Securing IoT Devices by Exploiting Backscatter Propagation Signatures

05/31/2021
by   Zhiqing Luo, et al.
0

The low-power radio technologies open up many opportunities to facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes IoT devices vulnerable to many active attacks. Recent advances use an antenna array to extract fine-grained physical-layer signatures to identify the attackers, which adds burdens in terms of energy and hardware cost to IoT devices. In this paper, we present ShieldScatter, a lightweight system that attaches low-cost tags to single-antenna devices to shield the system from active attacks. The key insight of ShieldScatter is to intentionally create multi-path propagation signatures with the careful deployment of tags. These signatures can be used to construct a sensitive profile to identify the location of the signals' arrival, and thus detect the threat. In addition, we also design a tag-random scheme and a multiple receivers combination approach to detect a powerful attacker who has the strong priori knowledge of the legitimate user. We prototype ShieldScatter with USRPs and tags to evaluate our system in various environments. The results show that even when the powerful attacker is close to the legitimate device, ShieldScatter can mitigate 95 attack attempts while triggering false alarms on just 7

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2018

ShieldScatter: Improving IoT Security with Backscatter Assistance

The lightweight protocols and low-power radio technologies open up many ...
research
08/20/2018

Authenticating On-Body Backscatter by Exploiting Propagation Signatures

The vision of battery-free communication has made backscatter a compelli...
research
12/28/2020

Detecting Colluding Sybil Attackers in Robotic Networks using Backscatters

Due to the openness of wireless medium, robotic networks that consist of...
research
12/10/2019

Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation

Wireless networking opens up many opportunities to facilitate miniaturiz...
research
05/21/2020

Authenticating On-Body IoT Devices: An Adversarial Learning Approach

By adding users as a new dimension to connectivity, on-body Internet-of-...
research
07/22/2020

Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces

Small, low-cost IoT devices are typically equipped with only a single, l...
research
11/10/2020

Proof of Authenticity of Logistics Information with Passive RFID Tags and Blockchain

In tracing the (robotically automated) logistics of large quantities of ...

Please sign up or login with your details

Forgot password? Click here to reset