Technology

PIONEERING NEW FORMS OF AUTHENTICATION FOR
WIRELESS DEVICES

LEVL is the first company in the world to take a full-stack approach to wireless security. While most existing solutions focus on securing one or maybe two layers of the communication stack, LEVL believes that the only way to provide holistic wireless intelligence is to analyze all layers at once, and thus, our full-stack approach. With this approach, we are able to solve security vulnerabilities that were unsolved previously. One of the key differentiators of this approach is that it even provides security in the physical layer of communication, something that has not been possible previously. To do this LEVL takes advantage of a technique called “radio fingerprinting”, a sophisticated approach until now in use only by military and intelligence agencies.

PHYSICAL IDENTITY AND DIGITAL IDENTITY - TWO FACES OF THE SAME COIN

LEVL uses both physical layer intelligence as well as digital layer intelligence to shed light on a device’s true identity and purpose.

Radio Fingerprinting provides physical layer intelligence about wireless devices including device type, components, behaviors, and even unique identity, all by just observing existing waveforms from wireless devices. This technique relies on the fact that the physical attributes of every wireless device (its hardware build) result in a unique wireless behavior that can be modeled and used to obtain intelligence on that device. The modeling is done by using a set of features that can be passively retrieved, a set which is commonly referred to as a device’s “radio fingerprint”. Thanks to advancements in machine learning and recent embedded software trends such as software-defined-radios, LEVL is able to bring this technology to the civilian mass market.

Every radio signal has a unique set of features when it transmits wireless signals, A.K.A. a device’s “radio fingerprint”

Combining many such features yields intelligence on a device’s true identity and its purpose

We model over 20 of these features to achieve an accuracy better than existing human voice recognition technology

On the other hand, using Deep Packet Inspection LEVL is able to provide digital layer intelligence on wireless devices and build a digital profile for every device. This digital profiling technology inspects the communication headers in different layers of the stack to learn a device’s communication patterns such as services a device frequently uses, ports used by it, and how it communicates with the outside world to create a unique digital signature for every device. This technology, however, does not inspect the data transmitted in order to protect the privacy of users.

LEVL’s patented solution combines the physical layer intelligence with that of digital layers to provide unprecedented visibility and security which was not possible previously.

PHYSICAL IDENTITY AND DIGITAL IDENTITY - TWO FACES OF THE SAME COIN

There are two primary components of the LEVL Platform, the LEVL Wireless Intelligence Cloud and LEVL Plug-ins. Once connected to LEVL’s cloud, each wireless access point or hub receives the capability to collect intelligence on all connected devices.

LEVL Plug-ins are typically embedded on partner host hardware such as in an automobile’s electronic systems, a Wi-Fi router, or a Smart Lock as examples. These are all connected to LEVL’s Wireless Intelligence Cloud which is where the machine learning core and the device profiling technology runs. Running an AI approach LEVL’s cloud is able to provide Wireless intelligence to all connected devices. This infrastructure also makes sure that all LEVL enabled hubs are up-to-date with the latest firmware updates.

NO HARDWARE,
NO AGENTS,
SIMPLE

LEVL requires no hardware or agent on devices. Embedded software is placed in the form of Plug-Ins only on wireless access points or hubs that process device discovery, identification, and classification in connection with the Wireless Intelligence Cloud. When a wireless device is first provisioned/detected, the profiling process can take about one minute. Once this process is completed, when the device attempts to access a resource requiring authentication, the verification process is a passive one and takes only 1-2 seconds to complete.

LEVL’S SECOND FACTOR
of AUTHENTICATION

One of the by-products of LEVL’s full-stack approach is that it provides a second factor of authentication at the hardware level to complement digital credentials such as a username and password or a certificate exchange. But what is unique are two things: 1. The second-factor authentication is totally transparent to the user and, 2. This second factor is nearly impossible to spoof or to brute force.

In fact, this platform is the first-ever two-factor authentication (2FA) service for device-to-device communications.

LEVL ELIMINATES DOZENS OF WIRELESS DEVICE ATTACK OPPORTUNITIES

With the hardware authenticated in addition to digital credentials, LEVL eliminates dozens of types of cyberattacks. Below is a sample of the vulnerabilities that are eliminated with the employment of LEVL:

Digital attacks

including credential theft via Phishing, device spoofing, and impersonation are stopped with LEVL.

Physical layer attacks

including rogue devices, wireless man-in-the-middle, relay and replay attacks are not possible when LEVL authenticates the underlying hardware being utilized.

Component exploitations of Hardware / Firmware / APIs

These are the exploitation of vulnerabilities in the underlying components of the chipset. Many times these are outside of the control of the OEM. Many of these can be patched if OEMs are aware of the flaws, and even then the patching process usually takes months to complete. Many other exploits cannot be patched and vary in nature. LEVL’s second-factor authentication will stop many of these component exploitations.