclusion

Introduction Physical Layer Identification: technique that allows wireless devices to be identified by unique characteristics of their analog(radio) circuitry. (Fingerprinting) – This is possible due to the imperfections in the analog circuitry that is made in the manufacturing process.

Introduction Different purpose of PLI (Physical Layer Identification) – Intrusion detection – Access Control – Wormhole detection – Cloning detection – Location and anonymity privacy – Also for RFID(as we saw in Tuesdays class)

Physical-Layer Device Identification system and its components Involves three entities

Physical-Layer Device Identification system and its components Two modules for a PLI – Enrollment: Signals are captured from device and fingerprints of the device is stored in a database – Identification: Fingerprints that are obtained are matched with the fingerprints in the DB that are stored during enrollment Can identify a device Can identify from among many devices Can verify that device matches a claimed identity

Device under Identification Any device that uses radio communication can be subject to PLI – Different classes of device that can be identified by PLI: VHF(very high frequency) transmitters, HF RFID, UHF(Ultra high) RFID, Bluetooth, and IEEE and IEEE transceivers – What makes the device unique? Imperfections in design and manufacturing. [Toonstra and Kinser 1995, 1996]

Identification Signals Identification Signals: Signals that are collected for the purpose of identifying the device Different signal characteristics are observed here such as amplitude, frequency, and phase

Acquisition Setup Responsible for the acquisition and digitalization of the identification signals. – Should never influence the signal (adding noise) – Should be preserved and keep the same characteristics the PLI relies on – High quality may be necessary

Acquisition Setup Two types of identification: Passive: Acquires the signal without interacting with the device. Active: Acquires the signal after challenging the device to transmit them.

Feature Extraction Module Responsible for extracting characteristics from the signals that can then be used to distinguish devices or classes of devices Two types of features involved: – Predefined Features: Well understood characteristics that are known in advance prior to recording of the signals – Inferred Features: Features that are not known from a predefined feature set. Can be used for dimensionality reduction Take out redundant information from the sample and use that as its feature that contains only relevant information

Device Fingerprints Fingerprints are SET of features that are used to identify devices. Properties of fingerprints: – Universality: Every device should have considered features – Uniqueness: No two devices should have same fingerprint – Permanence: Fingerprints obtained should not change over time – Collectability: should capture signals with existing equipment – Robustness: should be able to be evaluated even with other interference radio signals – Data Dependency: Fingerprints need to be obtained from features extracted from a specific signal pattern

Fingerprint matcher and Database Compares extracted device fingerprints with the fingerprints that are stored in the DB during the enrollment phase of the device Matcher is implemented by a distance measures such as: – Euclidean – Mahalanobis distances – Probabilistic Neural Networks (PNN) (complex) – Support vector machines (SVM) (complex)

System Performance and Design Issues System performance expressed in error rates – FAR(False accept rate) – FRR(False reject rate) – EER(Equal error rate) When FAR and FRR are equal Most commonly used metric

System Performance and Design Issues Performance of PLI all depends on: – Resources available – Cost Higher the quality and speed, higher the cost – Acquisition setups Certain signals may be hard to get a different locations

Proposed improvements for PLI systems System properties that always needs improving: accuracy(most significant), computational speed, exception handling, and costs. Four different strategies can be deployed to achieve this task.

Proposed improvements for PLI systems (1) Acquire signals from multiple acquisition setups Getting signal from different location at same time (2) Acquire signals from multiple transmitters on same device (MIMO) More robust fingerprints, (two fingerprints instead of one) (3) collect several acquisitions of the same signal To obtain more reliable fingerprints. Samples are Averaged out into one significant sample and that is used to create the fingerprint (4) Consider different signal parts Different modularties of signals are combined to improve accuracy and robustness

Physical-Layer Identification techniques and approaches Identification of radio signals became very important during WWII. Two main techniques/approaches discussed in paper: – Transient based approach and Modulation based approach.

Transient Based Approach Techniques that use the turn on/off transient of a radio signal. Analog to digital converter

Transient Based Approach Fingerprinting Approach Details 1. Extract the transient part Threshold-based algorithm 2. Extract features from the transient signal (fingerprints) Transient length Number of peaks in transient Amplitude in transient 3. Classify unknown fingerprints to the reference fingerprints (using a Kalman filter) Compute the classification error rate

Transient Based Approach Experiments

Modulation Based Approach This technique is used by extracting unique features from the signal part that has been modulated (data). – New approach that is still being researched

Modulation Based Approach Fingerprinting Approach Details 1.Capture the signals using the vector signal analyzer – QPSK constellation – Signal spectrum 2.Extract the following errors due to QPSK modulation I/Q origin offset Frequency offset Error Vector Magnitude 3.Fingerprints are represented by a vector of the above three errors 4.Compute the classification error rate (CER) Ratio of incorrectly classified device fingerprints over all classified fingerprints QPSK Signal Constellation

Other Approaches/Techniques Baseband power spectrum density of packet preambles – 20% CER Using near transient and midamble regions of GSM- GMSK(Global System for mobile communication)(Gaussian minimum shift keying) burst signals – The CER was higher in the midamble than using the transient regions. For UHF RFID: – Using timing properties of the tags – Showed that the duration of response can be used to distinguish same manufacturer and RFID type. For HF RFID: – Timing and modulation shape features can only be used to identify between manufacturers.

Attacks within Physical-Layer Identification This section discusses attacks that aim to subvert the decision of an application and anonymity of wireless devices that aims to identify even if the device is not willing to. – Assumes a Dolev-Yao style attacker Attacker can observe, capture, modify, compose, and (re)play signals transmitted by device

Signal Replay Attack Goal is to observe the signals of device, capture them in digital form, and then transmit the signal again towards the PLI. – Attacker does not modify the signal – Attackers knowledge: Not assumed for the feature extraction and matching Assumed for how to observe, capture, and submit signals to system is needed. Why replay attacks ? – To gain access to resources by replacing an authentication message – In DOS, to confuse the destination host

Signal Replay Attack Aims at preserving the digital sample of the signal. – Note: replay of digital signals can never be exact as opposed to information bits. High end hardware and controlled wireless medium needed to improve accuracy. Could be relayed without being stored in digital form. – Need amplifiers and multiple antennas are needed.

Feature Replay Attacks This attack creates, modifies, or composes signals that reproduce ONLY the features that is considered by a PLI system. – Similar to message forging but…. This attack only requires the information bits unlike the analog/digital signal samples and data payload in forging.

Feature Replay Attacks Needs to preserve the identification features. Attacker needs to know features that the PLI extracts from device. Needs to be able to forge signals while keeping the unique features. Feature replay attacks can be launched by: – Using arbitrary waveform generators – Using a device with similar features of target device (large set of same model and manufac devices) – Replicate circuitry/components of target device(Hardest)

Implication and examples of PLI (Intrusion Detection in WLAN networks) (1) PLI can be used to enhance security of WLANs – By providing access control to prevent unauthorized devices on the network. PLI deployed in APs to defend against cryptographic key compromise by attacker. PLI can help determine multiple MACs or crypto keys that belong to same device. Attacker who holds the crypto key(s) still cannot authenticate to network unless somehow gets pass the PLI system (2) PLI techniques can be used to protect against rogue APs.

System property requirements: – Physical layer device fingerprints need to be resilient to distance and location. – Transient signal samples can have wireless channel characteristics with the device specific information it already intends to have. This still remains a open question on how to handle this. Security Requirements: – Resilient to remote impersonation attacks – Resilient to attacks by signal and feature replays Implication and examples of PLI (Intrusion Detection in WLAN networks)

RFID transponders in docs can be successfully cloned even if protective measures are in place PLI can be applied to document cloning in two different ways: – (1) Fingerprints are measured before the RFID deployment, stored in back end database, indexed with unique ID. – (2) Fingerprints are measured before the RFID deployment, BUT stored in the transponders memory. Advantage: document authenticity can be verified OFFLINE. Disadvantage: Fingerprint is stored on transponder, so requires access protection. Also, Fingerprints need to compact enough to fit in the memory Implication and examples of PLI (Device Cloning Detection-RFID-Identify Documents)

System Property Requirements: – Special purpose built devices need to be made. Need to measured in multiple locations(country border) Devices should be high quality to preserve the fingerprint from distortions Implication and examples of PLI (Device Cloning Detection-RFID-Identify Documents)

PLI provides means to detect counterfeit products by creating PLI fingerprints that bind the RFID tag to the original, claimed identity. – Unlike E-Passports where the fingerprints is stored directly on the passport, the fingerprints would be stored in a database. This can be compared later with those fingerprints obtained from the RFID tag. Implication and examples of PLI (Device Cloning Detection-RFID-Enabled Supply Chains)

System Property Requirements: – High computational speed Large amount of products on pallets pass through identification gates in a short time. – Fingerprints need to be robust Tags placed anywhere on pallets and may interfere with other wireless communication – High system accuracy Verifying falses may slow down supply chain process System Security Requirements: – Equipping each counterfeit product with a replaying device is too expensive – Equipping with RFID tags that have similar feature to tags on real products will pass identification requirement and smart choice in order of cost. Implication and examples of PLI (Device Cloning Detection-RFID-Enabled Supply Chains)

Other Related Applications Worm hole attack: – Creates a tunnel that connects two points in network and relays messages back and forth. – Can filter unwanted packets and refuse traffic forwarding – PLI can be used to verify the origin device of signal transmitted Sybil Attack: – Attacker assigns different identities on the same node. – PLIs can detect multiple device identities.

Implication and examples of PLI Anonymity and Location Privacy PLI techniques require few packets to identify the number of devices in the vicinity and classify individual packets to the corresponding transmitting device. Example-Targeting UHF RFID – Shown to leak information which is independent to your position. – If user has a number of UFH tags, network of readers can track, regardless of location and distance. Example: user has 5 cards – Can be identified among 6x10^6 users. – Shows that card holder privacy can be compromised by the ability to read UHF RFID from large distances

Conclusion Benefit applications such as access control, device cloning detection, and provide identity (location) privacy. Has been investigated on a broad general spectrum of wireless technologies, but Primarily as defensive techniques. A lot of future research is still available in this area – What are the exact causes of identification? – The feasibility or non feasibility needs to be considered – How much information entropy does fingerprints contain? By analyzing the system, state of art approaches, attacks, security issues we can give a overview of physical layer identification on wireless devices.

THANK YOU !