Improve security of wireless sensor networks through reluctant checksum

The open wireless channel makes the data prone to being eavesdropped. Current wireless security schemes are designed to protect data through cryptography. But an adversary can still recover the secrets by eavesdropping the frames and performing off-line brute-force attacks. Capturing valid frames is fundamental for such attacks. It is generally accepted that each frame at data link layer is designed to include cyclic redundancy check (CRC) checksum sequence for integrity check. However, frame checksum sequence also helps adversary to capture correct frames and drop corrupted ones, which are fundamental to future off-line attacks. In this article, we argue that from the perspective of wireless security, it is unreasonable to include checksum sequence in data link layer frame without any protection. A reluctant checksum scheme named R-CS is proposed. Based on the inherent characteristic of wireless networks that frame error is inevitable, checksum of frame is protected by accumulated checksum algorithm in R-CS. The checksum of the frame cannot be decoded by any nodes except the receiver. Without checksum, adversaries cannot distinguish error frames from correct ones. R-CS requires little computation and communication resources, which is particularly suitable for resource-limited wireless sensor network. Our experimental results clearly demonstrate that R-CS is feasible for wireless sensor network.

[1]  Shancang Li,et al.  Securing the Internet of Things , 2017 .

[2]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[3]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[4]  Pramod K. Varshney,et al.  On ARQ-based wireless communication systems in the presence of a strategic jammer , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[5]  Steve Gold,et al.  Cracking wireless networks , 2011, Netw. Secur..

[6]  Felipe García-Sánchez,et al.  On the improvement of wireless mesh sensor network performance under hidden terminal problems , 2015, Future Gener. Comput. Syst..

[7]  Akbar Rahman,et al.  Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[8]  Suman Banerjee,et al.  Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[9]  Hugo Krawczyk,et al.  UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.

[10]  Eli Biham,et al.  TIGER: A Fast New Hash Function , 1996, FSE.

[11]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[12]  David Šafránek,et al.  CRC64 Algorithm Analysis and Verification , 2005 .

[13]  Paul G. Flikkema,et al.  Wireless physical-layer security via transmit precoding over dispersive channels: optimum linear eavesdropping , 2002, MILCOM 2002. Proceedings.