Identification of mobile devices by the characteristics of the spectra and their signals
DOI:
https://doi.org/10.30837/rt.2020.2.201.07Keywords:
security, Wi-Fi, identification, spectrum, mobile deviceAbstract
Previously, the authors suggested that each range of Wi-Fi devices is as unique as a fingerprint. This paper presents the results of an experimental verification of the assumption. Several devices were tested in different positions relative to the measuring antenna of the Signal Hound USB-SA44B spectrum analyzer. The similarity of the spectra of Wi-Fi signals of the same device in different positions and the significant differences in the emission spectra of different devices, which can be used to identify them, are established. The range of mean squares of the differences in the spectral counts is established, which can correspond to the same device in different positions and to different devices. The difference value is less than 1.5 dB, then this is definitely the same device. If the difference is greater than 2.8 dB, then it is obvious that these are different devices. The range of 1.5 ... 2.8 dB represents an area of uncertainty – such differences can relate to the same device or to different ones. The effect of temperature was also investigated. Spectra of the same smartphone at room temperature and at a temperature of +5 0C without correction for frequency shift. Then, to take into account the frequency shift, a correction was made that allowed “shifting” the spectrum of the cooled device to its original state. Lowering the temperature leads not only to a shift in the average frequency of the spectrum, but also to a change in its shape. The results of experimental studies on measuring the spectrum of mobile devices indicate the applicability of this method for identifying mobile devices, which will qualitatively complement the existing security model, reducing the risks of unauthorized actions.References
Котов В. Д., Васильев В. И. Современное состояние проблемы обнаружения сетевых вторжений // Вестник Уфимского государственного авиационного технического университета. 2012. Т. 16, № 3 (48). С. 198–204.
Лось А. Б., Даниелян Ю. Ю. Сравнительный анализ систем обнаружения вторжений, представленных на отечественном рынке // Вестник Московского финансово-юридического университета. 2014. С. 181–187.
KRACK: ваш Wi-Fi больше не безопасен // Kaspersky daily. URL: https://www.kaspersky.ru/blog/krackattack/19022/
Антипов И. Е., Ященко Т. А., Насиф Н. Т. Применение нечеткой логики для повышения безопасности беспроводных сетей на базе технологии Wi-Fi // Радиотехника. 2011. № 165. С. 103–106.
Антипов И. Е., Василенко Т. А. Усовершенствование модели принятия решений об аномальном состоянии сети системой позиционирования // Восточно-европейский журнал передовых технологий. 2019. № 1/9 (97). С.6
Герус А. В., Савченко Е. В., Саворский В. П. Алгоритм распознавания акустических, оптических, электрических сигналов от слабых источников в присутствии известного фона // Журнал радиоэлектроники. 2017. №11. С. 1–13.
Кукуш В.Д. Совершенствование метеорной радиотехнической системы мониторинга динамических параметров атмосферы Земли по сигналам телевизионного вещания : дис. … канд. техн. наук. Харьков, 2012. 165 с.
Современные беспроводные сети: состояние и перспективы развития / И.А. Гепко, В.Ф. Олейник, Ю.Д. Чайка, А.В. Бондаренко. Киев : ЕКМО, 2009. 672 с.
Signal Hound USB-SA44B.Версия 2.11А .Инструкция пользователя. Test Equipment Plus, 2010. 39 с.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).