Active Attacks Against Modulation-based Radiometric Identification

نویسندگان

  • Matthew Edman
  • Bülent Yener
چکیده

Radiometric identification is a recently coined term that describes a broad category of techniques for determining the identity of a wireless device based on unique characteristics of its transmitted signal that result from imperfections and variances in the device’s manufacturing processes. Existing techniques are based on extracting and classifying features from either the transient portion of a signal or, most recently, from patterns of modulation errors in a received signal, such as symbol phase and magnitude errors. While the latter approach was shown to be extremely successful in correctly identifying wireless devices using an expensive high-end signal analyzer, its accuracy has not been considered or evaluated under realistic deployment scenarios in the presence of an adversary who actively tries to manipulate his own radiometric signature. Using a software-defined radio platform and an implementation of the IEEE 802.11b PHY layer, we provide preliminary results that suggest a modulation-based radiometric identification system is both feasible and reasonably reliable on commodity hardware. We also experimentally evaluate the effectiveness of an attacker who actively tries to manipulate his radiometric signature in order to impersonate another 802.11b wireless device. We show that even a moderately sophisticated adversary can likely significantly reduce the accuracy of a modulation-based radiometric identification scheme based on a commodity RF hardware platform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Identification Scheme

M. Kim and K. Kim [1] introduce a new identification scheme based on the Gap Diffie-Hellman problem, and prove that the scheme is secure against active attacks if the Gap Diffie-Hellman problem is intractable. But, their identification scheme is NOT secure. In this paper, we give the reason that why the scheme is not secure, and we also modify the scheme such that the modified scheme is secure ...

متن کامل

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-mor...

متن کامل

Identity based identification from algebraic coding theory

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identi...

متن کامل

Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem

In [KK], a new identification scheme based on the Gap Diffie-Hellman problem was proposed at SCIS 2002, and it is shown that the scheme is secure against active attacks under the Gap Diffie-Hellman Intractability Assumption. Paradoxically, this identification scheme is totally breakable under passive attacks. In this paper, we show that any adversary holding only public parameters of the scheme...

متن کامل

GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks

The Guillou-Quisquater (GQ) and Schnorr identification schemes are amongst the most efficient and best-known Fiat-Shamir follow-ons, but the question of whether they can be proven secure against impersonation under active attack has remained open. This paper provides such a proof for GQ based on the assumed security of RSA under one more inversion, an extension of the usual one-wayness assumpti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009