Device Identification Flashcards
What is the definition of device identification in wireless networks?
The ability to uniquely identify a user or device based on a unique ID such as MAC address, IMEI or MEID for mobile phones.
What are some of the goals and applications of device identification?
Authentication, localization, tracking, navigation, intrusion detection, and new application domains like smart healthcare or autonomous UAV.
What are the two main categories of device identification methods in wireless networks?
Passive and active identification methods.
What is the difference between passive and active device identification methods?
Passive methods are based on observing the communication traffic of the target device to extract features that distinguish the device or its components. Active methods generate targeted traffic with the target device and then observe its behavior.
What are some examples of device identification characteristics in different layers?
Signal intelligence, modulation errors, packet contents, or behavior.
How is the classification of the characteristics (fingerprints) usually done?
Using a standard classifier, such as the nearest neighbor classifier.
What are some examples of device identification use cases?
Authentication, tracking, intrusion detection, and new application domains.
What are some examples of passive and active attackers of different power levels, and their capabilities and goals?
Passive attackers only observe the communication traffic of the target device, while active attackers generate targeted traffic with the target device and then observe its behavior.
What are some real life device identification scenarios?
Wardriving, counting visitors, traffic load, and UAV detection.
What are some examples of passive identification techniques by packet evaluation and signal intelligence?
Packet evaluation looks at the content of the packets, while signal intelligence looks at the properties of the signals.
What are some examples of passive identification: statistical approaches?
Using statistical classification and regression models on RF features, such as non-parametric features of complex IQ signals of ZigBee devices.
What are some examples of passive identification: transient-based approaches?
Using the time between the start of ramping up to full power before a new transmission, called the transient signal, to identify devices.
What are some examples of passive identification: modulation-based approaches?
Using modulation-based errors to identify devices, such as frequency offset, sync correlation, I/Q origin offset, and magnitude/phase offset.
What are some examples of passive identification: other signal-based approaches?
Using RSS-based, permutation-entropy-based, or other methods to identify devices based on signal characteristics.
What are some examples of passive identification: positioning-based identification?
Using the relative signal power and CSI to locate and track devices in space.
What are some examples of passive identification: approaches not using packet content?
These approaches are independent of the protocol and the data, and only rely on the signal properties.