Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Wi-Fi Fingerprints -- the End of MAC Spoofing? 176

judgecorp writes, "Wireless devices can be identified by variations in their radio signaling, known as their 'transceiverprint,' according to research reported in Techworld. The Canadian researcher, Jeyanthi Hall, related the prints to MAC addresses and got a positive ID for devices connecting to a Wi-Fi network, claiming 95% success with no false positives. Once they work out how to do this without a dedicated signal analyzer and neural network processing, it's the end of MAC spoofing on wireless networks."
This discussion has been archived. No new comments can be posted.

Wi-Fi Fingerprints -- the End of MAC Spoofing?

Comments Filter:
  • by nweaver ( 113078 ) on Tuesday September 05, 2006 @01:34PM (#16046033) Homepage
    Cool hack, but who cares. With proper authentication (eg, WPA), you don't need to worry about MAC spoofing as the packets won't authenticate right to the access point.
  • Old Idea (Score:5, Interesting)

    by Detritus ( 11846 ) on Tuesday September 05, 2006 @01:42PM (#16046095) Homepage
    They were doing this during World War II, using the unique characteristics and variations of transmitters to "fingerprint" them. Similar things were done with the way radio operators send morse code to help detect spies that had been compromised.
  • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday September 05, 2006 @01:44PM (#16046120) Homepage Journal
    WiFi MAC spoofing will also remain useful on open unencrypted networks where it's not locked down by MAC, but you just don't want to be traceable.

    I think the whole point of this article is that will no longer be a valid method of protecting your identity since you might be identified by your "radio fingerprint" or "footprint" or wtfever.

  • by Anonymous Coward on Tuesday September 05, 2006 @01:53PM (#16046186)
    Wi-Fi fingerprinting is nothing new and we have tried the various techniques at our university but it simply does not work because the number of false positives is way too high for it to be practical and to be deployed in an environment with many users. We had support from one of the developers of the technology and after looking at the data and the floods of user complaints he even admitted that Wi-Fi fingerprinting is not practical and we had to give up on it.
  • by Bender0x7D1 ( 536254 ) on Tuesday September 05, 2006 @01:55PM (#16046199)
    You are forgetting the insider threat. I might have the WPA key because I am an employee with my own laptop. However, if I spoof your MAC, then it looks like you are the one surfing /. (or porn sites) all day and not me.

    Encryption is good, but it doesn't solve every security problem.
  • by llZENll ( 545605 ) on Tuesday September 05, 2006 @01:58PM (#16046235)
    Why would hackers not simply spoof the RF fingerprint. Some ideas come to mind. 1) dynamic adjust the outgoing signal digitally to imitate the fingerprint 2) add interference around the transmitter so the signal looks the same 3) use specialized analog electronics to imitate the fingerprint
  • by robertjw ( 728654 ) on Tuesday September 05, 2006 @02:15PM (#16046347) Homepage
    OK, but will the variation on the caps and resistors remain consistent over the life of the WiFi card? Will an allowance be made for ongoing variations in the signal? If so, will it be exploitable?
  • Nothing new (Score:2, Interesting)

    by Knightman ( 142928 ) on Tuesday September 05, 2006 @02:26PM (#16046415)
    This is really nothing new. A friend did something similair in the early 90's to catch a guy that was spoofing false calls on the police band.

    He had a very (VERY) expensive reciever that had a built in spectrum analyzer, and they logged all calls with a timestamp and the frequency drift (stored as a 512 bit word) of the transmitter currently using the channel. Each time the operator suspected that he/she had a spoofed call they pushed a button that activated 4 direction finders that logged the timestamp and the directions. After enough data was gathered it was compiled and a geographical pattern appeared. Most of the spots from where the spoofed calls had originated was at a apartment block. They dispatched a civilian cruiser to monitor the apartment block. They picked up the guy 2 days later outside his home when he was sitting in his car spoofing a call.

  • Seen it before (Score:5, Interesting)

    by tsotha ( 720379 ) on Tuesday September 05, 2006 @02:35PM (#16046478)
    The Canadian researcher, Jeyanthi Hall, related the prints to MAC addresses and got a positive ID for devices connecting to a Wi-Fi network, claiming 95% success with no false positives.
    I'm sure it works great in her lab, but here in the real world...

    I work for Big Cellphone Company. We tried the same scheme in the mid '90s when analog phone cloning was all the rage (remember when it used to cost $1.50/minute? Ahhhhh, the good old days). It works, kind of.

    The problem is you're not trying to decide whether or not to retry a packet, or what the transmit power should be. You're trying to decide whether or not to provide service, so you really can't afford to be wrong. We were never really able to get an acceptable reliablility in the wild.

    Believe me, we had a huge incentive to roll this out to our network. The marginal bandwidth costs from fraud didn't hurt much, but when someone made a call to, say, Saudi Arabia on a cloned phone we got stuck with all the fees on the other end. A single cloning ring could cost millions, so Big Cellphone Company was willing to break the bank to get this to work.

    Eventually we rolled out digital service, so the project got shut down. Cloning fraud was one of the reasons we were willing to give you a free phone if you switched over to digital. Well, that and the long-term contract.

  • If you RTFA, you would have seen that manufacturing variations yield differences even among the exact make and model -- e.g. that minor circuitry, amplifiers and antenna variations differences yield a unique signature.

    So, will this mean that if I buy a new antenna or break off my old antenna that my network will no longer recognize me?
    How much variation will it handle? When my antenna heats up will it still have the same signature?
  • by Ancient_Hacker ( 751168 ) on Tuesday September 05, 2006 @03:16PM (#16046770)
    waay back at the very start of real "Wireless" communication, the transmitters were these hefty spark-gaps, often modulated by a spinning set of electrodes. And back then most houses had DC power, and unsteady power at that.

    And each transmitter was hand-built, using rather rough tools.

    All these things ensured that each signal had it's own quirks, in time, frequency, and temperature. Radio ops could often identify transmitters by thepaerticular yawps, swooshes, and zaps of the signal. ot to mention, identifing the morse code operator by his particular "fist", i.e. spacing and other personal quirks.

    Then during WW2 our side started using spectrumanalyzers to categorize each model of German and Japanese radar. Here again each transmitter tended to have its own set of quirks.

    Now, surprise, the same thing gets rediscovered. On some low level each wireless card has some (shuddrr) analog controlled oscillators, frequency dividers, duplexers, antennas, and amplifiers, each with it's own slight amplitude, frequency, and phase characteristics.

    So nothing new here. Not by like, almost 100 years.

  • by smcavoy ( 114157 ) on Tuesday September 05, 2006 @03:28PM (#16046851)
    Why would you rely on such a silly system?
  • by igb ( 28052 ) on Tuesday September 05, 2006 @04:13PM (#16047160)
    As well as analysis of individuals' style of morse, fingerprinting of the characteristics of individual transmitters was done during WW2. By following both equipment and personnel around networks it provided additional data for traffic analysis, which is both useful in its own right and useful as a source of cribs. In the case of U boats, it offered the chance to follow individual U boats from HF/DF fix to fix. Ralph Erskine wrote about this in Cryptologia, January 1999.

    ian

  • by munpfazy ( 694689 ) on Tuesday September 05, 2006 @04:19PM (#16047214)
    Yup. Hams have been doing it for decades. (Well, most of us have just been talking about it - since actually doing it requires rather expensive gear and jammers troublesome enough to be worth the effort.) I can only imagine governments have been doing it for a lot longer than that.

    But jumping from its use as forensic tool to something which could be used for authentication / spoofing detection on cheap networking gear is far from trivial. It's hard to imagine most wifi users paying to add the necessary gear to their access points. No matter how wonderful your pattern matching algorithm maybe, you still need a sensitive front end and a very fast sample rate to get the data in the first place. It's hard to imagine a scenario where the hardware needed to identify tiny perturbations on a signal wouldn't be a lot more expensive than the hardware needed to detect the signal itself.

    Even as a forensic tool, the low cost of computer networking gear leaves an obvious out for savvy hackers: just load up on $5 wireless cards whenever you see them on sale, and throw each away after every successful use. It's a whole lot easier for most people to swap out networking hardware than to replace amateur radio transmitters. You could still use it to distinguish in real time between a particular legitimate user and an outsider, but that doesn't buy you very much unless it's cheap and robust enough to leave running at all times on every access point.

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...