{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:13:23Z","timestamp":1773926003915,"version":"3.50.1"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T00:00:00Z","timestamp":1491436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>We investigate the identification of mobile phones through their built-in magnetometers. These electronic components have started to be widely deployed in mass market phones in recent years, and they can be exploited to uniquely identify mobile phones due their physical differences, which appear in the digital output generated by them. This is similar to approaches reported in the literature for other components of the mobile phone, including the digital camera, the microphones or their RF transmission components. In this paper, the identification is performed through an inexpensive device made up of a platform that rotates the mobile phone under test and a fixed magnet positioned on the edge of the rotating platform. When the mobile phone passes in front of the fixed magnet, the built-in magnetometer is stimulated, and its digital output is recorded and analyzed. For each mobile phone, the experiment is repeated over six different days to ensure consistency in the results. A total of 10 phones of different brands and models or of the same model were used in our experiment. The digital output from the magnetometers is synchronized and correlated, and statistical features are extracted to generate a fingerprint of the built-in magnetometer and, consequently, of the mobile phone. A SVM machine learning algorithm is used to classify the mobile phones on the basis of the extracted statistical features. Our results show that inter-model classification (i.e., different models and brands classification) is possible with great accuracy, but intra-model (i.e., phones with different serial numbers and same model) classification is more challenging, the resulting accuracy being just slightly above random choice.<\/jats:p>","DOI":"10.3390\/s17040783","type":"journal-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T04:23:30Z","timestamp":1491452610000},"page":"783","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4830-1227","authenticated-orcid":false,"given":"Gianmarco","family":"Baldini","sequence":"first","affiliation":[{"name":"European Commission, Joint Research Centre, Ispra 21027, Italy"},{"name":"DiSTA, University of Insubria, Varese 21100, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2580-7786","authenticated-orcid":false,"given":"Franc","family":"Dimc","sequence":"additional","affiliation":[{"name":"Faculty of Maritime Studies and Transport, University of Ljubljana, Portoro\u017e 6320, Slovenia"}]},{"given":"Roman","family":"Kamnik","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering, University of Ljubljana, Ljubljana SI 1000, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-1771","authenticated-orcid":false,"given":"Gary","family":"Steri","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre, Ispra 21027, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4997-0919","authenticated-orcid":false,"given":"Raimondo","family":"Giuliani","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre, Ispra 21027, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1551-2167","authenticated-orcid":false,"given":"Claudio","family":"Gentile","sequence":"additional","affiliation":[{"name":"DiSTA, University of Insubria, Varese 21100, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2017,4,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","article-title":"Digital camera identification from sensor pattern noise","volume":"1","author":"Lukas","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MWC.2015.7368831","article-title":"Remote fingerprinting of mobile phones","volume":"22","author":"Khanna","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1109\/TIFS.2016.2520908","article-title":"Specific Emitter Identification via Hilbert-Huang Transform in Single-Hop and Relaying Scenarios","volume":"11","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Buchholz, R., Kraetzer, C., and Dittmann, J. (2009). Microphone classification using Fourier coefficients. Information Hiding, Springer.","DOI":"10.1007\/978-3-642-04431-1_17"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/TIFS.2011.2178403","article-title":"Recognition of Brand and Models of Cell-Phones From Recorded Speech Signals","volume":"7","author":"Hanilci","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Baldini, G., Steri, G., Dimc, F., Giuliani, R., and Kamnik, R. (2016). Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS). Sensors, 16.","DOI":"10.3390\/s16060818"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Van Goethem, T., Scheepers, W., Preuveneers, D., and Joosen, W. (2016). Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. Engineering Secure Software and Systems, Springer.","DOI":"10.1007\/978-3-319-30806-7_7"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/TMTT.2010.2095030","article-title":"RF Fingerprinting Physical Objects for Anticounterfeiting Applications","volume":"59","author":"Lakafosis","year":"2011","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Williams, M.D., Munns, S.A., Temple, M.A., and Mendenhall, M.J. (2010, January 1\u20133). RF-DNA Fingerprinting for Airport WiMax Communications Security. Proceedings of the 2010 4th International Conference on Network and System Security (NSS), Victoria, Australia.","DOI":"10.1109\/NSS.2010.21"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Dubendorfer, C.K., Ramsey, B.W., and Temple, M.A. (November, January 29). An RF-DNA verification process for ZigBee networks. Proceedings of the Military Communications Conference (2012-MILCOM), Orlando, FL, USA.","DOI":"10.1109\/MILCOM.2012.6415804"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Suski, W.C., Temple, M.A., Mendenhall, M.J., and Mills, R.F. (December, January 30). Using spectral fingerprints to improve wireless network security. Proceedings of the 2008 IEEE Global Telecommunications Conference (IEEE GLOBECOM 2008), New Orleans, LA, USA.","DOI":"10.1109\/GLOCOM.2008.ECP.421"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1504\/IJESDF.2010.032330","article-title":"Improved wireless security for GMSK-based devices using RF fingerprinting","volume":"3","author":"Reising","year":"2010","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_13","unstructured":"Lanh, T.V., Chong, K.S., Emmanuel, S., and Kankanhalli, M.S. (2007, January 2\u20135). A Survey on Digital Camera Image Forensic Methods. Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Aggarwal, R., Singh, S., Roul, A.K., and Khanna, N. (2014, January 10\u201312). Cellphone identification using noise estimates from recorded audio. Proceedings of the 2014 International Conference on Communications and Signal Processing (ICCSP), Bangkok, Thailand.","DOI":"10.1109\/ICCSP.2014.6950045"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Garcia-Romero, D., and Espy-Wilson, C.Y. (2010, January 14\u201319). Automatic acquisition device identification from speech recordings. Proceedings of the 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, TX, USA.","DOI":"10.1109\/ICASSP.2010.5495407"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1049\/iet-bmt.2013.0056","article-title":"Source phone identification using sketches of features","volume":"3","author":"Kotropoulos","year":"2014","journal-title":"IET Biom."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Dey, S., Roy, N., Xu, W., Choudhury, R.R., and Nelakuditi, S. (2014, January 23\u201326). AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. Proceedings of the 2014 Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2014.23059"},{"key":"ref_18","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., and Boneh, D. (2014). Mobile Device Identification via Sensor Fingerprinting. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3026","DOI":"10.1109\/TKDE.2014.2316504","article-title":"Highly Comparative Feature-Based Time-Series Classification","volume":"26","author":"Fulcher","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hasse, J., Gloe, T., and Beck, M. (2013, January 17\u201319). Forensic identification of GSM mobile phones. Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France.","DOI":"10.1145\/2482513.2482529"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cristianini, N., and Shawe-Taylor, J. (2000). An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods, Cambridge University Press.","DOI":"10.1017\/CBO9780511801389"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., and Friedman, J. (2009). Kernel Smoothing Methods. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer.","DOI":"10.1007\/b94608_6"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/4\/783\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:32:04Z","timestamp":1760207524000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/4\/783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,6]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,4]]}},"alternative-id":["s17040783"],"URL":"https:\/\/doi.org\/10.3390\/s17040783","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,6]]}}}