Radio propagation characteristics-based spoofing attack prevention on wireless connected devices

Mihiro Sonoyama, Takatsugu Ono, Haruichi Kanaya, Osamu Muta, Smruti R. Sarangi, Inoue Koji

研究成果: ジャーナルへの寄稿記事

抄録

A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not depending on information processing such as encryption technology, this method can be applied to sensing devices etc. which commonly have many resource restrictions. We call the space from which attacks achieve success as the “attack space.” In order to confine the attack space inside of the target system to prevent spoofing attacks from the outside, formulation of the relationship between combinations of transceivers and the attack space is necessary. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which uses these RPCs simultaneously. We take a tire pressure monitoring system (TPMS) as a case study of this method and execute a security evaluation based on radio-wave-propagation simulation. The simulation results assuming multiple noise environments all indicate that it is possible to eliminate the attack possibility from a distant location.

元の言語英語
ページ(範囲)322-334
ページ数13
ジャーナルJournal of information processing
27
DOI
出版物ステータス出版済み - 1 1 2019

Fingerprint

Radio transmission
Radio waves
Transceivers
Tires
Wave propagation
Authentication
Cryptography
Transmitters
Monitoring
Communication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

これを引用

Radio propagation characteristics-based spoofing attack prevention on wireless connected devices. / Sonoyama, Mihiro; Ono, Takatsugu; Kanaya, Haruichi; Muta, Osamu; Sarangi, Smruti R.; Koji, Inoue.

:: Journal of information processing, 巻 27, 01.01.2019, p. 322-334.

研究成果: ジャーナルへの寄稿記事

@article{5e87de2d8d444e738835194cac070e5a,
title = "Radio propagation characteristics-based spoofing attack prevention on wireless connected devices",
abstract = "A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not depending on information processing such as encryption technology, this method can be applied to sensing devices etc. which commonly have many resource restrictions. We call the space from which attacks achieve success as the “attack space.” In order to confine the attack space inside of the target system to prevent spoofing attacks from the outside, formulation of the relationship between combinations of transceivers and the attack space is necessary. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which uses these RPCs simultaneously. We take a tire pressure monitoring system (TPMS) as a case study of this method and execute a security evaluation based on radio-wave-propagation simulation. The simulation results assuming multiple noise environments all indicate that it is possible to eliminate the attack possibility from a distant location.",
author = "Mihiro Sonoyama and Takatsugu Ono and Haruichi Kanaya and Osamu Muta and Sarangi, {Smruti R.} and Inoue Koji",
year = "2019",
month = "1",
day = "1",
doi = "10.2197/ipsjjip.27.322",
language = "English",
volume = "27",
pages = "322--334",
journal = "Journal of Information Processing",
issn = "0387-6101",
publisher = "Information Processing Society of Japan",

}

TY - JOUR

T1 - Radio propagation characteristics-based spoofing attack prevention on wireless connected devices

AU - Sonoyama, Mihiro

AU - Ono, Takatsugu

AU - Kanaya, Haruichi

AU - Muta, Osamu

AU - Sarangi, Smruti R.

AU - Koji, Inoue

PY - 2019/1/1

Y1 - 2019/1/1

N2 - A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not depending on information processing such as encryption technology, this method can be applied to sensing devices etc. which commonly have many resource restrictions. We call the space from which attacks achieve success as the “attack space.” In order to confine the attack space inside of the target system to prevent spoofing attacks from the outside, formulation of the relationship between combinations of transceivers and the attack space is necessary. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which uses these RPCs simultaneously. We take a tire pressure monitoring system (TPMS) as a case study of this method and execute a security evaluation based on radio-wave-propagation simulation. The simulation results assuming multiple noise environments all indicate that it is possible to eliminate the attack possibility from a distant location.

AB - A spoofing attack is a critical issue in wireless communication in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Not depending on information processing such as encryption technology, this method can be applied to sensing devices etc. which commonly have many resource restrictions. We call the space from which attacks achieve success as the “attack space.” In order to confine the attack space inside of the target system to prevent spoofing attacks from the outside, formulation of the relationship between combinations of transceivers and the attack space is necessary. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which uses these RPCs simultaneously. We take a tire pressure monitoring system (TPMS) as a case study of this method and execute a security evaluation based on radio-wave-propagation simulation. The simulation results assuming multiple noise environments all indicate that it is possible to eliminate the attack possibility from a distant location.

UR - http://www.scopus.com/inward/record.url?scp=85064051867&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064051867&partnerID=8YFLogxK

U2 - 10.2197/ipsjjip.27.322

DO - 10.2197/ipsjjip.27.322

M3 - Article

VL - 27

SP - 322

EP - 334

JO - Journal of Information Processing

JF - Journal of Information Processing

SN - 0387-6101

ER -