About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Communications and Networking. 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18–19, 2023, Proceedings

Research Article

Cryptographic Fingerprinting for Network Devices Based on Triplet Network and Fuzzy Extractors

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-67162-3_27,
        author={Longjiang Li and Yajie Kang and Yukun Liang and Xutong Liu and Yonggang Li},
        title={Cryptographic Fingerprinting for Network Devices Based on Triplet Network and Fuzzy Extractors},
        proceedings={Communications and Networking. 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18--19, 2023, Proceedings},
        proceedings_a={CHINACOM},
        year={2024},
        month={8},
        keywords={Device fingerprinting Fuzzy extractor Hamming space Gray code Impersonation attack},
        doi={10.1007/978-3-031-67162-3_27}
    }
    
  • Longjiang Li
    Yajie Kang
    Yukun Liang
    Xutong Liu
    Yonggang Li
    Year: 2024
    Cryptographic Fingerprinting for Network Devices Based on Triplet Network and Fuzzy Extractors
    CHINACOM
    Springer
    DOI: 10.1007/978-3-031-67162-3_27
Longjiang Li1,*, Yajie Kang1, Yukun Liang1, Xutong Liu1, Yonggang Li2
  • 1: SICE, University of Electronic Science and Technology of China, Chengdu
  • 2: School of Information and Communication Engineering, Chongqing University of Posts and Telecommunications
*Contact email: longjiangli@uestc.edu.cn

Abstract

Device fingerprinting is a key technology in cybersecurity, which enables organizations to identify potential vulnerabilities, gain valuable insights into their network infrastructure, and enhance overall defense mechanisms. However, the complexity and dynamics of cyberspace make it extremely challenging to generate unique, robust, and tamper-resistant device fingerprints. In this paper, we propose a cryptographic device fingerprinting framework for network devices, which utilizes triplet network to cluster the feature information of data samples into embeddings, and then apply fuzzy extractors to generate a cryptographic fingerprint for each device based on the feature information in each cluster. In order to overcome the discontinuity of embeddings in Hamming space output by triples networks, which degrades the robustness of fingerprints, we use gray code to transform embeddings before applying fuzzy extractors. The experimental results show that the method proposed can obtain unique and robust fingerprint encoding for the same type of device in noisy environments, and supports incremental fingerprint encoding for newly added devices through a small number of sample learning. The experimental results show that the classification accuracy reaches 99.99%, and the histogram of generated fingerprints conform to the Gaussian distribution, which reflects the excellent cryptographic characteristics.

Keywords
Device fingerprinting Fuzzy extractor Hamming space Gray code Impersonation attack
Published
2024-08-06
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-67162-3_27
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL