Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks
نویسندگان
چکیده
Media access control (MAC) address spoofing results in the theft of sensitive information and misuse of network resources. This paper demonstrates an anomaly-based intrusion detection approach, which incorporates radio frequency fingerprinting (RFF) and Hotelling’s T , a multivariate statistical process control technique, for detecting this attack. RFF is a technique used to uniquely identify a transceiver based on the transceiverprint (set of features) of the signal it generates. Our approach is to associate a transceiver profile of a wireless device with its corresponding MAC address. Hence, although the MAC address can still be spoofed, the transceiverprints from the illegitimate device would not match the profile of the legitimate device. Moreover, the success rate of a wireless IDS can be further improved, by analyzing multiple chronologically ordered transceiverprints, prior to rendering a decision. Our approach makes use of a decision filter for this purpose. Finally, concept drift is addressed by using dynamic profiles that are updated continuously using currently observed transceiverprints. Simulation results, with a false positive rate of (0%) and an average detection rate of (94.5%) for 95% confidence interval, support the feasibility of employing RFF and the T 2 statistical technique to successfully detect the aforementioned attack.
منابع مشابه
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
Media access control (MAC) address spoofing can result in the unauthorized use of network resources. This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion detection system (IDS), for detecting this attack. RFF is a technique that is used to uniquely identify a transceiver based on the transient portion of the signal it genera...
متن کاملDesign of Cross Layer Based Intrusion Detection Technique for Wireless Lan
In this chapter, a cross-layer based intrusion detection technique for wireless networks is proposed. The proposed technique uses a combined weight value that is computed from the received signal strength (RSS) and time taken for RTS-CTS Handshake (TT). 3.1 Introduction The rapid proliferation of wireless local area networks has changed the landscape of network security. The traditional way of ...
متن کاملDetecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Pr...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کامل