Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks

被引:7
作者
Cheng, Xia [1 ]
Shi, Junyang [1 ]
Sha, Mo [1 ]
机构
[1] SUNY Binghamton, 4400 Vestal Pkwy East, Binghamton, NY 13902 USA
关键词
Time-synchronized channel hopping; graph routing; selective jamming attack; IEEE; 802.15.4e; industrial wireless sensor-actuator networks; SELECTIVE JAMMING ATTACK; WIRELESS; PERFORMANCE; SERVICE;
D O I
10.1145/3372881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial networks typically connect hundreds or thousands of sensors and actuators in industrial facilities, such as manufacturing plants, steel mills, and oil refineries. Although the typical industrial Internet of Things (IoT) applications operate at low data rates, they pose unique challenges because of their critical demands for reliable and real-time communication in harsh industrial environments. IEEE 802.15.4-based wireless sensor-actuator networks (WSANs) technology is appealing for use to construct industrial networks because it does not require wired infrastructure and can be manufactured inexpensively. Battery-powered wireless modules easily and inexpensively retrofit existing sensors and actuators in industrial facilities without running cables for communication and power. To address the stringent real-time and reliability requirements, WSANs made a set of unique design choices such as employing the Time-Synchronized Channel Hopping (TSCH) technology. These designs distinguish WSANs from traditional wireless sensor networks (WSNs) that require only best effort services. The function-based channel hopping used in TSCH simplifies the network operations at the cost of security. Our study shows that an attacker can reverse engineer the channel hopping sequences and graph routes by silently observing the transmission activities and put the network in danger of selective jamming attacks. The cracked knowledge on the channel hopping sequences and graph routes is an important prerequisite for launching selective jamming attacks to TSCH networks. To our knowledge, this article represents the first systematic study that investigates the security vulnerability of TSCH channel hopping and graph routing under realistic settings. In this article, we demonstrate the cracking process, present two case studies using publicly accessible implementations (developed for Orchestra and WirelessHART), and provide a set of insights.
引用
收藏
页数:28
相关论文
共 57 条
[1]  
Albazrqaoe W., P 14 ANN INT C MOB S, P333, DOI DOI 10.1145/2906388.2906403
[2]   A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04) :419-428
[3]  
[Anonymous], 2005, INT S MOB AD HOC NET, DOI DOI 10.1145/1062689.1062697
[4]  
[Anonymous], 2010, P IEEE INFOCOM
[5]  
[Anonymous], 2018, ISA100
[6]  
Ashraf F, 2012, IEEE INT CONF MOB, P317, DOI 10.1109/MASS.2012.6502531
[7]  
Boano C. A., 2011, Proceedings 2011 10th International Conference on Information Processing in Sensor Networks (IPSN 2010), P175
[8]   Black SDN For The Internet of Things [J].
Chakrabarty, Shaibal ;
Engels, Daniel W. ;
Thathapudi, Selina .
2015 IEEE 12TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2015, :190-198
[9]   Cracking the Channel Hopping Sequences in IEEE 802.15.4e-Based Industrial TSCH Networks [J].
Cheng, Xia ;
Shi, Junyang ;
Sha, Mo .
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19), 2019, :130-141
[10]   Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks [J].
Chiang, Jerry T. ;
Hu, Yih-Chun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (01) :286-298