IDENTIFICATION OF MOBILE DEVICES BY CORRELATION FEATURES OF THEIR SIGNAL SPECTRA
DOI:
https://doi.org/10.15588/1607-3274-2024-4-1Keywords:
security, Wi-Fi, identification, spectrum, asymmetry coefficient, mobile deviceAbstract
Context. The mass spread of Wi-Fi networks is facilitated by the simplicity of their deployment, high speed, universality, and convenience of use. The development and dissemination of these networks continue despite a number of shortcomings. One of the shortcomings is their vulnerability to various types of attacks, including those based on the forgery (imitation) of identification data. At the same time, there are physical layer characteristics, knowledge of which expands the understanding of the network’s state, can contribute to increasing the reliability of network subscriber identification, and thus prevent a number of attacks. This research is aimed at the theoretical and practical substantiation of the possibility of their application.
Objective. The aim of the study is to assess the application of detailed analysis of signal spectra emitted by devices connected to wireless Wi-Fi networks for their identification. To achieve this goal, it is necessary to analyze the experimentally measured spectra of wireless devices connected to the Wi-Fi network and evaluate the possibility of using the spectrum for the identification of mobile devices.
Method. This work proposes a method for processing the results of measuring the spectra of Wi-Fi device emissions by evaluating the asymmetry coefficient of the Wi-Fi device spectrum’s cross-correlation function. Mathematical modeling was used to assess the effectiveness of the method.
Results. The research results show that the minimum value of the asymmetry coefficient when comparing the template with different positions of one’s own device, and large values of the asymmetry coefficient when comparing templates with foreign spectra. Therefore, this characteristic can also be used for the identification of Wi-Fi devices.
Conclusions. The research results suggest the possibility of applying the proposed method for the identification of mobile devices, which will qualitatively complement existing security models with another feature for detecting unauthorized access.
References
Sahabul A., Debashis D. Analysis of security theats in wireless sensor network, International Journal of Wireless & Mobile Networks, 2014, Vol. 6, № 2, pp. 35– 46. DOI: 10.5121/ijwmn.2014.6204
Gupta А., Jha R. K. Security threats of wireless networks: A survey, International Conference on Computing, Communication & Automation, Greater Noida, 15–16 May 2015: proceedings. Greater Noida, IEEE, 2015, pp. 389–395. DOI: 10.1109/CCAA.2015.7148407
Catania. C. A., Garino C. G. Automatic network intrusion detection: Current techniques and open issues, Computers and Electrical Engineering, 2012, Vol. 38, pp. 1062–1072. DOI: 10.1016/j.compeleceng.2012.05.013
Garcıa-Teodoroa P., Dıaz-Verdejoa J., Macia´Fernandeza G. et al. Anomaly-based network intrusion detection: Techniques, systems and challenges, Сomputers & Security, 2009, Vol. 28, pp. 18–28. DOI: 10.1016/j.cose.2008.08.003
“Your Wi-Fi connection is unsecured” warning [Electronic resource]. Access mode: https://support.kaspersky.com/common/macos/14582
Agilent 802.11a/g Manufacturing Test Application Note : A Guide toGetting Started. Application note 1308-3 [Electronic resource]. Access mode: https://studylib.net/doc/18797817/agilent-802.11a-gmanufacturing-test-application-note-–-a.
Making 802.11g transmitter measurements. Application note 1380-4 [Electronic resource]. Access mode: https://www.testunlimited.com/pdf/an/5988-7813EN.pdf
RF Testing of WLAN products. Application note 1380-1 [Electronic resource]. Access mode: https://www.testunlimited.com/pdf/an/5988-3762EN.pdf
Agilent Technologies. Testing and Troubleshooting Digital RF Communications Transmitter Designs. Application note 1313 [Electronic resource]. Access mode: https://archive.org/details/manualzilla-id6880267/page/12/mode/2up
Antipov I. Ye., Vasylenko T. O. Ydentyfykatsyia mobylnykh ustroistv po osobennostiam spektrov ykh syhnalov, Radiotekhnika. Vseukr. mizhvid. nauk.-tekhn. zb., 2020, Vyp. 201, pp. 91–97.
Perez-Neira A. I., Member S., Lagunas M. A., Rojas M. A., Stoica P. Correlation Matching Approach for Spectrum Sensing in Open Spectrum Communications [Electronic resource]. Access mode: https://www.academia.edu/7471893Correlation_matching_approach_for_spectrum_sensing_in_open_spectrum_communications
Tekbıyık K., Akbunar Ö., Ekti A. R.et al. Correlation matching approach for spectrum sensing in open spectrum communications, IEEE Transactions on Signal Processing, 2020, Vol. 57, № 12, pp. 18–28. DOI: 10.1109/TSP.2009.2027778
Ross A., Jain A. Information fusion in biometrics, Pattern Recognition Letters, 2003, Vol. 24, pp. 2115– 2125. DOI: DOI:10.1016/S0167-8655(03)00079-5
Tuyls P., Goseling J. Capacity and Examples of Template-Protecting Biometric Authentication Systems, Biometric Authentication, ECCV International Workshop, Prague, 15 May, 2004: proceedings. Prague, BioAW, 2004. pp. 1–13. DOI:10.1007/978-3-540-259763_15
Brik V., Banerjee S., Gruteser M. et al. Wireless device identification with radiometric signatures, MobiCom ‘08: Proceedings of the 14th ACM international conference on Mobile computing and networking, San Francisco 14– 19 September 2008: proceedings. San Francisco, 2008, pp. 116–127. DOI:10.1145/1409944.1409959
Köse M. Taşcioğlu S., Telatar Z. RF Fingerprinting of IoT Devices Based on Transient Energy Spectrum, IEEE Access, 2019, Vol. 7, pp. 18715–18726. DOI: 10.1109/ACCESS.2019.2896696
Sydenko V. M., Hrushko Y. M. Osnovy nauchnykh yssledovanyi. Kharkov, Vyshcha shkola, 1978, 200 p.
Craciun A., Gabrea M. Correlation coefficient-based voice activity detector algorithm, Canadian Conference on Electrical and Computer Engineering, Canada, 2–5 May, 2004: proceedings. Niagara Falls, ON, Canada, IEEE, 2004, pp. 1789–1792. DOI: 10.1109/CCECE.2004.1349763
Antipov I., Vasilenko T. Improving the model of decision making about abnormal network state using a positioning system, Eastern-European Journal of Enterprise Technologies, 2019, Vol. 1, № 9 (97), pp. 6– 11. DOI: 10.15587/1729-4061.2019.157001
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 I. Antipov, T. Vasylenko
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.