Radio Propagation Characteristics-based Spoofing Attack Prevention on Wireless Connected Devices

A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not d...

Full description

Saved in:
Bibliographic Details
Published inJournal of Information Processing Vol. 27; pp. 322 - 334
Main Authors Sonoyama, Mihiro, Ono, Takatsugu, Kanaya, Haruichi, Muta, Osamu, Sarangi, Smruti R., Inoue, Koji
Format Journal Article
LanguageEnglish
Published Tokyo Information Processing Society of Japan 2019
Japan Science and Technology Agency
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not depending on information processing such as encryption technology, this method can be applied to sensing devices etc. which commonly have many resource restrictions. We call the space from which attacks achieve success as the “attack space.” In order to confine the attack space inside of the target system to prevent spoofing attacks from the outside, formulation of the relationship between combinations of transceivers and the attack space is necessary. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which uses these RPCs simultaneously. We take a tire pressure monitoring system (TPMS) as a case study of this method and execute a security evaluation based on radio-wave-propagation simulation. The simulation results assuming multiple noise environments all indicate that it is possible to eliminate the attack possibility from a distant location.
ISSN:1882-6652
1882-6652
DOI:10.2197/ipsjjip.27.322