Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints
نویسندگان
چکیده
The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric (radio frequency) fingerprint. This fingerprint can be used as an additional means authentication enhance security. In this paper, we prove analytically and experimentally that these solutions are highly vulnerable impersonation attacks. We also demonstrate such device-specific signature abused track devices, thus violating privacy. propose RF-Veil, fingerprinting solution is not only robust against attacks but effective protecting privacy by obfuscating transmitter for non-legitimate receivers. Specifically, introduce randomized pattern phase errors signal intended receiver extract original transmitter. series experiments analyses, expose vulnerability adopting naive randomization statistical countermeasures. Finally, show efficacy RF-Veil user enhancing More importantly, our proposed allows communicating with other which do employ RF-Veil.
منابع مشابه
Safer Cards Enhancing Rfid Security and Privacy via Location Sensing
ABSTRACT: In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-en...
متن کاملNovel Security and Privacy Perspectives of Camera Fingerprints
Camera fingerprinting is a technology established in the signal processing community for image forensics. We explore its novel security and privacy perspectives that have been so far largely ignored, including its applications in privacy intrusion, in handling new sociotechnical problems such as revenge porn, and in building a novel authentication mechanism – any photo you take are you.
متن کاملA Survey of Security and Privacy in Connected Vehicles
Electronic Control Units (ECUs) of a vehicle control the behavior of its devices–e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and Road Side Units (RSUs) through Vehicular Ad-hoc Networks (VANets), with personal devices through Wireless Personal Area Networks (WPANs), and with service center systems through cellular networks. A...
متن کاملEnhancing security of fingerprints through contextual biometric watermarking.
This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually ...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Performance evaluation review
سال: 2021
ISSN: ['1557-9484', '0163-5999']
DOI: https://doi.org/10.1145/3543516.3456280