Secure Node Identification Through Covert Clock Feature Extraction

Xintao Huan*, Wen Chen, Changfan Wu, Jiamin Liu, Yixuan Zou, Shengkang Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Node identification is the first line of defense for wireless networks' security that prevents illegal devices from accessing the network. Hardware features originating from innate hardware imperfections are considered promising identification fingerprints, among which, the hardware clock feature has been put under the spotlight due to its prevalence and ease of extraction. Current extractions of hardware clock features over wireless networks rely on the transmissions of time information, which, per se, face significant threats such as spoofing and replay attacks. In this paper, we propose a covert method to extract the hardware clock features which avoids the time information transmissions. We further propose a tailored secure node identification approach based on the proposed covert clock feature extraction. We implement and evaluate the proposed approach on a real Long Range (LoRa) testbed consisting of heterogeneous LoRa end nodes. Experimental results demonstrate that the proposed approach could effectively identify the heterogeneous LoRa end nodes with 95% accuracy.

Original languageEnglish
Title of host publicationIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350384475
DOIs
Publication statusPublished - 2024
Event2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 - Vancouver, Canada
Duration: 20 May 2024 → …

Publication series

NameIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024

Conference

Conference2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
Country/TerritoryCanada
CityVancouver
Period20/05/24 → …

Keywords

  • LoRa network
  • Node identification
  • clock feature

Fingerprint

Dive into the research topics of 'Secure Node Identification Through Covert Clock Feature Extraction'. Together they form a unique fingerprint.

Cite this