A new security technique promises to uniquely identify any Wi-Fi device in the world, so hackers cannot hide behind a fake MAC address.Every wireless device has a unique signal “fingerprint” produced by variations produced in the manufacturing process for silicon components, according to Dr. Jeyanthi Hall, a post-graduate working at Carleton University in Ottawa.As a doctoral student, Hall analyzed the radio frequency signals of 15 devices from six manufacturers, and found it was possible to distinguish clearly, even between devices from the same manufacturer.Using “transceiverprints,” Hall got a detection rate of 95 percent, and a false positive rate of zero, according to a draft paper submitted to the IEEE Transactions on Dependable and Secure Computing. She achieved this reliability in the task of “recognizing” the transceiverprint from a prerecorded set—a job that could usefully be built into a wireless IDS, she says in the paper. Beyond this, things could get even more exciting: “It would be interesting to identify the correct transceiver (from the set of all profiled transceivers), using the same set of transceiverprints,” she says.Hall used a probabilistic neural network to work out the transceiverprint and compare it with stored prints. Although the signal processing equipment and analysis software is specialized at present, it could eventually be delivered on a more general-purpose signal processer system, Hall hopes, according to a report in Electronic Engineering Times. Limiting network access to specific devices using MACs has been a possible security technique for some time, and is included in many Wi-Fi systems. However, it has mostly been dismissed by security professionals, as it is easy to spoof the MAC address of a device. Comparing the MAC to a prerecorded transceiverprint would make an access control list based on devices feasible again.-Peter Judge, Techworld.com (London)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe