Signal Emulation Attack and Defense for Smart Home IoT

被引:5
作者
Zhang, Xiaonan [1 ]
Yu, Sihan [2 ]
Zhou, Hansong [1 ]
Huang, Pei [2 ]
Guo, Linke [2 ]
Li, Ming [3 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[3] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
基金
美国国家科学基金会;
关键词
Zigbee; Wireless fidelity; Emulation; Protocols; Receivers; Logic gates; Light emitting diodes; Internet of Things; signal emulation attack; cross-technology communication; SECURITY; CLASSIFICATION; INTERNET; THINGS;
D O I
10.1109/TDSC.2022.3169705
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is transforming every corner of our daily life and plays important roles in the smart home. Depending on different requirements on wireless transmission, dedicated wireless protocols have been adopted on various types of IoT devices. Recent advances in Cross-Technology Communication (CTC) enable direct communication across those wireless protocols, which will greatly improve the spectrum utilization efficiency. However, it incurs serious security concerns on heterogeneous IoT devices. In this paper, we identify a new physical-layer attack, cross-technology signal emulation attack, where a WiFi device eavesdrops a ZigBee packet on the fly, and further manipulates the ZigBee device by emulating a ZigBee signal. To defend against this attack, we propose two defense strategies with the help of an anchor. Particularly, the passive defense strategy focuses on misleading the ZigBee signal eavesdropping, while the proactive approach develops a real-time detection mechanism on distinguishing between a common ZigBee signal and an emulated signal. We implement the complete attacking process and defense strategies with TI CC26x2R LaunchPad, USRP-N210 platform, and smart LED light bulbs, as well as a self-designed prototype, where a general light bulb can be turned on/off by a Nexus 5 smartphone directly. Extensive experiments have demonstrated the existence of the attack, and the feasibility, effectiveness, and accuracy of the proposed defense strategies.
引用
收藏
页码:2040 / 2057
页数:18
相关论文
共 72 条
  • [1] Acar Abbas, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P207, DOI 10.1145/3395351.3399421
  • [2] Amazon, 2018, SYLV DIMM LEMP A19
  • [3] [Anonymous], 2019, UBIQUA PROTOCOL ANAL
  • [4] [Anonymous], 2017, ROLE GAIN USRP
  • [5] [Anonymous], 2017, PROC INT C EMBEDDED
  • [6] [Anonymous], 2020, IOT REPORT INTERNET
  • [7] [Anonymous], 2017, C BASED FIRMWARE PAT
  • [8] Bishop CM., 2016, PATTERN RECOGN
  • [9] Boyd S., 2004, CONVEX OPTIMIZATION, DOI 10.1017/CBO9780511804441
  • [10] Wireless Device Identification with Radiometric Signatures
    Brik, Vladimir
    Banerjee, Suman
    Gruteser, Marco
    Oh, Sangho
    [J]. MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, : 116 - +