Abstract
The exponentially increasing number of heterogeneous Internet of Things (IoT) devices result in severe spectrum shortage and interference in the already crowded ISM band. Cross-Technology Communication (CTC) is dedicated to achieving direct communication among wireless devices with different radios and modulation schemes, which serves as an effective approach to address the above challenges. Nevertheless, CTC also provides opportunities for adversaries to manipulate IoT devices. In this paper, we identify a new attack. Built on CTC, WiFi devices are able to hide the pre-intercepted ZigBee message into their transmitted waveforms, achieving the objective of directly controlling ZigBee devices. To defend against the attack, we analyze possible strategies and consider constellation higher-order statistic analysis as the countermeasure. Extensive simulations and experiments with commodity devices (CC26x2R1) and USRP-based prototypes show the existence of the newly identified attack, and further, validate the effectiveness of the proposed defensive approach.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019) |
| Publisher | IEEE |
| Pages | 1117-1126 |
| ISBN (Electronic) | 978-1-7281-2519-0 |
| DOIs | |
| Publication status | Published - 2019 |
| Externally published | Yes |
| Event | 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019) - Richardson, United States Duration: 7 Jul 2019 → 9 Jul 2019 https://theory.utdallas.edu/ICDCS2019/index.html |
Publication series
| Name | Proceedings - International Conference on Distributed Computing Systems |
|---|---|
| Volume | 2019-July |
Conference
| Conference | 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019) |
|---|---|
| Abbreviated title | ICDCS 2019 |
| Place | United States |
| City | Richardson |
| Period | 7/07/19 → 9/07/19 |
| Internet address |
Research Keywords
- Cross-Technology Communication
- Emulation Attack
- IoT
- Physical-Layer Defense
Fingerprint
Dive into the research topics of 'Hide and seek: Waveform emulation attack and defense in cross-technology communication'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver