Abstract
Network complexity continues to evolve and more robust measures are required to ensure network integrity and mitigate unauthorized access. A physical-layer (PHY) augmentation to Medium Access Control (MAC) authentication is considered using PHY-based Distinct Native Attribute (DNA) features to form device fingerprints. Specifically, a comparison of waveform-based Radio Frequency DNA (RF-DNA) and Constellation-Based DNA (CB-DNA) fingerprinting methods is provided using unintentional Ethernet cable emissions for 10BASE-T signaling. For the first time a direct comparison is achievable between the two methods given the evaluation uses the same experimentally collected emissions to generate RF-DNA and CB-DNA fingerprints. RF-DNA fingerprinting exploits device dependent features derived from instantaneous preamble responses within communication bursts. For these same bursts, the CB-DNA approach uses device dependent features derived from mapped symbol clusters within an adapted two-dimensional (2D) binary constellation. The evaluation uses 16 wired Ethernet devices from 4 different manufacturers and both Cross-Model (manufacturer) Discrimination (CMD) and Like-Model (serial number) Discrimination (LMD) is addressed. Discrimination is assessed using a Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) classifier. Results show that both RF-DNA and CB-DNA approaches perform well for CMD with average correct classification of \(\%C\)=90% achieved at Signal-to-Noise Ratios of \(SNR\ge 12.0\) dB. Consistent with prior related work, LMD discrimination is more challenging with CB-DNA achieving \(\%C\)=90.0% at \(SNR\)=\(22.0\) dB and significantly outperforming RF-DNA which only achieved \(\%C\)=56.0% at this same \(SNR\).
Chapter PDF
Similar content being viewed by others
Keywords
References
Danev, B., Zanetti, D., Capkun, S.: On Physical-Layer Identification of Wireless Devices. ACM Computing Surveys (CSUR) 45(1), 6 (2012)
Huang, Y., Zheng, H.: Radio frequency fingerprinting based on the constellation errors. In: 2012 18th Asia-Pacific Conf. on Communications (APCC), pp. 900–905. IEEE (2012)
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proc. of the 14th ACM Intl. Conf. on Mobile computing and Networking, pp. 116–127. ACM (2008)
Danev, B., Luecken, H., Capkun, S., El Defrawy, K.: Attacks on physical-layer identification. In: Proc. of the Third ACM Conf. on Wireless Network Security, pp. 89–98. ACM (2010)
Edman, M., Yener, B.: Active Attacks Against Modulation-Based Radiometric Identification. Technical report 0902, Rensselaer Institute of Technology (2009)
Cobb, W.E., Laspe, E.D., Baldwin, R.O., Temple, M.A., Kim, Y.C.: Intrinsic Physical-Layer Authentication of Integrated Circuits. IEEE Trans on Information Forensics and Security 7(1), 14–24 (2012)
Desmond, L.C.C., Cho, C.Y., Tan, C.P., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: Proceedings of the first ACM Conference on Wireless Network Security. ACM (2008)
Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing 2(2), 93–108 (2005)
Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: Usenix Security, vol. 6 (2006)
Gao, K., Corbett, C., Beyah, R.A.: A passive approach to wireless device fingerprinting. In: Proc. of IEEE/IFIP DSN, pp. 383–392 (2010)
Uluagac, A., Radhakrishnan, S., Corbett, C., Baca, A., Beyah, R.: A passive technique for fingerprinting wireless devices with wired-side observations. In: Proceedings of the IEEE Conference on Communications and Network Security (CNS), pp. 305–313 (2013)
Francois, J., Abdelnurt, H., State, R., Festort, O.: Ptf: passive temporal fingerprinting. In: Proc. of IFIP/IEEE International Symposium on Integrated Network Management, pp. 289–296 (2011)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Generation Computer Systems 29(7), 1645–1660 (2013)
Zhou, L., Chao, H.C.: Multimedia Traffic Security Architecture for the Internet of Things. IEEE Network 25(3), 35–40 (2011)
Reising, D.R., Temple, M.A., Oxley, M.E.: Gabor-based RF-DNA fingerprinting for classifying 802.16e WiMAX mobile subscribers. In: 2012 Intl. Conf. on Computing, Networking and Communications (ICNC), pp. 7–13. IEEE (2012)
Ramsey, B.W., Temple, M. A., Mullins, B. E.: PHY foundation for multi-factor ZigBee node authentication. In: Global Communications Conf. (GLOBECOM), 2012, pp. 795–800. IEEE (2012)
Cobb, W.E., Garcia, E.W., Temple, M.A., Baldwin, R.O., Kim, Y.C.: Physical Layer Identification of Embedded Devices using RFDNA Fingerprinting. MILITARY COMMUNICATIONS Conf., MILCOM 2010, 2168–2173 (2010)
Williams, M.D., Munns, S., Temple, M.A., Mendenhall, M.J.: RF-DNA fingerprinting for airport WiMax communications security. In: 2010 4th Intl. Conf. on Network and System Security (NSS), pp. 32–39 (2010)
Williams, M.D., Temple, M.A., Reising, D.R.: Augmenting bit- level network security using physical layer RF-DNA fingerprinting. In: Global Telecommunications Conf. (GLOBECOM 2010), pp. 1–6. IEEE (2010)
Carbino, T.J., Temple, M.A., Bihl, T.: Ethernet card discrimination using unintentional cable emissions and constellation-based Fingerprints. In: 2015 Intl. Workshop on Computing, Networking and Communications (IWCNC) (to appear, February 2015) (Accepted)
Reising, D.R.: Exploitation of RF-DNA for Device Classification and Verification Using GRLVQI Processing. Technical report DTIC Doc (2012)
Stone, S.J., Temple, M.A., Baldwin, R.O.: RF-based PLC IC design verification. In: 2012 DMSMS and Stand Conf. (DMSMS12) (2012)
Wright, B.C.: PLC Hardware Discrimination using RF-DNA Fingerprinting. Technical Report DTIC Document (2014)
Carbino, T.J., Baldwin, R.O.: Side channel analysis of ethernet network cable emissions. In: 9th Intl. Conf. on Cyber Warfare and Security, ICCWS (2014)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons (2012)
Mendenhall, M.J., Merényi, E.: Relevance-Based Feature Extraction for Hyperspectral Images. IEEE Trans on Neural Networks 19(4), 658–672 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Carbino, T.J., Temple, M.A., Lopez, J. (2015). A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control. In: Federrath, H., Gollmann, D. (eds) ICT Systems Security and Privacy Protection. SEC 2015. IFIP Advances in Information and Communication Technology, vol 455. Springer, Cham. https://doi.org/10.1007/978-3-319-18467-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-18467-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18466-1
Online ISBN: 978-3-319-18467-8
eBook Packages: Computer ScienceComputer Science (R0)