Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints

by   Luis F. Abanto-Leon, et al.

The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint. This fingerprint can be used as an additional means of authentication to enhance security. In fact, recent works propose practical fingerprinting solutions that can be readily implemented in commercial-off-the-shelf devices. In this paper, we prove analytically and experimentally that these solutions are highly vulnerable to impersonation attacks. We also demonstrate that such a unique device-based signature can be abused to violate privacy by tracking the user device, and, as of today, users do not have any means to prevent such privacy attacks other than turning off the device. We propose RF-Veil, a radiometric fingerprinting solution that not only is robust against impersonation attacks but also protects user privacy by obfuscating the radiometric fingerprint of the transmitter for non-legitimate receivers. Specifically, we introduce a randomized pattern of phase errors to the transmitted signal such that only the intended receiver can extract the original fingerprint of the transmitter. In a series of experiments and analyses, we expose the vulnerability of adopting naive randomization to statistical attacks and introduce countermeasures. Finally, we show the efficacy of RF-Veil experimentally in protecting user privacy and enhancing security. More importantly, our proposed solution allows communicating with other devices, which do not employ RF-Veil.



page 7


Privacy Protection in Distributed Fingerprint-based Authentication

Biometric authentication is getting increasingly popular due to the conv...

DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

Browser fingerprinting aims to identify users or their devices, through ...

FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification

Trusted identification is critical to secure IoT devices. However, the l...

Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft

Recently, the traditional way to unlock car doors has been replaced with...

Robust Wireless Fingerprinting via Complex-Valued Neural Networks

A "wireless fingerprint" which exploits hardware imperfections unique to...

Stable Nonlinear and IQ Imbalance RF Fingerprint for Wireless OFDM Devices

An estimation method of Radio Frequency fingerprint (RFF) based on the p...

Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Continuity Protocol

We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, d...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.