ShieldScatter: Improving IoT Security with Backscatter Assistance

The lightweight protocols and low-power radio technologies open up many opportunities to facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes IoT devices vulnerable to many active attacks due to the lack of sophisticated security protocols. Recent advances advocate the use of an antenna array to extract fine-grained physical-layer signatures to mitigate these active attacks. However, it adds burdens in terms of energy consumption and hardware cost that IoT devices cannot afford. To overcome this predicament, we present ShieldScatter, a lightweight system that attaches battery-free backscatter tags to single-antenna devices to shield the system from active attacks. The key insight of ShieldScatter is to intentionally create multi-path propagation signatures with the careful deployment of backscatter tags. These signatures can be used to construct a sensitive profile to identify the location of the signals' arrival, and thus detect the threat. We prototype ShieldScatter with USRPs and ambient backscatter tags to evaluate our system in various environments. The experimental results show that even when the attacker is located only 15 cm away from the legitimate device, ShieldScatter with merely three backscatter tags can mitigate 97% of spoofing attack attempts while at the same time trigger false alarms on just 7% of legitimate traffic.

[1]  Tao Jiang,et al.  Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation , 2018, IEEE Journal on Selected Areas in Communications.

[2]  Marco Gruteser,et al.  Detecting Identity Spoofs in IEEE 802.11e Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  Peng Ning,et al.  Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.

[4]  Joshua R. Smith,et al.  FM Backscatter: Enabling Connected Cities and Smart Fabrics , 2017, NSDI.

[5]  Sachin Katti,et al.  Localizing Low-power Backscatter Tags Using Commodity WiFi , 2017, CoNEXT.

[6]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[7]  Yao Liu,et al.  Where are you from?: confusing location distinction using virtual multipath camouflage , 2014, MobiCom.

[8]  Xiaohui Liang,et al.  Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[9]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[10]  Jue Wang,et al.  Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.

[11]  Peng Ning,et al.  Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  R. Steele,et al.  Mobile Radio Communications , 1999 .

[13]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[14]  Mohammad Rostami,et al.  Enabling Practical Backscatter Communication for On-body Sensors , 2016, SIGCOMM.

[15]  Sachin Katti,et al.  SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.

[16]  Philip Chan,et al.  Toward accurate dynamic time warping in linear time and space , 2007, Intell. Data Anal..

[17]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .

[18]  Xiang-Yang Li,et al.  Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.

[19]  Joshua R. Smith,et al.  Wi-fi backscatter , 2014, SIGCOMM 2015.

[20]  Lajos Hanzo,et al.  Mobile Radio Communications: Second and Third Generation Cellular and WATM Systems: 2nd , 1999 .

[21]  Piotr Indyk,et al.  Efficient and reliable low-power backscatter networks , 2012, CCRV.

[22]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[23]  Prasant Mohapatra,et al.  Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.

[24]  Sneha Kumar Kasera,et al.  Advancing wireless link signatures for location distinction , 2008, MobiCom '08.

[25]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[26]  Ross A. Knepper,et al.  RF-compass: robot object manipulation using RFIDs , 2013, MobiCom.

[27]  David Wetherall,et al.  Ambient backscatter: wireless communication out of thin air , 2013, SIGCOMM.

[28]  Lei Yang,et al.  Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices , 2014, MobiCom.

[29]  KatabiDina,et al.  Efficient and reliable low-power backscatter networks , 2012 .

[30]  Prasant Mohapatra,et al.  Good Neighbor : Secure Pairing of Nearby Wireless Devices by Multiple Antennas ∗ , 2011 .

[31]  Josef Kittler,et al.  Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.

[32]  Joseph Bonneau,et al.  What's in a Name? , 2020, Financial Cryptography.

[33]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[34]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.