countering cross-technology jamming attack
TRANSCRIPT
![Page 1: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/1.jpg)
Countering Cross-technology Jamming Attack
Zicheng Chi1, Yan Li1, Xin Liu1, Wei Wang1, Yao Yao1, Ting Zhu1, and Yanchao Zhang2
University of Maryland, Baltimore County1
Arizona State University2
![Page 2: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/2.jpg)
2
The Internet of things is changing the world
![Page 3: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/3.jpg)
The Rapidly Growing Trend of IoT Devices
Source: Statista 3
80 billion
![Page 4: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/4.jpg)
Spectrum is shared by IoT Devices
WiFi Bluetooth
ZigBee4
2.4 GHz ISM band
![Page 5: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/5.jpg)
To share the spectrum and avoid collision, we use CSMA
5
TimeCollisions
![Page 6: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/6.jpg)
To share the spectrum and avoid collision, we use CSMA
6
Time
• Carrier-sense multiple access (CSMA)
![Page 7: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/7.jpg)
What if a malicious WiFi device intentionally disables CSMA?
7
TimeCollisions
ZigBee device is concealed jammed by WiFi device• Channel Overlapping• Wider Bandwidth• WiFi is everywhere
![Page 8: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/8.jpg)
ZigBee Packet Reception Ratio (PRR) under concealed jamming
8
![Page 9: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/9.jpg)
Impact on popular IoTs
9
Pro-Grade Motion Detector
Door Sensor
Acoustic Glass-break Detector
Smoke & CO Sensor
Severe
Severe
Severe
Severe
![Page 10: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/10.jpg)
Attack model 1: Channel Access Prevention
10
![Page 11: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/11.jpg)
Attack model 2: Packet Corruption
11
![Page 12: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/12.jpg)
Basic Idea of defense
12
• Instead of dropping WiFi and ZigBee collided signals, we disentangle the combined signals to extract ZigBee signal
![Page 13: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/13.jpg)
Observation
13
WiFi Symbol Rate: the WiFi subcarriers (312.5 KHz) of the OFDM signal carry data at the symbol rate of 250,000 symbols per second. ZigBee Chip Rate: the ZigBee’s OQPSK-DSSS modulation scheme carries data at the chip rate of 2,000,000 chips per second.
WiFi symbol rate and ZigBee chip rate reveal signal varying speed in WiFi and ZigBee signals, respectively. By utilizing this property, it is possible to disentangle the two signals if they are collided with each other.
![Page 14: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/14.jpg)
ZigBee Signal Recovering
14
• First, utilizing the diverse chip/symbol rate of ZigBee and symbol to implement a band-stop filter bank.
• Second, the distorted ZigBee signals can be compensated by the robust DSSS scheme.
• Third, using FEC to increase the probability of correct receptions
![Page 15: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/15.jpg)
Other Challenges
15
Handling Partially Collided Packets
Handling Multiple ZigBee Senders Handling an Adversary using a Different WiFi Channel
Concealed Jamming Detection
Please refer to our paper for details
![Page 16: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/16.jpg)
Experimental Setup
16
Baseline:• No Attack• Victim
Protege: our defending scheme
Metrics:• Throughput• Latency• Bit Error Rate• Packet Reception Ratio
![Page 17: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/17.jpg)
Overall throughput performance
• Our defense scheme shows much better performance than “victim” and very similar to “no attack”.
17
![Page 18: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/18.jpg)
Impact of WiFi Signal Strength
• Higher WiFi signal strength affects “victim” more while “protege” keeps stable
18
![Page 19: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/19.jpg)
Overall throughput performance
• “Victim” is vulnerable to longer WiFi packets while “protege” is stable. 19
![Page 20: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/20.jpg)
Conclusion
• We discovered a new set of attacks: concealed jamming attack in IoT networks.
20
• We proposed methods to defend against these attacks. Our generic scheme has the potential to be applied to defend from attacks among other spectrum sharing devices.
• Our extensive evaluation shows the packet reception delay can be reduced by a factor of 16 while the jammed device is protected by using our proposed method.
![Page 21: Countering Cross-technology Jamming Attack](https://reader030.vdocuments.mx/reader030/viewer/2022012915/61c57fe7959d7e2ca24d52d4/html5/thumbnails/21.jpg)
Q & A
Thanks!
21