Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks - Critical Infrastructure Protection VII
Conference Papers Year : 2013

Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks

Abstract

ZigBee networks are integrating rapidly into critical infrastructures such as the smart grid and public health centers. Numerous ZigBee-based smart meters have been installed in metropolitan areas and hospitals commonly employ ZigBee technology for patient and equipment monitoring. The associated ZigBee networks transport sensitive information and must be secured against exfiltration and denial-of-service attacks. Indeed, novel tools that exploit and disrupt ZigBee networks are already under development. Security monitors that can uniquely identify nodes by their radio frequency characteristics can be a valuable countermeasure if implemented in a practical manner. This paper investigates rekeying in response to suspected malicious devices that may be internal or external to a ZigBee network. It extends prior discussions of practical physical layer monitor implementation, and introduces a novel backward-compatible ZigBee message obfuscation technique based on preamble modifications. Experimental results demonstrate that common wireless ZigBee sniffers can be thwarted with 100% effectiveness without reducing packet reception to specific transceiver models.
Fichier principal
Vignette du fichier
978-3-642-45330-4_5_Chapter.pdf (2.61 Mo) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01456893 , version 1 (06-02-2017)

Licence

Identifiers

Cite

Benjamin Ramsey, Barry Mullins. Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.63-79, ⟨10.1007/978-3-642-45330-4_5⟩. ⟨hal-01456893⟩
106 View
108 Download

Altmetric

Share

More