The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint. This fingerprint can be used as an additional means of authentication to enhance security. In fact, recent works propose practical fingerprinting solutions that can be readily implemented in commercial-off-the-shelf devices. In this paper, we prove analytically and experimentally that these solutions are highly vulnerable to impersonation attacks. We also demonstrate that such a unique device-based signature can be abused to violate privacy by tracking the user device, and, as of today, users do not have any means to prevent such privacy attacks other than turning off the device. We propose RF-Veil, a radiometric fingerprinting solution that not only is robust against impersonation attacks but also protects user privacy by obfuscating the radiometric fingerprint of the transmitter for non-legitimate receivers. Specifically, we introduce a randomized pattern of phase errors to the transmitted signal such that only the intended receiver can extract the original fingerprint of the transmitter. In a series of experiments and analyses, we expose the vulnerability of adopting naive randomization to statistical attacks and introduce countermeasures. Finally, we show the efficacy of RF-Veil experimentally in protecting user privacy and enhancing security. More importantly, our proposed solution allows communicating with other devices, which do not employ RF-Veil.
翻译:WiFi 芯片的内在硬件缺陷在传送信号中表现为WiFi 芯片的内在硬件缺陷,导致一个独特的辐射测量指纹。这种指纹可以用作加强安全的额外认证手段。事实上,最近的工作提出了实用的指纹鉴别方法,这些方法可以在现成的商用装置中轻易实施。在本文中,我们通过分析和实验证明,这些解决办法极易被冒冒用攻击。我们还表明,这种独特的装置签字可以通过跟踪用户装置来滥用,从而侵犯隐私,而且从今天起,用户除了关闭装置之外,没有任何办法防止这种隐私攻击。我们提议使用RF-Veil,一种不仅能有力地防止冒用攻击的辐射鉴别方法,而且还能通过混淆非合法接收器发射机的辐射鉴别指纹来保护用户隐私。具体地说,我们对传送信号的阶段错误采用随机模式,只有预定的接收者才能提取发射机的原始指纹。在一系列试验和分析中,我们暴露了采用天真随机随机随机随机攻击的脆弱性,并且引入了反措施。最后,我们通过实验性地展示了我们所提议的安全性装置的效能。