Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting

Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon


Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate devices. We propose Diversity, a cooperative fingerprinting approach that improves accuracy of existing fingerprinting methods while relying only on off-the-shelf hardware. Diversity improves fingerprinting up to the reliable individual identification of identical 802.11 devices. This approach modifies the signature of devices by modifying slightly their traffic attributes. We evaluate Diversity with both a simulation and an implementation, achieving a false positive rate of 0% with a dataset including identical devices. Finally, we complement Diversity by mechanisms for detecting attackers that try to forge signatures.


  1. Ahmad, M. S. and Tadakamadla, S. (2011). Short Paper: Security Evaluation of IEEE 802.11w Specification. In WiSec'11, pages 53-58.
  2. Arackaparambil, C., Bratus, S., Shubina, A., and Kotz, D. (2010). On the reliability of wireless fingerprinting using clock skews. In WiSec'10.
  3. Bellardo, J. and Savage, S. (2003). 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX Security Symposium.
  4. Bratus, S., Cornelius, C., Kotz, D., and Peebles, D. (2008). Active behavioral fingerprinting of wireless devices. In WiSec'08.
  5. Brik, V., Banerjee, S., Gruteser, M., and Oh, S. (2008). Wireless device identification with radiometric signatures. In MobiCom'08.
  6. Cache, J. (2006). Fingerprinting 802.11 implementations via statistical analysis of the duration field. Uninformed. org, 5.
  7. Castelluccia, C. and Mutaf, P. (2005). Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys'05.
  8. Danev, B., Luecken, H., Capkun, S., and El Defrawy, K. (2010). Attacks on physical-layer identification. In WiSec'10.
  9. Desmond, L. C. C., Yuan, C. C., Pheng, T. C., and Lee, R. S. (2008). Identifying unique devices through wireless fingerprinting. In WiSec'08.
  10. Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J. V., and Sicker, D. (2006). Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX Security Symposium.
  11. Gruteser, M. and Grunwald, D. (2005). Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. Mobile Networks and Applications, 10(3):315-325.
  12. Haeberlen, A., Flannery, E., Ladd, A. M., Rudys, A., Wallach, D. S., and Kavraki, L. E. (2004). Practical robust localization over large-scale 802.11 wireless networks. In MobiCom'04.
  13. Hall, J., Barbeau, M., and Kranakis, E. (2004). Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Conference on Communication, Internet and Information Technology.
  14. IEEE (1997). IEEE Std 802.11-1997 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
  15. Jana, S. and Kasera, S. K. (2008). On fast and accurate detection of unauthorized wireless access points using clock skews. In MobiCom'08.
  16. Neumann, C., Heen, O., and Onno, S. (2012). An empirical study of passive 802.11 device fingerprinting. In IEEE ICDCS Workshop on Network Forensics, Security and Privacy.
  17. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. (2007). 802.11 user fingerprinting. In MobiCom'07.
  18. Prigent, G., Vichot, F., and Harrouet, F. (2010). Ipmorph: Fingerprinting spoofing unification. Journal in computer virology, 6(4):329-342.
  19. Zeng, K., Govindan, K., and Mohapatra, P. (2010). Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications Magazine, 17(5):56-62.

Paper Citation

in Harvard Style

Maurice C., Onno S., Neumann C., Heen O. and Francillon A. (2013). Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 379-386. DOI: 10.5220/0004529103790386

in Bibtex Style

author={Clémentine Maurice and Stéphane Onno and Christoph Neumann and Olivier Heen and Aurélien Francillon},
title={Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},

in EndNote Style

JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
SN - 978-989-8565-73-0
AU - Maurice C.
AU - Onno S.
AU - Neumann C.
AU - Heen O.
AU - Francillon A.
PY - 2013
SP - 379
EP - 386
DO - 10.5220/0004529103790386