2015
DOI: 10.1016/j.ijcip.2014.11.002
|View full text |Cite
|
Sign up to set email alerts
|

Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

Abstract: Physical layer security WPAN Spoofing ZigBee Networks a b s t r a c t Low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 14 publications
1
9
0
Order By: Relevance
“…A fingerprinting technique known as preamble manipulation may be applicable to Z-Wave devices [14]. Unfortunately, it was difficult to find a Z-Wave device that uses a transceiver other than the ZM3102N to verify this technique.…”
Section: Device-specific Ack Timesmentioning
confidence: 99%
See 1 more Smart Citation
“…A fingerprinting technique known as preamble manipulation may be applicable to Z-Wave devices [14]. Unfortunately, it was difficult to find a Z-Wave device that uses a transceiver other than the ZM3102N to verify this technique.…”
Section: Device-specific Ack Timesmentioning
confidence: 99%
“…IEEE 802.15.4 networks (e.g., WirelessHART and ZigBee) fulfill low-rate communications roles similar to those of Z-Wave in the critical infrastructure. Recent research efforts (see, e.g., [4,12,14]) have proposed novel security strategies for these networks. However, Z-Wave product development has been significantly restricted by nondisclosure and confidentiality agreements that stifle open-source security and resilience research.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile devices, such as cell phones and tablets, are considered as the most widely used wireless devices. These mobile devices need to be supported by multiple security approaches [1].…”
Section: Introductionmentioning
confidence: 99%
“…In light of these attacks, wireless situational awareness is an important component for network defense-in-depth. Radio frequency (RF) fingerprinting with low-cost signal collection receivers to protect critical infrastructures was recently demonstrated for the low-rate ZigBee protocols [1], but this work is the first to examine such techniques on Z-Wave.…”
Section: Introductionmentioning
confidence: 99%
“…While these differences are minute and still produce adequate symbol constellations for digital communication, they have been found useful for device authentication [2]- [5]. The RF signal from each network node is collected, reduced with feature generation 1 Approved for Public Release; Distribution Unlimited : 88ABW-2015-1475 and used to generate a device authentication model via various classifiers. With the learned model, these devices can then be identified and authenticated.…”
Section: Introductionmentioning
confidence: 99%