@inproceedings{4fefdbeb62254de9aabd2f3987dbeef3,
title = "Secure Node Identification Through Covert Clock Feature Extraction",
abstract = "Node identification is the first line of defense for wireless networks' security that prevents illegal devices from accessing the network. Hardware features originating from innate hardware imperfections are considered promising identification fingerprints, among which, the hardware clock feature has been put under the spotlight due to its prevalence and ease of extraction. Current extractions of hardware clock features over wireless networks rely on the transmissions of time information, which, per se, face significant threats such as spoofing and replay attacks. In this paper, we propose a covert method to extract the hardware clock features which avoids the time information transmissions. We further propose a tailored secure node identification approach based on the proposed covert clock feature extraction. We implement and evaluate the proposed approach on a real Long Range (LoRa) testbed consisting of heterogeneous LoRa end nodes. Experimental results demonstrate that the proposed approach could effectively identify the heterogeneous LoRa end nodes with 95% accuracy.",
keywords = "LoRa network, Node identification, clock feature",
author = "Xintao Huan and Wen Chen and Changfan Wu and Jiamin Liu and Yixuan Zou and Shengkang Zhang",
note = "Publisher Copyright: {\textcopyright} 2024 IEEE.; 2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 ; Conference date: 20-05-2024",
year = "2024",
doi = "10.1109/INFOCOMWKSHPS61880.2024.10620855",
language = "English",
series = "IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024",
address = "United States",
}