Data - Dependent Fingerprints for Wireless Device Authentication
نویسندگان
چکیده
Number of Papers published in peer-reviewed journals: Number of Papers published in non peer-reviewed journals: Data-Dependent Fingerprints for Wireless Device Authentication Report Title While authenticating wireless radios based on the unique imperfections in their transmitted waveform has become a topic of some interest, such fingerprinting techniques are vulnerable to an attacker who can listen to a radio's transmission and later mimic the transmission using a sophisticated arbitrary waveform generator. However, this type of vulnerability can be reduced if the authentication is accomplished using a random selection from a long list of possible challenge-response pairs and if the node requesting network access has a fingerprint that changes with each valid response. This work provides a first study of such a concept using a tunable filter, used during the authentication exchange, whose tuning voltages are determined from the response data. The work uses simulations and measurements to demonstrate the effectiveness of estimating the distortion function introduced by the tunable filter and using it to identify the device. Results show that the technique can achieve near perfect discrimination between devices and can reject an attacker with very high probability. (a) Papers published in peer-reviewed journals (N/A for none) Enter List of papers submitted or published that acknowledge ARO support from the start of the project to the date of this printing. List the papers, including journal references, in the following categories: (b) Papers published in non-peer-reviewed journals (N/A for none) (c) Presentations Received Paper
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملAn ultra low power wake-up signal decoder for wireless nodes activation in Internet of Things technology
This paper proposes a new structure for digital address decoders based on flip-flops with application in wake-up signal generators of wireless networks nodes. Such nodes equipped with this device can be utilized in Internet of Things applications where the nodes are dependent on environment energy harvesting to survive for a long time. Different parts in these wireless nodes should have an e...
متن کاملDynamic fingerprints: improving the usability of peer-to-peer authentication
Peer-to-peer technology and wireless networking offer great potential for working together away from the desk – but they also introduce unique security challenges. A key aspect of that security is ensuring the identity of a peer user in the network (i.e., authentication) when standard server-based mechanisms are not available. Authentication is meant to foil the eavesdropping intruder who masqu...
متن کاملAuthentication and quality control of some polyherbal oils used in Persian Traditional Medicine (PTM)
Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...
متن کامل