Cargando…

Probe Request Based Device Identification Attack and Defense

Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi...

Descripción completa

Detalles Bibliográficos
Autores principales: Gu, Xiaolin, Wu, Wenjia, Gu, Xiaodan, Ling, Zhen, Yang, Ming, Song, Aibo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472341/
https://www.ncbi.nlm.nih.gov/pubmed/32824509
http://dx.doi.org/10.3390/s20164620
_version_ 1783578966362161152
author Gu, Xiaolin
Wu, Wenjia
Gu, Xiaodan
Ling, Zhen
Yang, Ming
Song, Aibo
author_facet Gu, Xiaolin
Wu, Wenjia
Gu, Xiaodan
Ling, Zhen
Yang, Ming
Song, Aibo
author_sort Gu, Xiaolin
collection PubMed
description Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Here, a detailed analysis on the effectiveness of 802.11ac fields is given and a novel device identification method based on deep learning whose average f1-score exceeds 99% is presented. With a purpose of preventing attackers from obtaining relevant information by the device identification method above, we design a novel defense mechanism based on stream cipher. In that case, the original content of probe request frame is hidden by encrypting probe request frames and construction of probe request is reserved to avoid the finding of attackers. This defense mechanism can effectively reduce the performance of the proposed device identification method whose average f1-score is below 30%. In general, our research on attack and defense mechanism can preserve device privacy better.
format Online
Article
Text
id pubmed-7472341
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-74723412020-09-04 Probe Request Based Device Identification Attack and Defense Gu, Xiaolin Wu, Wenjia Gu, Xiaodan Ling, Zhen Yang, Ming Song, Aibo Sensors (Basel) Article Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Here, a detailed analysis on the effectiveness of 802.11ac fields is given and a novel device identification method based on deep learning whose average f1-score exceeds 99% is presented. With a purpose of preventing attackers from obtaining relevant information by the device identification method above, we design a novel defense mechanism based on stream cipher. In that case, the original content of probe request frame is hidden by encrypting probe request frames and construction of probe request is reserved to avoid the finding of attackers. This defense mechanism can effectively reduce the performance of the proposed device identification method whose average f1-score is below 30%. In general, our research on attack and defense mechanism can preserve device privacy better. MDPI 2020-08-17 /pmc/articles/PMC7472341/ /pubmed/32824509 http://dx.doi.org/10.3390/s20164620 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Gu, Xiaolin
Wu, Wenjia
Gu, Xiaodan
Ling, Zhen
Yang, Ming
Song, Aibo
Probe Request Based Device Identification Attack and Defense
title Probe Request Based Device Identification Attack and Defense
title_full Probe Request Based Device Identification Attack and Defense
title_fullStr Probe Request Based Device Identification Attack and Defense
title_full_unstemmed Probe Request Based Device Identification Attack and Defense
title_short Probe Request Based Device Identification Attack and Defense
title_sort probe request based device identification attack and defense
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472341/
https://www.ncbi.nlm.nih.gov/pubmed/32824509
http://dx.doi.org/10.3390/s20164620
work_keys_str_mv AT guxiaolin proberequestbaseddeviceidentificationattackanddefense
AT wuwenjia proberequestbaseddeviceidentificationattackanddefense
AT guxiaodan proberequestbaseddeviceidentificationattackanddefense
AT lingzhen proberequestbaseddeviceidentificationattackanddefense
AT yangming proberequestbaseddeviceidentificationattackanddefense
AT songaibo proberequestbaseddeviceidentificationattackanddefense