• DocumentCode
    738876
  • Title

    Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation

  • Author

    Ramsey, Benjamin W. ; Mullins, Barry E. ; Temple, Michael A. ; Grimaila, Michael R.

  • Author_Institution
    Department of Electrical and Computer Engineering, Air Force Institute of Technology, WPAFB, OH
  • Volume
    12
  • Issue
    5
  • fYear
    2015
  • Firstpage
    585
  • Lastpage
    596
  • Abstract
    Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Recent works investigate physical layer features such as received signal strength or radio frequency fingerprints to localize and identify malicious devices. In this paper we demonstrate a novel and complementary approach to exploiting physical layer differences among wireless devices that is more energy efficient and invariant with respect to the environment. Specifically, we exploit subtle design differences among transceiver hardware types. Transceivers fulfill the physical-layer aspects of wireless networking protocols, yet specific hardware implementations vary among manufacturers and device types. In this paper we demonstrate that precise manipulation of the physical layer header prevents a subset of transceiver types from receiving the manipulated packet. By soliciting acknowledgments from wireless devices using a small number of packets with manipulated preambles and frame lengths, a response pattern identifies the true transceiver class of the device under test. Herein we demonstrate a transceiver taxonomy of six classes with greater than 99 percent accuracy, irrespective of environment. We successfully demonstrate wireless multi-factor authentication, intrusion detection, and transceiver type fingerprinting through preamble manipulation.
  • Keywords
    Communication system security; IEEE 802.15 Standards; Radio frequency; Transceivers; Wireless communication; Wireless personal area networks; Receivers; and protection; integrity; integrity and protection; network-level security; security; wireless communications; wireless systems;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2014.2366455
  • Filename
    6942251