SlideShare a Scribd company logo
1 of 13
Download to read offline
2018
ELECO
Zulfidin Khodzhaev1
, Cem Ayyıldız2
, Güneş Karabulut Kurt1
Istanbul Technical University1
, Giga OHM2
Device Fingerprinting
for Authentication
➢ What is device fingerprinting ?
It is a technique that is used to identify and
authenticate a device
➢ Methods used in device fingerprinting ?
Internal - imperfections of built-in components of the
device
External - radio frequency (RF) emissions of the device
➢ Preferred method in our research ?
Transmission control protocol - reliable in precision
which is intrinsic for device functionality has unique
characteristics for every device
Introduction
1
Research
Question
How to identify
a device ?
2
Samsung
Why is it
Important ?
3
Tracking Security
➢ Using internal components exploit
the Internet Control Message
➢ Protocol (ICMP) timestamp-based
fingerprinting to identify mobile
phones over a WLAN
4
❏ M. Cristea and B. Groza, “Fingerprinting
smartphones remotely via ICMP
timestamps,” IEEE Communications Letters,
vol. 17, no. 6, pp. 1081–1083, 2013.
Related
Research
➢ Device manipulation to send and receive data
over TCP
➢ Identification of channel of the Wi-Fi network
and tuning the center of frequency
➢ Averaging samples and reducing peak to peak
noise
➢ Visualizing obtained data and finding relative
classification techniques
➢ Classification of signals results in
identification and authentication of a device
Methodology
Network
Device
Spectrum
Analyzer
Data
Classifier
Device2Device1
5
➢ Calculation of distance between
neighboring instances
➢ The training data - to make a
prediction
➢ Testing data - to assess predictions
made
➢ Calculation of distance between
trained data and testing data
➢ Data is classified into a group in
which the distance is the shortest
Technique
6
Data
Instance1
Training
Instance2 Instance3
Other
Instances
Testing
Distance
Device1 Device2
7
Formulation
iPhone 7 Xiaomi Mi A1 7
Test setup
Jetson TX2
iPhone 7 Xiaomi Mi A1
NI PXIe-1082
8
Result and
Discussion
Iphone 7 Xiaomi Mi A1 7
9
K=3 100% 56%
K=4 100% 56%
K=5 100% 64%
➢ Importance of nearest instances
➢ Results for mobile devices seem to
be promising
➢ More advanced classification
techniques needed
➢ Different devices should be tested
➢ Electronic devices are part of our
society and they should be as secure
as possible
➢ DSL and ADSL modems
10
Conclusion
and future
research
11
Reference
➢ G. Baldini and G. Steri, “Survey of techniques for the identification of mobile using the physical fingerprints of the
built-in components,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1761–1789, 2017.
➢ B. D. Fulcher and N. S. Jones, “Highly comparative feature-based time-series classification,” IEEE Transactions on
Knowledge and Data Engineering, vol. 26, no. 12, pp. 3026–3037, 2014.
➢ J. E. V. Ferreira, C. H. S. da Costa, R. M. de Miranda, and A. F. de Figueiredo, “The use of the k nearest neighbor method
to classify the representative elements,” Educación Química, vol. 26, no. 3, pp. 195 – 201, 2015. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0187893X15000312
➢ P. Mulak and N. Talhar, “Analysis of distance measures using k-nearest neighbor algorithm on kdd dataset,”
International Journal of Science and Research, vol. 4, no. 7, pp. 2101–2104, 2015.
➢ T. Kohno, A. Broido, and K. C. Claffy, “Remote physical device fingerprinting,” IEEE Transactions on Dependable and
Secure Computing, vol. 2, no. 2, pp. 93–108, 2005.
➢ M. Cristea and B. Groza, “Fingerprinting smartphones remotely via ICMP timestamps,” IEEE Communications Letters,
vol. 17, no. 6, pp. 1081–1083, 2013.
Dinlediğiniz için teşekkürler.

More Related Content

What's hot (20)

LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
5G Moblie Computing
5G Moblie Computing5G Moblie Computing
5G Moblie Computing
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to know
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
 
Overview of Low Power Wide Area Networks
Overview of Low Power Wide Area NetworksOverview of Low Power Wide Area Networks
Overview of Low Power Wide Area Networks
 
Bluetooth - Overview
Bluetooth - OverviewBluetooth - Overview
Bluetooth - Overview
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
GPRS
GPRSGPRS
GPRS
 
D2D Communication in 5G
D2D Communication in 5GD2D Communication in 5G
D2D Communication in 5G
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
5G 2
5G 25G 2
5G 2
 
Device to device communication
Device to device communicationDevice to device communication
Device to device communication
 
5G NETWORK
5G NETWORK5G NETWORK
5G NETWORK
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
Zigbee technolgy
Zigbee technolgy Zigbee technolgy
Zigbee technolgy
 
Generation of mobile
Generation of mobileGeneration of mobile
Generation of mobile
 
Mw&oc manual
Mw&oc manualMw&oc manual
Mw&oc manual
 

Similar to Device Fingerprinting for Authentication

Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone dataINFOGAIN PUBLICATION
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) pptAhibaPathan
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
 
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Vehicular Delay Tolerant Network (VDTN):Routing PerspectivesVehicular Delay Tolerant Network (VDTN):Routing Perspectives
Vehicular Delay Tolerant Network (VDTN): Routing PerspectivesSyed Hassan Ahmed
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
 
MD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptxMD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptxssuser480912
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Syed Hassan Ahmed
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abledArvindKumar1806
 

Similar to Device Fingerprinting for Authentication (20)

Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
IoT_Introduction.pdf
IoT_Introduction.pdfIoT_Introduction.pdf
IoT_Introduction.pdf
 
digital forensic examination of mobile phone data
digital forensic examination of mobile phone datadigital forensic examination of mobile phone data
digital forensic examination of mobile phone data
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) ppt
 
Android Based Home Automation
Android Based Home AutomationAndroid Based Home Automation
Android Based Home Automation
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
 
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
Vehicular Delay Tolerant Network (VDTN):Routing PerspectivesVehicular Delay Tolerant Network (VDTN):Routing Perspectives
Vehicular Delay Tolerant Network (VDTN): Routing Perspectives
 
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptxSMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
 
shirsha
shirshashirsha
shirsha
 
MD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptxMD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptx
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abled
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Device Fingerprinting for Authentication

  • 1. 2018 ELECO Zulfidin Khodzhaev1 , Cem Ayyıldız2 , Güneş Karabulut Kurt1 Istanbul Technical University1 , Giga OHM2 Device Fingerprinting for Authentication
  • 2. ➢ What is device fingerprinting ? It is a technique that is used to identify and authenticate a device ➢ Methods used in device fingerprinting ? Internal - imperfections of built-in components of the device External - radio frequency (RF) emissions of the device ➢ Preferred method in our research ? Transmission control protocol - reliable in precision which is intrinsic for device functionality has unique characteristics for every device Introduction 1
  • 4. Why is it Important ? 3 Tracking Security
  • 5. ➢ Using internal components exploit the Internet Control Message ➢ Protocol (ICMP) timestamp-based fingerprinting to identify mobile phones over a WLAN 4 ❏ M. Cristea and B. Groza, “Fingerprinting smartphones remotely via ICMP timestamps,” IEEE Communications Letters, vol. 17, no. 6, pp. 1081–1083, 2013. Related Research
  • 6. ➢ Device manipulation to send and receive data over TCP ➢ Identification of channel of the Wi-Fi network and tuning the center of frequency ➢ Averaging samples and reducing peak to peak noise ➢ Visualizing obtained data and finding relative classification techniques ➢ Classification of signals results in identification and authentication of a device Methodology Network Device Spectrum Analyzer Data Classifier Device2Device1 5
  • 7. ➢ Calculation of distance between neighboring instances ➢ The training data - to make a prediction ➢ Testing data - to assess predictions made ➢ Calculation of distance between trained data and testing data ➢ Data is classified into a group in which the distance is the shortest Technique 6 Data Instance1 Training Instance2 Instance3 Other Instances Testing Distance Device1 Device2
  • 9. Test setup Jetson TX2 iPhone 7 Xiaomi Mi A1 NI PXIe-1082 8
  • 10. Result and Discussion Iphone 7 Xiaomi Mi A1 7 9 K=3 100% 56% K=4 100% 56% K=5 100% 64% ➢ Importance of nearest instances
  • 11. ➢ Results for mobile devices seem to be promising ➢ More advanced classification techniques needed ➢ Different devices should be tested ➢ Electronic devices are part of our society and they should be as secure as possible ➢ DSL and ADSL modems 10 Conclusion and future research
  • 12. 11 Reference ➢ G. Baldini and G. Steri, “Survey of techniques for the identification of mobile using the physical fingerprints of the built-in components,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1761–1789, 2017. ➢ B. D. Fulcher and N. S. Jones, “Highly comparative feature-based time-series classification,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 12, pp. 3026–3037, 2014. ➢ J. E. V. Ferreira, C. H. S. da Costa, R. M. de Miranda, and A. F. de Figueiredo, “The use of the k nearest neighbor method to classify the representative elements,” Educación Química, vol. 26, no. 3, pp. 195 – 201, 2015. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0187893X15000312 ➢ P. Mulak and N. Talhar, “Analysis of distance measures using k-nearest neighbor algorithm on kdd dataset,” International Journal of Science and Research, vol. 4, no. 7, pp. 2101–2104, 2015. ➢ T. Kohno, A. Broido, and K. C. Claffy, “Remote physical device fingerprinting,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93–108, 2005. ➢ M. Cristea and B. Groza, “Fingerprinting smartphones remotely via ICMP timestamps,” IEEE Communications Letters, vol. 17, no. 6, pp. 1081–1083, 2013.