Visible to the public Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication

TitleSpoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Publication TypeConference Paper
Year of Publication2018
AuthorsLu, B., Qin, Z., Yang, M., Xia, X., Zhang, R., Wang, L.
Conference Name2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Keywordsauthentication mechanism, collaborative mechanism, Communication system security, composability, Cross Layer Security, cross-technology communication, CTC schemes, frequency 2.4 GHz, heterogeneous wireless devices, heterogeneous wireless networks, ISM band, packet radio networks, Physical layer, physical layer information, pubcrawl, received signal strength, resilience, Resiliency, RSS, RSSI, spoofing attack detection, telecommunication security, Wi-Fi devices, Wireless fidelity, wireless LAN, wireless networks, Wireless sensor networks, Zigbee, ZigBee packets

Recent advances in Cross-Technology Communication (CTC) enable the coexistence and collaboration among heterogeneous wireless devices operating in the same ISM band (e.g., Wi-Fi, ZigBee, and Bluetooth in 2.4 GHz). However, state-of-the-art CTC schemes are vulnerable to spoofing attacks since there is no practice authentication mechanism yet. This paper proposes a scheme to enable the spoofing attack detection for CTC in heterogeneous wireless networks by using physical layer information. First, we propose a model to detect ZigBee packets and measure the corresponding Received Signal Strength (RSS) on Wi-Fi devices. Then, we design a collaborative mechanism between Wi-Fi and ZigBee devices to detect the spoofing attack. Finally, we implement and evaluate our methods through experiments on commercial off-the- shelf (COTS) Wi-Fi and ZigBee devices. Our results show that it is possible to measure the RSS of ZigBee packets on Wi-Fi device and detect spoofing attack with both a high detection rate and a low false positive rate in heterogeneous wireless networks.

Citation Keylu_spoofing_2018