Detecting rogue devices in bluetooth networks using radio frequency fingerprinting

نویسندگان

  • Jeyanthi Hall
  • Michel Barbeau
  • Evangelos Kranakis
چکیده

Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and initiate other forms of attacks. This paper investigates a novel intrusion detection approach, which makes use of radio frequency fingerprinting (RFF) for profiling, Hotelling’s T 2 statistics for classification and a decision filter, for detecting these devices. RFF is a technique that is used to uniquely identify a transceiver based on the transient portion of the signal it generates. Moreover, the use of a statistical classifier proves advantageous in minimizing requirements for memory. Finally, the detection rate is also improved by incorporating a decision filter, which takes the classification results of a set of events into consideration, prior to rendering the final decision. The average False Alarm Rate of five percent and Detection Rate of ninety-three percent support the feasibility of employing these components to address the aforementioned problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of rogue devices in Wireless Networks

The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current authentication systems are vulnerable to device impersonation by rogue devices. Within cellular mobile networks, this threat is actualized by cloning cell phones, and using the clones for obtaining free services. A well known example in Wi...

متن کامل

Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase

ABSTRACT Radio Frequency Fingerprinting (RFF) is a technique, which has been used to identify wireless devices. It essentially involves the detection of the transient signal and the extraction of the fingerprint. The detection phase, in our opinion, is the most challenging yet crucial part of the RFF process. Current approaches, namely Threshold and Bayesian Step Change Detector, which use ampl...

متن کامل

Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis

IEEE 802.11b wireless networks and Bluetooth networks provide complimentary services using the same unlicensed radio frequency band. As the benefits of utilizing these services become increasingly apparent, the likelihood of mutual interference also increases. The wellknown frequency hopping algorithm and adaptive frequency hopping algorithm do not fully consider the interference level of the o...

متن کامل

Robust Detection of Rogue Signals in Cooperative Spectrum Sensing

Cognitive radio networks can sense, detect, and monitor their surrounding radio frequency conditions including the interference and availability of a broad range of channels, followed by choosing the best possible channel for a given task. This is called Dynamic Spectrum Access (DSA) and it is a key characteristic of cognitive radios that enable them to operate on unused licensed channels. Howe...

متن کامل

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR

We present a framework for monitoring enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios. We demonstrate that the DAIR framework is useful for detecting rogue wireless devices (e.g., access points) attached to corporate networks, as well as for detecting Denial of Service attacks on Wi-Fi networks. Prior ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006