Data - Dependent Fingerprints for Wireless Device Authentication

نویسندگان

  • Michael Jensen
  • Michael A. Jensen
چکیده

Number of Papers published in peer-reviewed journals: Number of Papers published in non peer-reviewed journals: Data-Dependent Fingerprints for Wireless Device Authentication Report Title While authenticating wireless radios based on the unique imperfections in their transmitted waveform has become a topic of some interest, such fingerprinting techniques are vulnerable to an attacker who can listen to a radio's transmission and later mimic the transmission using a sophisticated arbitrary waveform generator. However, this type of vulnerability can be reduced if the authentication is accomplished using a random selection from a long list of possible challenge-response pairs and if the node requesting network access has a fingerprint that changes with each valid response. This work provides a first study of such a concept using a tunable filter, used during the authentication exchange, whose tuning voltages are determined from the response data. The work uses simulations and measurements to demonstrate the effectiveness of estimating the distortion function introduced by the tunable filter and using it to identify the device. Results show that the technique can achieve near perfect discrimination between devices and can reject an attacker with very high probability. (a) Papers published in peer-reviewed journals (N/A for none) Enter List of papers submitted or published that acknowledge ARO support from the start of the project to the date of this printing. List the papers, including journal references, in the following categories: (b) Papers published in non-peer-reviewed journals (N/A for none) (c) Presentations Received Paper

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

An ultra low power wake-up signal decoder for wireless nodes activation in Internet of Things technology

  This paper proposes a new structure for digital address decoders based on flip-flops with application in wake-up signal generators of wireless networks nodes. Such nodes equipped with this device can be utilized in Internet of Things applications where the nodes are dependent on environment energy harvesting to survive for a long time. Different parts in these wireless nodes should have an e...

متن کامل

Dynamic fingerprints: improving the usability of peer-to-peer authentication

Peer-to-peer technology and wireless networking offer great potential for working together away from the desk – but they also introduce unique security challenges. A key aspect of that security is ensuring the identity of a peer user in the network (i.e., authentication) when standard server-based mechanisms are not available. Authentication is meant to foil the eavesdropping intruder who masqu...

متن کامل

Authentication and quality control of some polyherbal oils used in Persian Traditional Medicine (PTM)

Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015