skip to main content
research-article
Public Access

Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks

Published: 31 July 2020 Publication History

Abstract

Industrial networks typically connect hundreds or thousands of sensors and actuators in industrial facilities, such as manufacturing plants, steel mills, and oil refineries. Although the typical industrial Internet of Things (IoT) applications operate at low data rates, they pose unique challenges because of their critical demands for reliable and real-time communication in harsh industrial environments. IEEE 802.15.4-based wireless sensor-actuator networks (WSANs) technology is appealing for use to construct industrial networks because it does not require wired infrastructure and can be manufactured inexpensively. Battery-powered wireless modules easily and inexpensively retrofit existing sensors and actuators in industrial facilities without running cables for communication and power. To address the stringent real-time and reliability requirements, WSANs made a set of unique design choices such as employing the Time-Synchronized Channel Hopping (TSCH) technology. These designs distinguish WSANs from traditional wireless sensor networks (WSNs) that require only best effort services. The function-based channel hopping used in TSCH simplifies the network operations at the cost of security. Our study shows that an attacker can reverse engineer the channel hopping sequences and graph routes by silently observing the transmission activities and put the network in danger of selective jamming attacks. The cracked knowledge on the channel hopping sequences and graph routes is an important prerequisite for launching selective jamming attacks to TSCH networks. To our knowledge, this article represents the first systematic study that investigates the security vulnerability of TSCH channel hopping and graph routing under realistic settings. In this article, we demonstrate the cracking process, present two case studies using publicly accessible implementations (developed for Orchestra and WirelessHART), and provide a set of insights.

References

[1]
802.15.4e. 2013. IEEE802.15.4e WPAN Task Group. Retrieved September 28, 2018 from http://www.ieee802.org/15/pub/TG4e.html.
[2]
Wahhab Albazrqaoe, Jun Huang, and Guoliang Xing. 2016. Practical Bluetooth traffic sniffing: Systems and privacy implications. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, NY, 333--345.
[3]
Cristina Alcaraz and Javier Lopez. 2010. A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Transactions on Systems, Man, and Cybernetics 40, 4 (July 2010), 419--428.
[4]
Farhana Ashraf, Yih-Chun Hu, and Robin H. Kravets. 2012. Bankrupting the jammer in WSN. In Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS’12). IEEE, Washington, D.C., 317--325.
[5]
Carlo Alberto Boano, Thiemo Voigt, Claro Noda, Kay Römer, and Marco Zuniga. 2011. JamLab: Augmenting sensornet testbeds with realistic and controlled interference generation. In Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks. IEEE, 175--186.
[6]
Shaibal Chakrabarty, Daniel W. Engels, and Selina Thathapudi. 2015. Black SDN for the Internet of Things. In Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS’15). IEEE, Washington, D.C., 190--198.
[7]
Xia Cheng, Junyang Shi, and Mo Sha. 2019. Cracking the channel hopping sequences in IEEE 802.15.4e-based industrial TSCH networks. In Proceedings of the International Conference on Internet of Things Design and Implementation (IoTDI’19). ACM, New York, NY, 130--141.
[8]
Jerry T. Chiang and Yih-Chun Hu. 2011. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transactions on Networking 19, 1 (Feb. 2011), 286--298.
[9]
Roberta Daidone, Gianluca Dini, and Marco Tiloca. 2014. A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Networks 20, 5 (July 2014), 1223--1235.
[10]
Jing Deng, Richard Han, and Shivakant Mishra. 2003. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of the 2nd International Conference on Information Processing in Sensor Networks (IPSN’03). Springer-Verlag Berlin, Germany, 349--364.
[11]
Adam Dunkels. 2002. Contiki: The Open Source OS for the Internet of Things. Retrieved September 28, 2018 from http://www.contiki-os.org/.
[12]
Simon Duquennoy, Atis Elsts, Beshr Al Nahas, and George Oikonomo. 2017. TSCH and 6TiSCH for Contiki: Challenges, design and evaluation. In 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, Piscataway, NJ.
[13]
Simon Duquennoy, Beshr Al Nahas, and Atis Elsts. 2018. 6TiSCH Implementation. Retrieved September 29, 2018 from https://github.com/contiki-ng/contiki-ng/wiki/Documentation:-TSCH-and-6TiSCH
[14]
Simon Duquennoy, Beshr Al Nahas, Olaf Landsiedel, and Thomas Watteyne. 2015. Orchestra: Robust mesh networks through autonomously scheduled TSCH. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys’15). ACM, New York, NY, 337--350.
[15]
FTE. 2019. FTE comprobe bpa 600. Retrieved from http://www.fte.com/products/BPA600.aspx.
[16]
Dolvara Gunatilaka, Mo Sha, and Chenyang Lu. 2017. Impacts of channel selection on industrial wireless sensor-actuator networks. In Proceedings of the IEEE Conference on Computer Communications, IEEE INFOCOM 2017. IEEE, Piscataway, NJ.
[17]
HART. 2019. HART Communication Protocol and Foundation (Now the FieldComm Group). Retreived from https://fieldcommgroup.org/.
[18]
IETF. 2018. IPv6 over the TSCH mode of IEEE 802.15.4e. Retrieved September 28, 2018 from https://datatracker.ietf.org/wg/6tisch/documents/.
[19]
ISA100. 2018. ISA100. Retrieved from http://www.isa100wci.org/.
[20]
Chris Karlof, Naveen Sastry, and David Wagner. 2004. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys’04). ACM, New York, NY, 162--175.
[21]
Loukas Lazos, Sisi Liu, and Marwan Krunz. 2009. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec’09). ACM, New York, NY, 169--180.
[22]
Philip Levis. 2013. TinyOS Documentation Wiki. Retrieved September 28, 2018 from http://tinyos.stanford.edu/tinyos-wiki/index.php/TinyOS_Documentation_Wiki.
[23]
Bo Li, Yehan Ma, Tyler Westenbroek, Chengjie Wu, Humberto Gonzalez, and Chenyang Lu. 2016. Wireless routing and control: A cyber-physical case study. In Proceedings of the 7th International Conference on Cyber-Physical Systems (ICCPS’16). IEEE, Piscataway, NJ.
[24]
Bo Li, Lanshun Nie, Chengjie Wu, Humberto Gonzalez, and Chenyang Lu. 2015. Incorporating emergency alarms in reliable wireless process control. In Proceedings of the ACM/IEEE 6th International Conference on Cyber-Physical Systems (ICCPS’15). ACM, New York, NY, 218--227.
[25]
Bo Li, Zhuoxiong Sun, Kirill Mechitov, Gregory Hackmann, Chenyang Lu, Shirley J. Dyke, Gul Agha, and Billie F. Spencer Jr. 2013. Realistic case studies of wireless structural control. In Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (ICCPS’13). ACM, New York, NY, 179--188.
[26]
Chenyang Lu, Abusayeed Saifullah, Bo Li, Mo Sha, Humberto Gonzalez, Dolvara Gunatilaka, Chengjie Wu, Lanshun Nie, and Yixin Chen. 2016. Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proceedings of the IEEE, Special Issue on Industrial Cyber Physical Systems 104, 5 (May 2016), 1013--1024.
[27]
Zhuo Lu, Wenye Wang, and Cliff Wang. 2014. Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Transactions on Mobile Computing 13, 8 (Aug. 2014), 1746--1759.
[28]
James Manyika, Michael Chui, Jacques Bughin, Richard Dobbs, Peter Bisson, and Alex Marrs. 2013. Disruptive Technologies: Advances that will Transform Life, Business, and the Global Economy. Retrieved from http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/disruptive-technologies.
[29]
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials 11, 4 (2009), 42--56.
[30]
Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, and Adrian Perrig. 2012. Jamming-resilient multipath routing. IEEE Transactions on Dependable and Secure Computing 9, 6 (Nov. 2012), 852--864.
[31]
Raspberry Pi. 2019. Raspberry Pi. Retrieved from https://www.raspberrypi.org/.
[32]
Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, and Gene Tsudik. 2010. Intrusion-resilience in mobile unattended WSNs. In Proceedings of the 29th Conference on Information Communications (INFOCOM’10). IEEE, Piscataway, NJ, 2303--2311.
[33]
Kristofer S. J. Pister. 2010. Smart Dust: Autonomous Sensing and Communication in a Cubic Millimeter. Retrieved from https://people.eecs.berkeley.edu/ pister/SmartDust/.
[34]
Kristofer S. J. Pister and Lance Doherty. 2008. TSMP: Time synchronized mesh protocol. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Piscataway, NJ, 391--398.
[35]
Christina Popper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5 (June 2010), 703--715.
[36]
Michael E. Porter and James E. Heppelmann. 2014. How Smart, Connected Products are Transforming Competition. Retrieved from https://hbr.org/2014/11/how-smart-connected-products-are-transforming-competition.
[37]
Alejandro Proaño and Loukas Lazos. 2010. Selective jamming attacks in wireless networks. In Proceedings of the 2010 IEEE International Conference on Communications. IEEE, Piscataway, NJ, 1--6.
[38]
Alejandro Proaño and Loukas Lazos. 2012. Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing 9, 1 (Jan. 2012), 101--114.
[39]
David R. Raymond and Scott F. Midkiff. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1 (Jan. 2008), 74--81.
[40]
Shahid Raza, Adriaan Slabbert, Thiemo Voigt, and Krister Landernäs. 2009. Security considerations for the WirelessHART protocol. In Proceedings of the 14th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA’09). IEEE, Piscataway, NJ, 242--249.
[41]
Andréa Richa, Christian Scheideler, Stefan Schmid, and Jin Zhang. 2013. An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Transactions on Networking 21, 3 (June 2013), 760--771.
[42]
RPL. 2012. RFC 6550: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Retrieved September 28, 2018 from https://tools.ietf.org/html/rfc6550.
[43]
Mike Ryan. 2013. Bluetooth: With low energy comes low security. In Presented as Part of the 7th USENIX Workshop on Offensive Technologies. USENIX, Washington, D.C. https://www.usenix.org/conference/woot13/workshop-program/presentation/Ryan
[44]
Mo Sha. 2016. Testbed at the State University of New York at Binghamton. Retrieved September 28, 2018 from http://www.cs.binghamton.edu/%7emsha/testbed.
[45]
Michael Spuhler, Domenico Giustiniano, Vincent Lenders, Matthias Wilhelm, and Jens B. Schmitt. 2014. Detection of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless Communications 13, 3 (March 2014), 1593--1603.
[46]
Mario Strasser, Boris Danev, and Srdjan Čapkun. 2010. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks 7, 2 (Aug. 2010), 16:1–16:29.
[47]
TelosB. 2013. TelosB Datasheet provided by MEMSIC. Retrieved October 2, 2018 from http://www.memsic.com/userfiles/files/Datasheets/WSN/telosb_datasheet.pdf.
[48]
Adam Thierer and Andrea Castillo. 2015. Projecting the Growth and Economic Impact of the Internet of Things. Retrieved from https://www.mercatus.org/publication/projecting-growth-and-economic-impact-internet-things.
[49]
Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, and Sajal K. Das. 2017. JAMMY: A distributed and self-adaptive solution against selective jamming attack in TDMA WSNs. IEEE Transactions on Dependable and Secure Computing 14, 4 (July 2017), 392--405.
[50]
Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, and Sajal K. Das. 2018. DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks. ACM Transactions on Sensor Networks (TOSN) 15, 1 (Feb. 2018), 3:1–3:28.
[51]
Wireless Cyber-Physical Simulator (WCPS). 2018. Wireless Cyber-Physical Simulator (WCPS). Retrieved October 2, 2018 from http://wsn.cse.wustl.edu/index.php/WCPS:_Wireless_Cyber-Physical_Simulator.
[52]
Wi-Spy. 2018. Wi-Spy USB Spectrum Analyzer. http://www.wi-spy.co.uk/index.php/products.
[53]
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, and Vincent Lenders. 2011. Short paper: Reactive jamming in wireless networks how realistic is the threat? In Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec’11). ACM, New York, NY, 47--52.
[54]
WirelessHART. 2019. WirelessHART. Retrieved from https://fieldcommgroup.org/technologies/hart/hart-technology.
[55]
Anthony D. Wood and John A. Stankovic. 2002. Denial of service in sensor networks. Computer 35, 10 (Oct. 2002), 54--62.
[56]
Anthony D. Wood, John A. Stankovic, and S. H. Son. 2003. JAM: A jammed-area mapping service for sensor networks. In Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS’03). IEEE, Washington, D.C., 286--297.
[57]
Anthony D. Wood, John A. Stankovic, and Gang Zhou. 2007. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, Piscataway, NJ, 60--69.
[58]
Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3 (May 2006), 41--47.
[59]
Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’05). ACM, New York, NY, 46--57.
[60]
Wenyuan Xu, Timothy Wood, Wade Trappe, and Yanyong Zhang. 2004. Channel surfing and spatial retreats: Defenses against wireless denial of service. In Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe’04). ACM, New York, NY, 80--89.
[61]
Fan Zhang, Reiner Dojen, and Tom Coffey. 2011. Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. International Journal of Sensor Networks 10, 4 (Oct. 2011), 192--201.
[62]
Dimitrios Zorbas, Panayiotis Kotzanikolaou, and Christos Douligeris. 2018. R-TSCH: Proactive jamming attack protection for IEEE 802.15.4-TSCH networks. In Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 00766--00771.

Cited By

View all

Index Terms

  1. Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 20, Issue 3
      SI: Evolution of IoT Networking Architectures papers
      August 2020
      259 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3408328
      • Editor:
      • Ling Liu
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 July 2020
      Online AM: 07 May 2020
      Accepted: 01 November 2019
      Revised: 01 November 2019
      Received: 01 June 2019
      Published in TOIT Volume 20, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IEEE 802.15.4e
      2. Time-synchronized channel hopping
      3. graph routing
      4. industrial wireless sensor-actuator networks
      5. selective jamming attack

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • NSF

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)172
      • Downloads (Last 6 weeks)15
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Improving WSN-based dataset using data augmentation for TSCH protocol performance modelingFuture Generation Computer Systems10.1016/j.future.2024.107540(107540)Online publication date: Sep-2024
      • (2024)6TiSCH IIoT network: A reviewComputer Networks10.1016/j.comnet.2024.110759254(110759)Online publication date: Dec-2024
      • (2023)Revealing Smart Selective Jamming Attacks in WirelessHART NetworksIEEE/ACM Transactions on Networking10.1109/TNET.2022.322435831:4(1611-1625)Online publication date: Aug-2023
      • (2021)Launching Smart Selective Jamming Attacks in WirelessHART NetworksIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488805(1-10)Online publication date: 10-May-2021
      • (2021)ATRIA: Autonomous Traffic-Aware Scheduling for Industrial Wireless Sensor-Actuator Networks2021 IEEE 29th International Conference on Network Protocols (ICNP)10.1109/ICNP52444.2021.9651914(1-12)Online publication date: 1-Nov-2021

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Login options

      Full Access

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media