Physical-Layer Identification of Wired Ethernet Devices

被引:30
|
作者
Gerdes, Ryan M. [1 ]
Mina, Mani [2 ]
Russell, Steve F. [2 ]
Daniels, Thomas E. [2 ]
机构
[1] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
Communication forensics; hardware and devices; hardware forensics; intrusion prevention and tolerance; network security; physical layer security; signal and data authentication;
D O I
10.1109/TIFS.2012.2197746
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work sets forth a systematic approach for the investigation and utilization of the signal characteristics of digital devices for use in a security context. A methodology, built upon an optimal detector, the matched filter, is proposed that allows for the reliable identification and tracking of wired Ethernet cards by use of their hardware signaling characteristics. The matched filter is found to be sensitive enough to differentiate between devices using only a single Ethernet frame; an adaptive thresholding strategy employing prediction intervals is used to cope with the stochastic nature of the signals. To demonstrate the validity of the methodology, and to determine which portions of the signal are useful for identification purposes, experiments were performed on three different models of 10/100 Ethernet cards, totaling 27 devices in all. In selecting the cards, an effort was made to maximize intramodel similarity and thus present a worst-case scenario. While the primary focus of the work is network-based authentication, forensic applications are also considered. By using data collected from the same devices at different times, it is shown that some models of cards can be reidentified even after a month has elapsed since they were last seen.
引用
收藏
页码:1339 / 1353
页数:15
相关论文
共 50 条
  • [41] Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy
    Lee, Keonkook
    Chae, Chan-Byoung
    Kang, Joonhyuk
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (09) : 4672 - 4678
  • [42] On Study of Physical-Layer Attack Detection for Large Volumes of Data
    Cao, Ruohan
    Lu, Yueming
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 30 - 34
  • [43] Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
    Zou, Yulong
    Wang, Xianbin
    Shen, Weiming
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (12) : 5103 - 5113
  • [44] Mean physical-layer secrecy capacity in mobile communication systems
    Li, Tao
    Zhang, Yan
    Xu, Xibin
    Zhou, Shidong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2015, 55 (11): : 1241 - 1245and1252
  • [45] Cooperative Beamforming With Artificial Noise Injection for Physical-Layer Security
    Jang, Geunyeong
    Kim, Donghyeon
    Lee, In-Ho
    Jung, Haejoon
    IEEE ACCESS, 2023, 11 : 22553 - 22573
  • [46] Low Transmission Overhead for Polar Coding Physical-Layer Encryption
    Jin, Hongxu
    Liu, Rongke
    Zhang, Chenyu
    CHINA COMMUNICATIONS, 2019, 16 (02) : 246 - 256
  • [47] Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks
    Shi, Fang
    Tan, Weiqiang
    Xia, Junjuan
    Xie, Dongqing
    Fan, Lisheng
    Liu, Xin
    IEEE ACCESS, 2018, 6 : 8098 - 8108
  • [48] Physical-Layer Secret Key Generation With Colluding Untrusted Relays
    Chan Dai Truyen Thai
    Lee, Jemin
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) : 1517 - 1530
  • [49] Physical-Layer Security for Multiuser Computation Offloading with Lyapunov Optimization
    Liu, Qiuming
    Li, Jing
    Zhou, Ruoxuan
    Wei, Jianming
    Liu, Shumin
    Li, Qiaofu
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [50] Physical-Layer Encryption in Massive MIMO Systems with Spatial Modulation
    Sixin Wang
    Wei Li
    Jing Lei
    中国通信, 2018, 15 (10) : 159 - 171