Back to Search
Start Over
The identification of mobile phones through the fingerprints of their built-in magnetometer: an analysis of the portability of the fingerprints
- Source :
- ICCST, 2017 International Carnahan Conference on Security Technology (ICCST)
- Publication Year :
- 2017
- Publisher :
- Institute of Electrical and Electronics Engineers Inc., 2017.
-
Abstract
- The identification of mobile phones through their built-in electronic sensors has been proven in literature for cameras, microphones and accelerometers demonstrating to have various applications in security, forensics or in the fight against the counterfeiting of electronic products. The identification of a sensor (and consequently of the mobile phone) is possible through the exploitation of small but significant differences in the physical components of the sensor itself. These physical differences are mainly generated during the production process of the sensor in the manufacturing plant producing small but reproducible variations in the digital output generated by the built-in sensor. In particular, in this paper, we investigate the identification of mobile phones through the built-in magnetometer sensor, which has received very limited attention by the research community so far. In particular, the specific aspects of robustness and portability of such a fingerprint have been analyzed. Different stimulation conditions, diverse kinds of features and classification procedures have been considered achieving very promising results.
- Subjects :
- 021110 strategic, defence & security studies
Authentication
Computer science
Magnetometer
Feature extraction
Real-time computing
0211 other engineering and technologies
02 engineering and technology
Network layers
Accelerometer
law.invention
Rogue access
Software portability
Robustness (computer science)
law
Mobile phone
Research community
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
Subjects
Details
- Language :
- English
- ISBN :
- 978-1-5386-1585-0
- ISBNs :
- 9781538615850
- Database :
- OpenAIRE
- Journal :
- ICCST, 2017 International Carnahan Conference on Security Technology (ICCST)
- Accession number :
- edsair.doi.dedup.....c1e37aa61421c2d18be1eeb16bbf89b9