Radio fingerprinting

Last updated

Radio fingerprinting is a process that identifies a cellular phone or any other radio transmitter by the fingerprint that characterizes its signal transmission and is hard to imitate. An electronic fingerprint makes it possible to identify a wireless device by its radio transmission characteristics. Radio fingerprinting is commonly used by cellular operators to prevent cloning of cell phones — a cloned device will have the same numeric equipment identity but a different radio fingerprint.

Essentially, each transmitter (cell phones are just one type of radio transmitter) has a rise time signature when first keyed which is caused by the slight variations of component values during manufacture. Once the rise time signature is captured and assigned to a callsign, the use of a different transmitter using the same callsign is easily detected. Such systems are used in military signals intelligence and by radio regulatory agencies such as the U.S. Federal Communications Commission (FCC) for identifying illegal transmitters. They are also used for assessing usage for billing purposes in Subscriber Mobile Radio (SMR) systems.

This topic has garnered great attention in recent years as the radio fingerprinting technique offers a "physical layer" authentication solution, which can provide fundamentally superior performance than traditional higher-layer encryption solutions. The topic has been studied by various researchers across multiple disciplines, including Signal Processing, Antenna and Propagation and Computer Science. [1] [2] [3]

Related Research Articles

<span class="mw-page-title-main">Wireless network</span> Computer network not fully connected by cables

A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Admin telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.

<span class="mw-page-title-main">Wi-Fi</span> Wireless local area network

Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports.

In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two user parties.

<span class="mw-page-title-main">Wireless</span> Transfer of information or power that does not require the use of physical wires

Wireless communication is the transfer of information (telecommunication) between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most common wireless technologies use radio waves. With radio waves, intended distances can be short, such as a few meters for Bluetooth, or as far as millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mouse, keyboards and headsets, headphones, radio receivers, satellite television, broadcast television and cordless telephones. Somewhat less common methods of achieving wireless communications involve other electromagnetic phenomena, such as light and magnetic or electric fields, or the use of sound.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

<span class="mw-page-title-main">Wireless mesh network</span> Radio nodes organized in a mesh topology

A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It can also be a form of wireless ad hoc network.

<span class="mw-page-title-main">Cellular network</span> Communication network

A cellular network or mobile network is a telecommunications network where the link to and from end nodes is wireless and the network is distributed over land areas called cells, each served by at least one fixed-location transceiver. These base stations provide the cell with the network coverage which can be used for transmission of voice, data, and other types of content. A cell typically uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed service quality within each cell.

<span class="mw-page-title-main">Air gap (networking)</span> Network security measure

An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. It means a computer or network has no network interface controllers connected to other networks, with a physical or conceptual air gap, analogous to the air gap used in plumbing to maintain water quality.

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

Phone cloning is the copying of identity from one cellular device to another.

<span class="mw-page-title-main">MIMO</span> Use of multiple antennas in radio

In radio, multiple-input and multiple-output (MIMO) is a method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation. MIMO has become an essential element of wireless communication standards including IEEE 802.11n, IEEE 802.11ac, HSPA+ (3G), WiMAX, and Long Term Evolution (LTE). More recently, MIMO has been applied to power-line communication for three-wire installations as part of the ITU G.hn standard and of the HomePlug AV2 specification.

Wi-Fi positioning system is a geolocation system that uses the characteristics of nearby Wi‑Fi access points to discover where a device is located.

A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device.

Real-time locating systems (RTLS), also known as real-time tracking systems, are used to automatically identify and track the location of objects or people in real time, usually within a building or other contained area. Wireless RTLS tags are attached to objects or worn by people, and in most RTLS, fixed reference points receive wireless signals from tags to determine their location. Examples of real-time locating systems include tracking automobiles through an assembly line, locating pallets of merchandise in a warehouse, or finding medical equipment in a hospital.

Ambient backscatter uses existing radio frequency signals, such as radio, television and mobile telephony, to transmit data without a battery or power grid connection. Each such device uses an antenna to pick up an existing signal and convert it into tens to hundreds of microwatts of electricity. It uses that power to modify and reflect the signal with encoded data. Antennas on other devices, in turn, detect that signal and can respond accordingly.

Air-gap malware is malware that is designed to defeat the air-gap isolation of secure computer systems using various air-gap covert channels.

<span class="mw-page-title-main">Victor Bahl</span> American computer scientist

Victor Bahl is an American Technical Fellow and CTO of Azure for Operators at Microsoft. He started networking research at Microsoft. He is known for his research contributions to white space radio data networks, radio signal-strength based indoor positioning systems, multi-radio wireless systems, wireless network virtualization, edge computing, and for bringing wireless links into the datacenter. He is also known for his leadership of the mobile computing community as the co-founder of the ACM Special Interest Group on Mobility of Systems, Users, Data, and Computing (SIGMOBILE). He is the founder of international conference on Mobile Systems, Applications, and Services Conference (MobiSys), and the founder of ACM Mobile Computing and Communications Review, a quarterly scientific journal that publishes peer-reviewed technical papers, opinion columns, and news stories related to wireless communications and mobility. Bahl has received important awards; delivered dozens of keynotes and plenary talks at conferences and workshops; delivered over six dozen distinguished seminars at universities; written over hundred papers with more than 65,000 citations and awarded over 100 US and international patents. He is a Fellow of the Association for Computing Machinery, IEEE, and American Association for the Advancement of Science.

Implicit authentication (IA) is a technique that allows the smart device to recognize its owner by being acquainted with his/her behaviors. It is a technique that uses machine learning algorithms to learn user behavior through various sensors on the smart devices and achieve user identification. Most of the current authentication techniques, e.g., password, pattern lock, finger print and iris recognition, are explicit authentication which require user input. Comparing with explicit authentication, IA is transparent to users during the usage, and it significantly increases the usability by reducing time users spending on login, in which users find it more annoying than lack of cellular coverage.

<span class="mw-page-title-main">Moustafa Youssef</span> Egyptian computer scientist

Moustafa Youssef is an Egyptian computer scientist who was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2019 for contributions to wireless location tracking technologies and a Fellow of the Association for Computing Machinery (ACM) in 2019 for contributions to location tracking algorithms. He is the first and only ACM Fellow in the Middle East and Africa.

WiFi sensing uses existing Wi-Fi signals to detect events or changes such as motion, gesture recognition, and biometric measurement. WiFi sensing is a combination of Wi-Fi and radar sensing technology working in tandem to enable usage of the same Wi-Fi transceiver hardware and RF spectrum for both communication and sensing.

References

  1. Brik, Vladimir; Banerjee, Suman; Gruteser, Marco; Oh, Sangho (14 September 2008). "Wireless device identification with radiometric signatures" (PDF). Proceedings of the 14th ACM international conference on Mobile computing and networking. pp. 116–127. doi:10.1145/1409944.1409959. ISBN   9781605580968. S2CID   8960221 . Retrieved 1 March 2023.
  2. Abanto, Luis; Bäuml, Andreas; Sim, Allyson; Hollick, Matthias; Asadi, Arash (2020). "Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints". Proceedings of the ACM on Measurement and Analysis of Computing Systems. 6 (4): 1346–1354. arXiv: 2011.12644 . doi:10.1145/3428329. S2CID   227162019.
  3. Shi, Yan; Jensen, Michael A. (2011). "Improved Radiometric Identification of Wireless Devices Using MIMO Transmission". IEEE Transactions on Information Forensics and Security. 6 (4): 1346–1354. doi:10.1109/TIFS.2011.2162949. S2CID   16696253.