Signal Emulation Attack and Defense for Smart Home IoT

被引:5
作者
Zhang, Xiaonan [1 ]
Yu, Sihan [2 ]
Zhou, Hansong [1 ]
Huang, Pei [2 ]
Guo, Linke [2 ]
Li, Ming [3 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[3] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
基金
美国国家科学基金会;
关键词
Zigbee; Wireless fidelity; Emulation; Protocols; Receivers; Logic gates; Light emitting diodes; Internet of Things; signal emulation attack; cross-technology communication; SECURITY; CLASSIFICATION; INTERNET; THINGS;
D O I
10.1109/TDSC.2022.3169705
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is transforming every corner of our daily life and plays important roles in the smart home. Depending on different requirements on wireless transmission, dedicated wireless protocols have been adopted on various types of IoT devices. Recent advances in Cross-Technology Communication (CTC) enable direct communication across those wireless protocols, which will greatly improve the spectrum utilization efficiency. However, it incurs serious security concerns on heterogeneous IoT devices. In this paper, we identify a new physical-layer attack, cross-technology signal emulation attack, where a WiFi device eavesdrops a ZigBee packet on the fly, and further manipulates the ZigBee device by emulating a ZigBee signal. To defend against this attack, we propose two defense strategies with the help of an anchor. Particularly, the passive defense strategy focuses on misleading the ZigBee signal eavesdropping, while the proactive approach develops a real-time detection mechanism on distinguishing between a common ZigBee signal and an emulated signal. We implement the complete attacking process and defense strategies with TI CC26x2R LaunchPad, USRP-N210 platform, and smart LED light bulbs, as well as a self-designed prototype, where a general light bulb can be turned on/off by a Nexus 5 smartphone directly. Extensive experiments have demonstrated the existence of the attack, and the feasibility, effectiveness, and accuracy of the proposed defense strategies.
引用
收藏
页码:2040 / 2057
页数:18
相关论文
共 72 条
  • [21] Security Analysis of Emerging Smart Home Applications
    Fernandes, Earlence
    Jung, Jaeyeon
    Prakash, Atul
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 636 - 654
  • [22] Fouladi Behrang., 2013, Black Hat USA
  • [23] Goldsmith A., 2005, Wireless Communications
  • [24] Goyal R., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC), P131
  • [25] Guo X., 2017, IEDM, DOI 10.1109/IEDM.2017.8268341
  • [26] Guo XZ, 2018, IEEE INFOCOM SER, P360, DOI 10.1109/INFOCOM.2018.8486364
  • [27] I. D. Corporation, 2019, GROWTH CONN IOT DEV
  • [28] Instruments T., 2017, SIMPL MULT STAND CC2
  • [29] Jiang W., 2017, P IEEE C COMP COMM, P1
  • [30] Jin XC, 2015, IEEE INFOCOM SER