Correlating GSM and 802.11 Hardware Identifiers
MetadataShow full item record
The hardware identifiers of common wireless protocols can be exploited by adversaries for both tracking and physical device association. Rather than examining hardware identifiers in isolation, we observe that many modern devices are equipped with multiple wireless interfaces of different physical types, e.g. GSM and 802.11, suggesting that there exists utility in cross-protocol hardware identifier correlation. This research empirically examines the feasibility of such cross-protocol association, concentrating on correlating a GSM hardware identifier to that of the 802.11 hardware identifier on the same device. Our dataset includes 18 distinct mobile devices, with identifiers collected over time at disparate locations. We develop correlation techniques from the perspective of two adversaries: i) limited, able to observe identifiers only in time and space; and ii) a more advanced adversary with visibility into the data stream of each protocol. We first test correlation via temporal and spatial analysis using only basic signal collection, mimicking an RF collection with no decryption or data processing capability. Using a constrained optimization algorithm over temporal and spatial data to perform matching, we demonstrate increasing association accuracy over time, up to 80% in our experiments. Our second approach simulates the added capability to collect, decrypt, and reconstruct specific application protocol data, and parses the data of one protocol using search terms derived from the other. With the combined techniques, we achieve 100% accuracy and precision.
Proceedings of the Military Communications Conference (MILCOM 2013), San Diego, CA, November 2013.Refereed Article
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Unalmis, Bugra. (2001-03);Current architectures typically focus on the software-based protection mechanisms rather than hardware for providing protection. In fact, hardware security mechanisms can be critical for the construction of a secure system. ...
Rye, Erik C.; Martin, Jeremy; Beverly, Robert ;This position paper considers the privacy and security implications of EUI-64-based IPv6 addresses. By encoding MAC addresses, EUI-64 addresses violate layers by exposing hardware identifiers in IPv6 addresses. The ...
Phoenix autonomous underwater vehicle (AUV): networked control of multiple analog and digital devices using LonTalk Young, Forrest C (Monterey, California. Naval Postgraduate School, 1997-12);The purpose of this thesis is to simplify analog and digital device control inside the Phoenix autonomous underwater vehicle (AUV). Phoenix is required to process many data information streams associated with a variety of ...