Hidden Terminal Emulation: An Attack in Dense IoT Networks in the Shared Spectrum Operation

The Internet of Things (IoT) has been rapidly taking steps towards commercialization. However, the dense deployment of IoT nodes - that may follow different wireless technologies - in the shared spectrum creates a new challenge to solve: secure coordination among co-located IoT nodes from different IoT networks. In this paper, we shed light on this unique challenge, and we illustrate how this challenge has the potential to create a novel vulnerability where an attacker can pose as a hidden terminal (by manipulating its radiation patterns) and interfere with transmissions from its hidden counterparts, namely hidden terminal emulation (HTE) attack. As the dense deployment of IoT nodes will aggravate such hidden terminal interference, it facilitates the HTE attacker plausible deniability to interfere with its hidden counterparts. This paper is the first to present a theoretical analysis of the feasibility of HTE attacks (i.e., successful impersonation of hidden terminals), to illustrate how it is affected by the density of IoT nodes, and to provide insights on secure IoT deployment.

[1]  Ting Wang,et al.  Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.

[2]  Jiang Xie,et al.  Detection of Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[3]  Honggang Zhang,et al.  On the limits of predictability in real-world radio spectrum state dynamics: from entropy theory to 5G spectrum sharing , 2015, IEEE Communications Magazine.

[4]  Ben Y. Zhao,et al.  Adversarial Localization against Wireless Cameras , 2018, HotMobile.

[5]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[6]  Xiaoyan Li Designing localization algorithms robust to signal strength attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Srdjan Capkun,et al.  iPhone and iPod Location Spoofing: Attacks on Public WLAN-based Positioning Systems , 2012 .

[8]  Srinivasan Seshan,et al.  Access Point Localization Using Local Signal Strength Gradient , 2009, PAM.

[9]  Symeon Chatzinotas,et al.  Dynamic Spectrum Sharing in 5G Wireless Networks With Full-Duplex Technology: Recent Advances and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.

[10]  Markus Breitenbach,et al.  The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[11]  Jiang Xie,et al.  A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks , 2008, 2008 IEEE International Conference on Communications.

[12]  Anass Benjebbour,et al.  Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[13]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[14]  Jiang Xie,et al.  Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[15]  Jiang Xie,et al.  Signaling Cost Analysis of Handoffs in a Mixed IPv4/IPv6 Mobile Environment , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[16]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[17]  Jiang Xie,et al.  Covert Spectrum Handoff: An Attack in Spectrum Handoff Processes in Cognitive Radio Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[18]  Jiang Xie,et al.  Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[19]  Richard P. Martin,et al.  Attack Detection in Wireless Localization , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[20]  Jiang Xie,et al.  Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[21]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[22]  Jiang Xie,et al.  Impact of Off-Sensing Attacks in Cognitive Radio Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[23]  Jiang Xie,et al.  A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.