{"title":"基于网卡指纹的交换机接入控制技术","authors":"Kaiwen Sheng, Aiqun Hu, Sheng Li","doi":"10.1109/CSP58884.2023.00022","DOIUrl":null,"url":null,"abstract":"Almost all existing access control systems authenticate end users based on their digital characteristics, such as MAC addresses. Since digital features are easily forged, these access control systems cannot secure the network well. In this paper, we propose an access control technology based on Ethernet network interface controller (NIC) fingerprint, a physical characteristic, to achieve identity authentication. At the switch side, the physical layer signals from the terminal NIC are collected, and the fingerprint of the NIC is extracted from the physical layer signals using the least mean square error (LMS) adaptive filter. On the basis of MAC address authentication, the proxy mechanism of Remote Authentication Dial In User Service (RADIUS) protocol is adopted to add the NIC fingerprint in the password field of the RADIUS request message, which enables the authentication server to perform two-factor authentication based on the NIC fingerprint and MAC address. The experimental results showed that the recognition accuracy for 75 NICs is 96.6%. In this paper, an access control system was built using a switch, a signal collector, a proxy server and an authentication server to realize that the terminal user was allowed to access the network only when both the NIC fingerprint and the MAC address were legal, which verified the feasibility of the scheme.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"NIC Fingerprint-Based Switch Access Control Technology\",\"authors\":\"Kaiwen Sheng, Aiqun Hu, Sheng Li\",\"doi\":\"10.1109/CSP58884.2023.00022\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Almost all existing access control systems authenticate end users based on their digital characteristics, such as MAC addresses. Since digital features are easily forged, these access control systems cannot secure the network well. In this paper, we propose an access control technology based on Ethernet network interface controller (NIC) fingerprint, a physical characteristic, to achieve identity authentication. At the switch side, the physical layer signals from the terminal NIC are collected, and the fingerprint of the NIC is extracted from the physical layer signals using the least mean square error (LMS) adaptive filter. On the basis of MAC address authentication, the proxy mechanism of Remote Authentication Dial In User Service (RADIUS) protocol is adopted to add the NIC fingerprint in the password field of the RADIUS request message, which enables the authentication server to perform two-factor authentication based on the NIC fingerprint and MAC address. The experimental results showed that the recognition accuracy for 75 NICs is 96.6%. In this paper, an access control system was built using a switch, a signal collector, a proxy server and an authentication server to realize that the terminal user was allowed to access the network only when both the NIC fingerprint and the MAC address were legal, which verified the feasibility of the scheme.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00022\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
几乎所有现有的访问控制系统都基于终端用户的数字特征(如MAC地址)对其进行身份验证。由于数字特征很容易伪造,这些访问控制系统不能很好地保护网络。本文提出了一种基于以太网络接口控制器(NIC)指纹这一物理特性来实现身份认证的访问控制技术。在交换机侧,采集终端网卡的物理层信号,并使用最小均方误差(LMS)自适应滤波器从物理层信号中提取网卡的指纹。在MAC地址认证的基础上,采用RADIUS (Remote authentication Dial In User Service)协议的代理机制,在RADIUS请求消息的密码字段中添加网卡指纹,使认证服务器能够基于网卡指纹和MAC地址进行双因素认证。实验结果表明,75个nic的识别准确率为96.6%。本文采用交换机、信号采集器、代理服务器和认证服务器搭建了一个门禁系统,实现了终端用户只有在网卡指纹和MAC地址都合法的情况下才能接入网络,验证了方案的可行性。
NIC Fingerprint-Based Switch Access Control Technology
Almost all existing access control systems authenticate end users based on their digital characteristics, such as MAC addresses. Since digital features are easily forged, these access control systems cannot secure the network well. In this paper, we propose an access control technology based on Ethernet network interface controller (NIC) fingerprint, a physical characteristic, to achieve identity authentication. At the switch side, the physical layer signals from the terminal NIC are collected, and the fingerprint of the NIC is extracted from the physical layer signals using the least mean square error (LMS) adaptive filter. On the basis of MAC address authentication, the proxy mechanism of Remote Authentication Dial In User Service (RADIUS) protocol is adopted to add the NIC fingerprint in the password field of the RADIUS request message, which enables the authentication server to perform two-factor authentication based on the NIC fingerprint and MAC address. The experimental results showed that the recognition accuracy for 75 NICs is 96.6%. In this paper, an access control system was built using a switch, a signal collector, a proxy server and an authentication server to realize that the terminal user was allowed to access the network only when both the NIC fingerprint and the MAC address were legal, which verified the feasibility of the scheme.