Physical layer security WPAN Spoofing ZigBee Networks a b s t r a c t Low-data-rate wireless networks incorporated in critical infrastructure applications can be protected through 128-bit encryption keys and address-based access control lists. However, these bit-level credentials are vulnerable to interception, extraction and spoofing using software tools available free of charge on the Internet. Recent research has demonstrated that wireless physical layer device fingerprinting can be used to defend against replay and spoofing attacks. However, radio frequency (RF) fingerprinting typically uses expensive signal collection systems; this is because fingerprinting wireless devices with low-cost receivers has been reported to have inconsistent accuracy. This paper demonstrates a robust radio frequency fingerprinting process that is consistently accurate with both highend and low-cost receivers. Indeed, the results demonstrate that low-cost software-defined radios can be used to perform accurate radio frequency fingerprinting and to identify spoofing attacks in critical IEEE 802.15.4-based infrastructure networks such as ZigBee.Published by Elsevier B.V.
IntroductionLow-cost, low-data-rate wireless connectivity is pervasive in critical infrastructure applications. IEEE 802.15.4-based wireless personal area networks (WPANs) operate in one-quarter of the surveyed wireless industrial control systems [1], communicate with tens of millions of smart meters [7] and are trusted components in numerous civilian and military healthcare facilities [12,21]. Security in such systems is often an afterthought, exposing critical WPANs to malicious attacks. A recent analysis of WPANs in ten U.S. cities revealed that healthcare and utility control networks operate with faulty security or none at all [17]. The threats to the critical infrastructure and other WPAN applications [15,20] are ever increasing as open source attack tools such as KillerBee [24] and Api-do [9] become more sophisticated.WPAN security is challenging due to the cost, power and computational constraints levied on IEEE 802.15.4-based hardware. Secure, albeit computationally-intensive, intrusion detection algorithms have been developed for high-power networks, but they are impractical for WPAN applications. While networklayer encryption is a viable option for critical networks, attackers can readily extract keys from inexpensive WPAN hardware when tamper resistance is not a design priority [2,8].A promising solution for securing WPANs without placing additional burden on end devices is radio frequency (RF) fingerprinting. In such a system, an "air monitor" passively observes WPAN packets and identifies message spoofing (e.g., http://dx.(B.W. Ramsey). i n t e r n a t i o n a l j o u r n a l o f c r i t i c a l i n f r a s t r u c t u r e p r o t e c t i o n ] ( ] ] ] ] ) ] ] ] -] ] ] Please cite this article as: B.W. Ramsey, et al., Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers, International Journal of Critical Infrastructu...