Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics

A spoofing attack is a critical issue in wireless communication in embedded systems in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Since RPCs are natural phenomena, this method does not depend on information processing such as encryption technology. We call the space from which attacks achieve success "attack space". By formulating the relationship between combinations of transceivers and the attack space, this method can be used in embedded systems. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which use these RPCs simultaneously for preventing wireless spoofing-attacks. We explain the results of a validity evaluation for the proposed model based on radio-wave-propagation simulation assuming free space and a noisy environment.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[4]  Shinsuke Hara,et al.  Experimental Performance Comparison of RSSI- and TDOA-Based Location Estimation Methods , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[5]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  Mihail L. Sichitiu,et al.  Physical authentication through localization in wireless local area networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[7]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[8]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[9]  Darko Musicki,et al.  Mobile Emitter Geolocation and Tracking Using TDOA and FDOA Measurements , 2010, IEEE Transactions on Signal Processing.

[10]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[12]  Alex Orailoglu,et al.  Ensuring system security through proximity based authentication , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).