当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Spoofing-jamming attack based on cross-technology communication for wireless networks
Computer Communications ( IF 6 ) Pub Date : 2021-06-21 , DOI: 10.1016/j.comcom.2021.06.017
Demin Gao , Shuai Wang , Yunhuai Liu , Wenchao Jiang , Zhijun Li , Tian He

Cross-Technology Communication(CTC) enables that WiFi devices can talk to ZigBee devices directly without any hardware changes or gateway equipment, and WiFi occupies a much wider bandwidth (20MHz) than ZigBee (2MHz), which sheds the light on spoofing-jamming attack based on CTC, where a WiFi device, as a sophisticated attacker spoofs or jams an area in which multiple-channels sensor network operating. In this work, we attempt to emulate two ZigBee frames under different frequencies within a single WiFi frame by controlling non-continuous bands of subcarriers. In other words, a WiFi device can independently communicate with the ZigBee devices operating in two channels. In a different perspective, the application based on CTC will be significantly impaired when CTC suffers from malicious attacks such as spoofing or jamming. In our work, we implement a parallel spoofing system, called SamBee, that can spoof the ZigBee devices operating in two different channels or jam the ZigBee devices operating in five distinct channels simultaneously only using a single WiFi frame, which causes maximum damage to the network in term of corrupted communication links with low cost. We implement our design based on a USRP-N210 and MICAz hybrid platform, the results show that parallel spoofing attacks and multiple-channels jamming attacks based on CTC is feasible, and our results also provide valuable insights about the associated defense mechanisms on achieving desirable performance.



中文翻译:

基于跨技术通信的无线网络欺骗干扰攻击

跨技术通信(CTC)使 WiFi 设备可以直接与 ZigBee 设备通信,无需任何硬件更改或网关设备,并且 WiFi 占用的带宽(20MHz)比 ZigBee(2MHz)宽得多,这为欺骗干扰攻击提供了线索基于 CTC,其中 WiFi 设备作为复杂的攻击者欺骗或干扰多通道传感器网络运行的区域。在这项工作中,我们尝试通过控制子载波的非连续频带来模拟单个 WiFi 帧内不同频率下的两个 ZigBee 帧。换句话说,一个 WiFi 设备可以独立地与运行在两个信道中的 ZigBee 设备通信。换个角度看,基于CTC的应用在CTC遭受欺骗、干扰等恶意攻击时,会受到明显的损害。在我们的工作中,我们实现了一个名为 SamBee 的并行欺骗系统,它可以欺骗在两个不同信道中运行的 ZigBee 设备或仅使用单个 WiFi 帧同时干扰在五个不同信道中运行的 ZigBee 设备,这对网络造成最大损害低成本的通信链路。我们基于 USRP-N210 和 MICAz 混合平台实现了我们的设计,结果表明基于 CTC 的并行欺骗攻击和多通道干扰攻击是可行的,我们的结果还提供了有关实现理想性能的相关防御机制的宝贵见解. 它可以欺骗在两个不同通道中运行的 ZigBee 设备,或者仅使用单个 WiFi 帧就同时干扰在五个不同通道中运行的 ZigBee 设备,从而以低成本破坏通信链路对网络造成最大损害。我们基于 USRP-N210 和 MICAz 混合平台实现了我们的设计,结果表明基于 CTC 的并行欺骗攻击和多通道干扰攻击是可行的,我们的结果还提供了有关实现理想性能的相关防御机制的宝贵见解. 它可以欺骗在两个不同通道中运行的 ZigBee 设备,或者仅使用单个 WiFi 帧就同时干扰在五个不同通道中运行的 ZigBee 设备,从而以低成本破坏通信链路对网络造成最大损害。我们基于 USRP-N210 和 MICAz 混合平台实现了我们的设计,结果表明基于 CTC 的并行欺骗攻击和多通道干扰攻击是可行的,我们的结果还提供了有关实现理想性能的相关防御机制的宝贵见解.

更新日期:2021-06-25
down
wechat
bug