Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2818000.2818028acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Using Channel State Information for Tamper Detection in the Internet of Things

Published: 07 December 2015 Publication History

Abstract

The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a receiver to estimate the impact of the wireless channel, the transmitter and the receiver on the signal. The estimation result - the CSI - is used by a receiver to extract the transmitted information. However, as the CSI depends on the communication environment and the transmitter hardware, it can be used as well for security purposes. If an attacker tampers with a transmitter it will have an effect on the CSI measured at a receiver. Unfortunately not only tamper events lead to CSI fluctuations; movement of people in the communication environment has an impact too. We propose to analyse CSI values of a transmission simultaneously at multiple receivers to improve distinction of tamper and movement events. A moving person is expected to have an impact on some but not all communication links between transmitter and the receivers. A tamper event impacts on all links between transmitter and the receivers. The paper describes the necessary algorithms for the proposed tamper detection method. In particular we analyse the tamper detection capability in practical deployments with varying intensity of people movement. In our experiments the proposed system deployed in a busy office environment was capable to detect 53% of tamper events (TPR = 53%) while creating zero false alarms (FPR = 0%).

References

[1]
I. E. Bagci, U. Roedig, M. Schulz, and M. Hollick. Short Paper: Gathering Tamper Evidence in Wi-fi Networks Based on Channel State Information. In Proc. Wisec'14, 2014.
[2]
M. Bor, A. King, and U. Roedig. Lifetime bounds of Wi-Fi Enabled Sensor Nodes. In Proc. IUPT'15, 2015.
[3]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In Proc. MobiCom'08, 2008.
[4]
B. Danev and S. Capkun. Transient-based Identification of Wireless Sensor Nodes. In Proc. IPSN'09, 2009.
[5]
B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer Identification of RFID Devices. In Proc. USENIX'09, 2009.
[6]
B. Danev, D. Zanetti, and S. Capkun. On Physical-layer Identification of Wireless Devices. ACM Comput. Surv., 45(1):6, 2012.
[7]
D. B. Faria and D. R. Cheriton. Detecting identity-based attacks in wireless networks using signalprints. In Proc. WiSe'06, 2006.
[8]
D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool Release: Gathering 802.11n Traces with Channel State Information. ACM SIGCOMM CCR, 41(1):53, 2011.
[9]
IEEE 802.11 Working Group. IEEE 802.11n-2009. IEEE Std, 802:1--51, 2010.
[10]
Z. Jiang, J. Zhao, X.-Y. Li, J. Han, and W. Xi. Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. In Proc. INFOCOM'13, 2013.
[11]
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In Proc. WiSe'06, 2006.
[12]
P. C. Mahalanobis. On the generalized distance in statistics. Proceedings of the National Institute of Sciences (Calcutta), 2:49--55, 1936.
[13]
N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In Proc. MobiCom'07, 2007.
[14]
Y. Rubner, C. Tomasi, and L. J. Guibas. The earth mover's distance as a metric for image retrieval. International journal of computer vision, 40(2):99--121, 2000.
[15]
O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27--33, 2007.
[16]
J. Xiong and K. Jamieson. SecureArray: Improving Wifi Security with Fine-grained Physical-layer Information. In Proc. MobiCom'13, 2013.
[17]
J. Zhang, M. H. Firooz, N. Patwari, and S. K. Kasera. Advancing Wireless Link Signatures for Location Distinction. In Proc. MobiCom'08, 2008.

Cited By

View all
  • (2024)Position-based Rogue Access Point Detection2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00055(436-442)Online publication date: 8-Jul-2024
  • (2023)A Wi-Fi-Based Passive Indoor Positioning System via Entropy-Enhanced Deployment of Wi-Fi SniffersSensors10.3390/s2303137623:3(1376)Online publication date: 26-Jan-2023
  • (2023)Niffler: Real-time Device-level Anomalies Detection in Smart HomeACM Transactions on the Web10.1145/358607317:3(1-27)Online publication date: 1-Mar-2023
  • Show More Cited By

Index Terms

  1. Using Channel State Information for Tamper Detection in the Internet of Things

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACSAC '15: Proceedings of the 31st Annual Computer Security Applications Conference
    December 2015
    489 pages
    ISBN:9781450336826
    DOI:10.1145/2818000
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • ACSA: Applied Computing Security Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 December 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 802.11n
    2. Channel State Information
    3. OFDM
    4. PHY
    5. Security
    6. Tamper Detection
    7. Wireless

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ACSAC 2015

    Acceptance Rates

    Overall Acceptance Rate 104 of 497 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)43
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Position-based Rogue Access Point Detection2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00055(436-442)Online publication date: 8-Jul-2024
    • (2023)A Wi-Fi-Based Passive Indoor Positioning System via Entropy-Enhanced Deployment of Wi-Fi SniffersSensors10.3390/s2303137623:3(1376)Online publication date: 26-Jan-2023
    • (2023)Niffler: Real-time Device-level Anomalies Detection in Smart HomeACM Transactions on the Web10.1145/358607317:3(1-27)Online publication date: 1-Mar-2023
    • (2023)SenCom: Integrated Sensing and Communication with Practical WiFiProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613274(1-16)Online publication date: 2-Oct-2023
    • (2023)Real-Time Identification of Rogue WiFi Connections in the WildIEEE Internet of Things Journal10.1109/JIOT.2022.322368210:7(6042-6058)Online publication date: 1-Apr-2023
    • (2022)DL-Based Physical Tamper Attack Detection in OFDM Systems with Multiple Receiver Antennas: A Performance–Complexity Trade-OffSensors10.3390/s2217654722:17(6547)Online publication date: 30-Aug-2022
    • (2022)PUFDCAWireless Communications & Mobile Computing10.1155/2022/63675792022Online publication date: 1-Jan-2022
    • (2022)Detecting Rogue Access Points Using Client-agnostic Wireless FingerprintsACM Transactions on Sensor Networks10.1145/353642319:1(1-25)Online publication date: 8-Dec-2022
    • (2022)Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833631(1722-1736)Online publication date: May-2022
    • (2022)Nearfield RF Sensing for Feature-Detection and Algorithmic Classification of Tamper AttacksIEEE Journal of Radio Frequency Identification10.1109/JRFID.2022.31966626(490-499)Online publication date: 2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media