Securing IoT Devices by Exploiting Backscatter Propagation Signatures

被引:4
|
作者
Luo, Zhiqing [1 ]
Wang, Wei [1 ]
Huang, Qianyi [2 ,3 ]
Jiang, Tao [1 ]
Zhang, Qian [4 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Hubei, Peoples R China
[2] Southern Univ Sci & Technol, Inst Future Networks, Shenzhen 518055, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518066, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
Backscatter; Antenna arrays; Wireless communication; Communication system security; Wireless sensor networks; Mobile computing; Protocols; Wireless; backscatter; active attacker; lightweight security system;
D O I
10.1109/TMC.2021.3084754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The low-power radio technologies open up many opportunities to facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes IoT devices vulnerable to many active attacks. Recent advances use an antenna array to extract fine-grained physical-layer signatures to identify the attackers, which adds burdens in terms of energy and hardware cost to IoT devices. In this paper, we present ShieldScatter, a lightweight system that attaches low-cost tags to single-antenna devices to shield the system from active attacks. The key insight of ShieldScatter is to intentionally create multi-path propagation signatures with the careful deployment of tags. These signatures can be used to construct a sensitive profile to identify the location of the signals' arrival, and thus detect the threat. In addition, we also design a tag-random scheme and a multiple receivers combination approach to detect a powerful attacker who has the strong priori knowledge of the legitimate user. We prototype ShieldScatter with USRPs and tags to evaluate our system in various environments. The results show that even when the powerful attacker is close to the legitimate device, ShieldScatter can mitigate 95 percent of attack attempts while triggering false alarms on just 7 percent of legitimate traffic.
引用
收藏
页码:4595 / 4608
页数:14
相关论文
共 50 条
  • [41] Phase-controlled Cooperative Wireless Power Transfer for Backscatter IoT Devices
    Kawasaki, Jiei
    Hamase, Hikaru
    Kizaki, Kazuhiro
    Saruwatari, Shunsuke
    Watanabe, Takashi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [42] Securing IoT Devices in e-Health using Machine Learning Techniques
    Alanazi, Haifa Khaled
    Abd El-Aziz, A. A.
    Hamdi, Hedi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 453 - 464
  • [43] SECURING DATA ON THE IOT
    Pockson, Andrew
    ELECTRONICS WORLD, 2016, 122 (1967): : 38 - 39
  • [44] Securing IoT with Blockchain
    Kothari, BhavinKumar
    Mudaliar, Shakthi
    Nadar, Sabestin
    Khadse, Mrinal
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 785 - 788
  • [45] Securing IoT Apps
    Balliu, Musard
    Bastys, Iulia
    Sabelfeld, Andrei
    IEEE SECURITY & PRIVACY, 2019, 17 (05) : 22 - 29
  • [46] SECURING US IoT
    不详
    IEEE SPECTRUM, 2021, 58 (04) : 20 - 20
  • [47] Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
    Heiding, Fredrik
    Omer, Mohammad-Ali
    Wallstrom, Andreas
    Lagerstrom, Robert
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 424 - 431
  • [48] Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation Effects
    Rothe, Stefan
    Besser, Karl-Ludwig
    Krause, David
    Kuschmierz, Robert
    Koukourakis, Nektarios
    Jorswieck, Eduard
    Czarske, Jurgen W.
    RESEARCH, 2023, 6
  • [49] Securing IoT Platforms
    Datta, Soumya Kanti
    Bonnet, Christian
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [50] Exploiting Multi-Phase On-Chip Voltage Regulators as Strong PUF Primitives for Securing IoT
    Weize Yu
    Yiming Wen
    Selçuk Köse
    Jia Chen
    Journal of Electronic Testing, 2018, 34 : 587 - 598