We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and uses the same inexpensive chips. For mission-critical systems relying on 802.15.4 devices, defense-in-depth is thus necessary. Device fingerprinting has long been an important defensive tool; reducing its cost raises its utility for defenders. We investigate new methods of fingerprinting 802.15.4 devices by exploring techniques to differentiate between m...
This research was performed to expand AFIT\u27s Radio Frequency Distinct Native Attribute (RF-DNA) f...
ZigBee networks are increasingly popular for use in medical, industrial, and other applications. Tra...
The design and application of novel physical-layer security techniques have been increasing in the l...
Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected b...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
The ZigBee specification provides a niche capability, extending the IEEE 802.15.4 standard to provid...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
We discriminate between different SiLabs IEEE 802.15.4 2.4GHz RF sources using the Ettus Labs USRP1 ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
This thesis explores methods and techniques for surveying 802.15.4 and ZigBee wireless networks. The...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace I...
This research was performed to expand AFIT\u27s Radio Frequency Distinct Native Attribute (RF-DNA) f...
ZigBee networks are increasingly popular for use in medical, industrial, and other applications. Tra...
The design and application of novel physical-layer security techniques have been increasing in the l...
Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected b...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
The ZigBee specification provides a niche capability, extending the IEEE 802.15.4 standard to provid...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
The research presented in this thesis provides the reader with a set of algorithms and techniques th...
We discriminate between different SiLabs IEEE 802.15.4 2.4GHz RF sources using the Ettus Labs USRP1 ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
This thesis explores methods and techniques for surveying 802.15.4 and ZigBee wireless networks. The...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace I...
This research was performed to expand AFIT\u27s Radio Frequency Distinct Native Attribute (RF-DNA) f...
ZigBee networks are increasingly popular for use in medical, industrial, and other applications. Tra...
The design and application of novel physical-layer security techniques have been increasing in the l...