skip to main content
10.1145/3320269.3384726acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments

Published: 05 October 2020 Publication History

Abstract

Widely deployed IoT devices have raised serious concerns for the spectrum shortage and the cost of multi-protocol gateway deployment. Recent emerging Cross-Technology Communication (CTC) technique can alleviate this issue by enabling direct communication among heterogeneous wireless devices, such as WiFi, Bluetooth, and ZigBee on 2.4 GHz. However, this new paradigm also brings security risks, where an attacker can use CTC to launch wireless attacks against IoT devices. Due to limited computational capability and different wireless protocols being used, many IoT devices are unable to use computationally-intensive cryptographic approaches for security enhancement. Therefore, without proper detection methods, IoT devices cannot distinguish signal sources before executing command signals. In this paper, we first demonstrate a new defined physical layer attack in the CTC scenario, named as waveform emulation attack, where a WiFi device can overhear and emulate the ZigBee waveform to attack ZigBee IoT devices. Then, to defend against this new attack, we propose a physical layer defensive mechanism, named as AuthCTC, to verify the legitimacy of CTC signals. Specifically, at the sender side, an authorization code is embedded into the packet preamble by leveraging the dynamically changed cyclic prefix. A WiFi-based detector is used to verify the authorization code at the receiver side. Extensive simulations and experiments using off-the-shelf devices are conducted to demonstrate both the feasibility of the attack and the effectiveness of our defensive mechanism.

Supplementary Material

MP4 File (3320269.3384726.mp4)
In this video, we propose and implement a novel attack in the cross-technology communication (CTC) environment, named as Waveform Emulation Attack (WEA), where a WiFi device can eavesdrop on the ZigBee communication channel, and then emulate ZigBee signals to control target devices. Then, we develop a physical layer defensive mechanism to defend against this kind of attack. At the sender side, the legitimate CTC device can embed an authorization code into the preamble of the packet by changing the CP length dynamically. At the receiver side, a detector is used to verify the authorization code. Since the authorization code is changing over time, an illegitimate device cannot know the next available authorization code so that its packet cannot pass the verification. Through this mechanism, end ZigBee devices can verify the legitimacy of CTC signals. Experiment results demonstrate that the WEA is feasible and our defense mechanism can defeat it effectively.

References

[1]
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac.2018. Peek-a-Boo: I see your smart home activities, even encrypted! arXiv preprint arXiv:1808.02741(2018).
[2]
Amazon. [n.d.]. Osram Lightify Smart LED Bulb. https://www.amazon.com/Sylvania-Osram-Lightify-Daylight-Smart/dp/B01NAIV40U
[3]
Bastian Bloessl, Michele Segata, Christoph Sommer, and Falko Dressler. 2013. An IEEE 802.11 a/g/p OFDM Receiver for GNU Radio. In Proceedings of the second workshop on Software radio implementation forum. ACM, 9--16.
[4]
Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking. ACM, 116--127.
[5]
Kameswari Chebrolu and Ashutosh Dhekne. 2009. Esense: communication through energy sensing. In Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 85--96.
[6]
Ruirong Chen and Wei Gao. 2019. Enabling Cross-Technology Coexistence for Extremely Weak Wireless Devices. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 253--261.
[7]
Yongrui Chen, Zhijun Li, and Tian He. 2018. TwinBee: Reliable Physical-Layer Cross-Technology Communication with Symbol-Level Coding. In IEEE INFOCOM2018-IEEE Conference on Computer Communications. IEEE, 153--161.
[8]
Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang,and Xiping Zhu. 2017. The realization of key extraction based on USRP andOFDM channel response. In Communications and Network Security (CNS), 2017IEEE Conference on. IEEE, 374--375.
[9]
Zicheng Chi, Zhichuan Huang, Yao Yao, Tiantian Xie, Hongyu Sun, and Ting Zhu. 2017. EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9.
[10]
Zicheng Chi, Yan Li, Hongyu Sun, Yao Yao, Zheng Lu, and Ting Zhu. 2016. B2w2:N-way concurrent communication for iot devices. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM. ACM, 245--258.
[11]
Boris Danev and Srdjan Capkun. 2009. Transient-based identification of wireless sensor nodes. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. IEEE Computer Society, 25--36.
[12]
Andrea Goldsmith. 2005. Wireless Communications. Cambridge university press.
[13]
Xiuzhen Guo, Yuan He, Jia Zhang, and Haotian Jiang. 2019. WIDE: physical-level CTC via digital emulation. In2019 18th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). IEEE, 49--60.
[14]
Xiuzhen Guo, Yuan He, Xiaolong Zheng, Zihao Yu, and Yunhao Liu. 2019. Lego-fi:Transmitter-transparent ctc with cross-demapping. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2125--2133.
[15]
Xiuzhen Guo, Xiaolong Zheng, and Yuan He. 2017. Wizig: Cross-technology energy communication over a noisy channel. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9.
[16]
Ibbad Hafeez, Markku Antikainen, and Sasu Tarkoma. 2019. Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing. In2019IEEE International Conference on Pervasive Computing and Communications Work-shops (PerCom Workshops). IEEE, 196--201.
[17]
Jehad M Hamamreh, Haji M Furqan, and Huseyin Arslan. 2018. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Communications Surveys & Tutorials(2018).
[18]
Wenchao Jiang, Song Min Kim, Zhijun Li, and Tian He. 2018. Achieving Receiver-Side Cross-Technology Communication with Cross-Decoding. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 639--652.
[19]
Wenchao Jiang, Ruofeng Liu, Ling Liu, Zhijun Li, and Tian He. 2017. BlueBee:10,000 x Faster Cross-Technology Communication from Bluetooth to ZigBee. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, 486--487.
[20]
Wenchao Jiang, Zhimeng Yin, Song Mim Kim, and Tian He. 2017. Transparent cross-technology communication over data traffic. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9.
[21]
Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2015. SafeDSA: Safeguard dynamic spectrum access against fake secondary users. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.ACM, 304--315.
[22]
Song Min Kim and Tian He. 2015. Freebee: Cross-technology communication via free side-channel. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 317--330.
[23]
Demijan Klinc, Jeongseok Ha, Steven W McLaughlin, Joao Barros, and Byung-JaeKwak. 2011. LDPC codes for the Gaussian wiretap channel. IEEE Transactions on Information Forensics and Security6, 3 (2011), 532--540.
[24]
Zhijun Li and Tian He. 2017. Webee: Physical-layer cross-technology communication via emulation. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, 2--14.
[25]
Zhijun Li and Tian He. 2018. LongBee: Enabling Long-Range Cross-Technology Communication. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 162--170.
[26]
Zang Li, Wenyuan Xu, Rob Miller, and Wade Trappe. 2006. Securing wireless systems via lower layer enforcements. In Proceedings of the 5th ACM workshop on Wireless security. ACM, 33--42.
[27]
TJ O'Connor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves,and Ahmad-Reza Sadeghi. 2019. Home Snitch: behavior transparency and control for smart home IoT devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. 128--138.
[28]
Neal Patwari and Sneha K Kasera. 2007. Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, 111--122.
[29]
NIST FIPS Pub. 2001. 197: Advanced encryption standard (AES). Federal information processing standards publication 197, 441 (2001), 0311.
[30]
Donald R Reising, Michael A Temple, and Mark E Oxley. 2012. Gabor-based RF-DNA fingerprinting for classifying 802.16 e WiMAX mobile subscribers. In 2012 International Conference on Computing, Networking and Communications(ICNC). IEEE, 7--13.
[31]
Matthias Schulz. [n.d.]. Nexmon. https://github.com/seemoo-lab/nexmon
[32]
Matthias Schulz. 2018.Teaching Your Wireless Card New Tricks: Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications. Ph.D. Dissertation. Technische Universität.
[33]
Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 256--268.
[34]
Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: Thec-based firmware patching framework.
[35]
Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, and A Selcuk Uluagac. 2019. Aegis: a context-aware security framework for smart home systems. In Proceedings of the 35th Annual Computer Security Applications Conference. 28--41.
[36]
ZigBee Specification. 2012. Document 053474r20. Zigbee Standards Organization:San Ramon, CA, USA(2012).
[37]
statista. [n.d.]. statista report. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
[38]
Chan Dai Truyen Thai, Jemin Lee, and Tony QS Quek. 2016. Physical-layer secret key generation with colluding untrusted relays.IEEE Transactions on Wireless Communications 15, 2 (2016), 1517--1530.
[39]
Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, and Carl A Gunter. 2019.Charting the Attack Surface of Trigger-Action IoT Platforms. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1439--1453.
[40]
Shuai Wang, Zhimeng Yin, Zhijun Li, and Tian He. 2018. Networking Support For Physical-Layer Cross-Technology Communication. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 259--269.
[41]
Eric W. Weisstein. [n.d.]. Parseval's Theorem. http://mathworld.wolfram.com/ParsevalsTheorem.html
[42]
Wikipediak. [n.d.]. Pearson Correlation Coefficient. https://en.wikipedia.org/wiki/Pearson_correlation_coefficient
[43]
Qian Xu, Pinyi Ren, Houbing Song, and Qinghe Du. 2017. Security-aware wave-forms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions.IEEE Internet of Things Journal 4, 6 (2017), 1924--1933.
[44]
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, and Narayan B Mandayam. 2010. Information-theoretically secret key generation for fading wireless channels.IEEE Transactions on Information Forensics and Security5, 2 (2010), 240--254.
[45]
Zhimeng Yin, Wenchao Jiang, Song Min Kim, and Tian He. 2017. C-morse: Cross-technology communication with transparent morse coding. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 1--9.
[46]
Sihan Yu, Xiaonan Zhang, Pei Huang, and Linke Guo. 2019. Secure Authentication in Cross-Technology Communication for Heterogeneous IoT. In2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE,1--2.
[47]
Marwan Yusuf and Huseyin Arslan. 2016. Controlled inter-carrier interference for physical layer security in OFDM systems. In Vehicular Technology Conference(VTC-Fall), 2016 IEEE 84th. IEEE, 1--5.
[48]
Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, and Haojin Zhu. 2018. Homonit: Monitoring smart home apps from encrypted traffic. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1074--1088.
[49]
Xiaonan Zhang, Pei Huang, Linke Guo, and Yuguang Fang. 2019. Hide and Seek: Waveform Emulation Attack and Defense in Cross-Technology Communication. In Proceedings of the 39th Annual International Conference on Distributed Computing Systems. IEEE, 1--10.
[50]
Xiaonan Zhang, Pei Huang, Linke Guo, and Mo Sha. 2019. Incentivizing relay participation for securing IoT communication. In IEEE INFOCOM 2019-IEEEConference on Computer Communications. IEEE, 1504--1512.
[51]
Xiaonan Zhang, Pei Huang, Qi Jia, and Linke Guo. 2018. Cream: Unauthorizedsecondary user detection in fading environments. In2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 406--414.
[52]
Xiaonan Zhang, Qi Jia, and Linke Guo. 2017. Secure and optimized unauthorized secondary user detection in dynamic spectrum access. In 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 1--9.
[53]
Yifan Zhang and Qun Li. 2013. Howies: A holistic approach to zigbee assisted wifi energy savings in mobile devices. In INFOCOM, 2013 Proceedings IEEE. IEEE,1366--1374.
[54]
Xiaolong Zheng, Yuan He, and Xiuzhen Guo. 2018. StripComm: Interference-resilient cross-technology communication in coexisting environments. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 171--179.

Cited By

View all
  • (2025)A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven ApproachesACM Computing Surveys10.1145/370849657:5(1-35)Online publication date: 9-Jan-2025
  • (2025)Detection and Authentication for Cross-Technology CommunicationIEEE Transactions on Vehicular Technology10.1109/TVT.2024.346710974:2(3157-3171)Online publication date: Feb-2025
  • (2024)Internet of Things (IoT) applications security trends and challengesDiscover Internet of Things10.1007/s43926-024-00090-54:1Online publication date: 24-Dec-2024
  • Show More Cited By

Index Terms

  1. AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
      October 2020
      957 pages
      ISBN:9781450367509
      DOI:10.1145/3320269
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 October 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cross-technology communication
      2. physical layer security
      3. waveform emulation attack

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ASIA CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)25
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven ApproachesACM Computing Surveys10.1145/370849657:5(1-35)Online publication date: 9-Jan-2025
      • (2025)Detection and Authentication for Cross-Technology CommunicationIEEE Transactions on Vehicular Technology10.1109/TVT.2024.346710974:2(3157-3171)Online publication date: Feb-2025
      • (2024)Internet of Things (IoT) applications security trends and challengesDiscover Internet of Things10.1007/s43926-024-00090-54:1Online publication date: 24-Dec-2024
      • (2024)FedAR: Addressing Client Unavailability in Federated Learning with Local Update Approximation and RectificationMachine Learning and Knowledge Discovery in Databases. Research Track10.1007/978-3-031-70352-2_11(178-196)Online publication date: 22-Aug-2024
      • (2024)Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart HomeSecurity and Privacy in Communication Networks10.1007/978-3-031-64948-6_11(205-224)Online publication date: 13-Oct-2024
      • (2022)Signal Emulation Attack and Defense for Smart Home IoTIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3169705(1-1)Online publication date: 2022
      • (2022)Physical-Level Parallel Inclusive Communication for Heterogeneous IoT DevicesIEEE INFOCOM 2022 - IEEE Conference on Computer Communications10.1109/INFOCOM48880.2022.9796876(380-389)Online publication date: 2-May-2022
      • (2022)Defending against Cross-Technology Jamming in Heterogeneous IoT Systems2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS54860.2022.00073(702-712)Online publication date: Jul-2022
      • (2021)Cross-Technology Communication for Heterogeneous Wireless Devices through Symbol-Level Energy ModulationIEEE Transactions on Mobile Computing10.1109/TMC.2021.3065998(1-1)Online publication date: 2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media