Physical-Layer Identification of Wired Ethernet Devices

被引:30
|
作者
Gerdes, Ryan M. [1 ]
Mina, Mani [2 ]
Russell, Steve F. [2 ]
Daniels, Thomas E. [2 ]
机构
[1] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
Communication forensics; hardware and devices; hardware forensics; intrusion prevention and tolerance; network security; physical layer security; signal and data authentication;
D O I
10.1109/TIFS.2012.2197746
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work sets forth a systematic approach for the investigation and utilization of the signal characteristics of digital devices for use in a security context. A methodology, built upon an optimal detector, the matched filter, is proposed that allows for the reliable identification and tracking of wired Ethernet cards by use of their hardware signaling characteristics. The matched filter is found to be sensitive enough to differentiate between devices using only a single Ethernet frame; an adaptive thresholding strategy employing prediction intervals is used to cope with the stochastic nature of the signals. To demonstrate the validity of the methodology, and to determine which portions of the signal are useful for identification purposes, experiments were performed on three different models of 10/100 Ethernet cards, totaling 27 devices in all. In selecting the cards, an effort was made to maximize intramodel similarity and thus present a worst-case scenario. While the primary focus of the work is network-based authentication, forensic applications are also considered. By using data collected from the same devices at different times, it is shown that some models of cards can be reidentified even after a month has elapsed since they were last seen.
引用
收藏
页码:1339 / 1353
页数:15
相关论文
共 50 条
  • [31] Jammer Selection for Physical-Layer Security Using Fuzzy Logic
    Huang, Lijiao
    Guo, Li
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 618 - 623
  • [32] Spoofing Detection for LiDAR in Autonomous Vehicles: A Physical-Layer Approach
    Hu, Xueyang
    Liu, Tian
    Shu, Tao
    Nguyen, Diep
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 20673 - 20689
  • [33] Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI
    Wei Yang
    Jing Mao
    Chen Chen
    Xiang Cheng
    Liu-qing Yang
    Hai-ge Xiang
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 398 - 408
  • [34] UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions
    Wang, Hui-Ming
    Zhang, Xu
    Jiang, Jia-Cheng
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 32 - 39
  • [35] Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security
    Searle, Hunter
    Gomes, Marco A. C.
    Vilela, Joao P.
    Harrison, Willie K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [36] Achievable Physical-Layer Security Over Composite Fading Channels
    Badarneh, Osamah S.
    Sofotasios, Paschalis C.
    Muhaidat, Sami
    Cotton, Simon L.
    Rabie, Khaled M.
    Aldhahir, Naofal
    IEEE ACCESS, 2020, 8 : 195772 - 195787
  • [37] A lightweight physical-layer based security strategy for Internet of things
    Jiang, Yu
    Hu, Aiqun
    Huang, Jie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12971 - 12983
  • [38] Physical-Layer Security for MISO Visible Light Communication Channels
    Mostafa, Ayman
    Lampe, Lutz
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (09) : 1806 - 1818
  • [39] Physical-Layer Security in Multiuser Visible Light Communication Networks
    Yin, Liang
    Haas, Harald
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (01) : 162 - 174
  • [40] Physical-Layer Encryption in Massive MIMO Systems with Spatial Modulation
    Wang, Sixin
    Li, Wei
    Lei, Jing
    CHINA COMMUNICATIONS, 2018, 15 (10) : 159 - 171