Results 1 -
8 of
8
Robust location distinction using temporal link signatures
- In MobiCom
, 2007
"... The ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radiotagged objects, and for wireless network security in detection of replication attacks. In this paper, we propose using a meas ..."
Abstract
-
Cited by 81 (7 self)
- Add to MetaCart
(Show Context)
The ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radiotagged objects, and for wireless network security in detection of replication attacks. In this paper, we propose using a measured temporal link signature to uniquely identify the link between a transmitter and a receiver. When the transmitter changes location, or if an attacker at a different location assumes the identity of the transmitter, the proposed link distinction algorithm reliably detects the change in the physical channel. This detection can be performed at a single receiver or collaboratively by multiple receivers. We record over 9,000 link signatures at different locations and over time to demonstrate that our method significantly increases the detection rate and reduces the false alarm rate, in comparison to existing methods.
Advancing wireless link signatures for location distinction. In MobiCom ’08: Proceedings of the 14th ACM international conference on Mobile computing and networking
- and Ps = S ∗ (iTr) ∗ S(iTr
, 2008
"... Location distinction is the ability to determine when a device has changed its position. We explore the opportunity to use sophisticated PHY-layer measurements in wireless networking systems for location distinction. We first compare two existing location distinction methods- one based on channel ga ..."
Abstract
-
Cited by 40 (5 self)
- Add to MetaCart
(Show Context)
Location distinction is the ability to determine when a device has changed its position. We explore the opportunity to use sophisticated PHY-layer measurements in wireless networking systems for location distinction. We first compare two existing location distinction methods- one based on channel gains of multi-tonal probes, and another on channel impulse response. Next, we combine the benefits of these two methods to develop a new link measurement that we call the complex temporal signature. We use a 2.4 GHz link measurement data set, obtained from CRAWDAD [10], to evaluate the three location distinction methods. We find that the complex temporal signature method performs significantly better compared to the existing methods. We also perform new measurements to understand and model the temporal behavior of link signatures over time. We integrate our model in our location distinction mechanism and significantly reduce the probability of false alarms due to temporal variations of link signatures.
SecureAngle: Improving Wireless Security Using Angle-of-Arrival Information
- in Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks
"... Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a secu-rity risk to ..."
Abstract
-
Cited by 13 (2 self)
- Add to MetaCart
(Show Context)
Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a secu-rity risk to the entire network. To address this problem, we propose SecureAngle, a system designed to operate along-side existing wireless security protocols, adding defense in depth. SecureAngle leverages multi-antenna APs to profile the directions at which a client’s signal arrives, using this angle-of-arrival (AoA) information to construct signatures that uniquely identify each client. We identify SecureAn-gle’s role of providing a fine-grained location service in a multi-path indoor environment. With this location informa-tion, we investigate how an AP might create a “virtual fence” that drops frames received from clients physically located outside a building or office. With SecureAngle signatures, we also identify how an AP can prevent malicious parties from spoofing the link-layer address of legitimate clients. We discuss how SecureAngle might aid whitespace radios in yielding to incumbent transmitters, as well as its role in directional downlink transmissions with uplink AoA infor-mation.
Identifying Wireless Users via Transmitter Imperfections,” to appear
- in the IEEE Journal on Selected Areas in Communications- Special Issue on Advances in Digital Forensics for Communications and Networking
, 2011
"... Abstract—Variations in the RF chain of radio transmitters can be used as a signature to uniquely associate wireless devices with a given transmission. Previous approaches, which have varied from transient analysis to machine learning, do not provide verifiable accuracy, which is essential for admiss ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
Abstract—Variations in the RF chain of radio transmitters can be used as a signature to uniquely associate wireless devices with a given transmission. Previous approaches, which have varied from transient analysis to machine learning, do not provide verifiable accuracy, which is essential for admissibility of the methods in the court. Here we detail a firststeptowardamodelbased approach, which uses statistical models of RF transmitter components that are amenable for analysis. Algorithms based on statistical signal processing methods are developed to exploit non-linearities of wireless transmitters for the purpose of user identification in wireless systems. The decision rules are derived and their performance is analyzed. In order to establish the viability of the proposed approach, the practical variations of transmitter chain components are analyzed based on simulations, measurements and manufacturers ’ specifications. Results show that the proposed identification methods can be effective, even for short data records and relatively low signal-to-noise ratios, when exploiting imperfections of commercially used RF transmitters. Index Terms—Radiometric identification, Volterra series, Brownian Bridge, Likelihood Ratio Test, breaking anonymity,
Securearray: Improving wifi security with fine-grained physical-layer information
- in Proc. of ACM MobiCom ’13
, 2013
"... Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security stand-point. With easily available directional antennas, attackers can be physically located off-site, yet compromise WiFi security proto-cols such as WEP, WPA, and even to som ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security stand-point. With easily available directional antennas, attackers can be physically located off-site, yet compromise WiFi security proto-cols such as WEP, WPA, and even to some extent WPA2 through a range of exploits specific to those protocols, or simply by run-ning dictionary and human-factors attacks on users ’ poorly-chosen passwords. This presents a security risk to the entire home or enterprise network. To mitigate this ongoing problem, we pro-pose SecureArray, a system designed to operate alongside exist-ing wireless security protocols, adding defense in depth against active attacks. SecureArray’s novel signal processing techniques leverage multi-antenna access point (AP) to profile the directions at which a client’s signals arrive, using this angle-of-arrival (AoA)
Approved as to style and content by:
, 2014
"... This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has ..."
Abstract
- Add to MetaCart
This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has
IEEE TRANSACTIONS ON MOBILE COMPUTING, DRAFT 1 Temporal Link Signature Measurements for Location Distinction
"... Abstract—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless sensor networks, for physical security of radio-tagged objects, and for wireless network security in detection of re ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless sensor networks, for physical security of radio-tagged objects, and for wireless network security in detection of replication attacks. In this paper, we investigate using a measured temporal link signature to uniquely identify the link between a transmitter (TX) and a receiver (RX). When the TX changes location, or if an attacker at a different location assumes the identity of the TX, the proposed location distinction algorithm reliably detects the change in the physical channel. This detection can be performed at a single RX or collaboratively by multiple receivers. We use 9,000 link signatures recorded at different locations and over time to demonstrate that our method significantly increases the detection rate and reduces the false alarm rate, in comparison to existing methods. We present a procedure to estimate the mutual information in link and link signature using the Edgeworth approximation. For the measured data set, we show that approximately 66 bits of link information is contained in each measured link signature. Index Terms—PHY layer, radio channel, measurements, location distinction