Abstract

The technical transformation and transfer of most services to digital platforms require that everyone has an electronic device connected to the Internet to assist them accomplish their tasks. Smartphones are one of the best options for everyone because of their small size and ease of transport, in addition to their high capabilities equivalent to a personal computer. It is necessary to identify these devices, usually by checking their IMEI (International Mobile Equipment Identity), to provide and manage several services like the cellular network service. On the other hand, criminals and counterfeiters can manipulate this identity to hide the device and prevent it from being tracked or to make high profits from selling substandard devices. Therefore, several recent proposals have emerged to create a strong fingerprint for use in device identification purposes. This paper reviews and discusses the existing methods to generate a device identity and defines their gaps. Also, it classifies the methods into four categories based on the used technique, namely PUF, machine learning, comparison approach, and sensor calibration. Additionally, it introduces the factors to consider when choosing the technique of device identification. It provides a list of possible attacks on each technology used in device identification methods.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call