PhyAuth: Physical-Layer Message Authentication for ZigBee Networks

被引:0
|
作者
Li, Ang [1 ]
Li, Jiawei [1 ]
Han, Dianqi [2 ]
Zhang, Yan [3 ]
Li, Tao [4 ]
Zhu, Ting [5 ]
Zhang, Yanchao [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Univ Texas Arlington, Arlington, TX USA
[3] Univ Akron, Akron, OH USA
[4] Indiana Univ Purdue Univ Indianapolis, Indianapolis, IN USA
[5] Ohio State Univ, Columbus, OH USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
基金
美国国家科学基金会;
关键词
SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks. Since each ZigBee network uses hop-by-hop network-layer message authentication based on a common network key, it is highly vulnerable to packet-injection attacks, in which the adversary exploits the compromised network key to inject arbitrary fake packets from any spoofed address to disrupt network operations and consume the network/device resources. In this paper, we present PhyAuth, a PHY hop-by-hop message authentication framework to defend against packet-injection attacks in ZigBee networks. The key idea of PhyAuth is to let each ZigBee transmitter embed into its PHY signals a PHY one-time password (called POTP) derived from a device-specific secret key and an efficient cryptographic hash function. An authentic POTP serves as the transmitter's PHY transmission permission for the corresponding packet. PhyAuth provides three schemes to embed, detect, and verify POTPs based on different features of ZigBee PHY signals. In addition, PhyAuth involves lightweight PHY signal processing and no change to the ZigBee protocol stack. Comprehensive USRP experiments confirm that PhyAuth can efficiently detect fake packets with very low false-positive and false-negative rates while having a negligible negative impact on normal data transmissions.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [21] LCMA: A Novel Lightweight Continuous Message Authentication for Cyber-Physical System
    Han, Shouxu
    Liu, Jie
    Luo, Yi
    Gan, Hongping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 375 - 390
  • [22] Message Authentication Mechanism and Privacy Protection in the Context of Vehicular Ad Hoc Networks
    Wu, Hsin-Te
    Yein, Alan Dahgwo
    Hsieh, Wen-Shyong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [23] Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps
    Abu Al-Atta, Mariam
    Said, Karim A.
    Mohamed, Mohamed A.
    Raslan, Walid
    ENTROPY, 2023, 25 (01)
  • [24] Seek and Decode: Random Multiple Access with Multiuser Detection and Physical-Layer Network Coding
    Cocco, Giuseppe
    Pfletschinger, Stephan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 501 - 506
  • [25] A Novel Detection Algorithm for Random Multiple Access Based on Physical-Layer Network Coding
    Sun, Zhuo
    Yang, Lei
    Yuan, Jinhong
    Chiani, Marco
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, : 608 - 613
  • [26] BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications
    Wang, Pu
    Yan, Zheng
    Zeng, Kai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2818 - 2834
  • [27] Physical Layer Authentication for Industrial Control Based on Convolutional Denoising Autoencoder
    Chen, Yanru
    He, Haoyu
    Liu, Shengjie
    Zhang, Yuanyuan
    Li, Yang
    Xing, Bin
    Guo, Bing
    Chen, Liangyin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 15633 - 15641
  • [28] Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks
    Roy, Amit Kumar
    Varadaranjan, Vijayakumar
    Nath, Keshab
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [29] Phase-Assisted Dynamic Tag-Embedding Message Authentication for IoT Networks
    Qaisi, Malak
    Althunibat, Saud
    Qaraqe, Marwa
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 20620 - 20629
  • [30] Analyzing Physical-Layer Security of PLC Systems Using DCSK: A Copula-Based Approach
    Mohan, Vinay
    Mathur, Aashish
    Kaddoum, Georges
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 : 104 - 117