Loading [MathJax]/extensions/MathMenu.js
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield | IEEE Conference Publication | IEEE Xplore

Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield


Abstract:

Resource-constrained spectrum sensors from the Internet of Battlefield Things (IoBT) monitor the frequency spectrum to communicate over unoccupied bands, intercept enemy ...Show More

Abstract:

Resource-constrained spectrum sensors from the Internet of Battlefield Things (IoBT) monitor the frequency spectrum to communicate over unoccupied bands, intercept enemy transmissions, or decode valuable information. However, they are also susceptible to Spectrum Sensing Data Falsification (SSDF) attacks manipulating the sensing data and impacting the previous services. Detection systems based on fingerprinting and machine learning have shown promising performance while detecting existing SSDF attacks. However, novel attacks reducing their impact on sensors behaviors have not been analyzed yet. Thus, this work redesigns and reimplements seven SSDF attacks by modifying spectrum data in the sensor memory instead of at later stages in the file system. Several experiments with current intelligent detection systems demonstrated that more effort is needed from the defensive perspective since the new SSDF attacks evade their detection. In this sense, literature-based detection methods achieve less than a 0.50 True Positive Rate when detecting the new implementations of the attacks.
Date of Conference: 30 October 2023 - 03 November 2023
Date Added to IEEE Xplore: 25 December 2023
ISBN Information:

ISSN Information:

Conference Location: Boston, MA, USA
References is not available for this document.

I. Introduction

The Internet of Battlefield Things (IoBT) [1] integrates the Internet of Things (IoT) with the necessities of military scenarios where features such as security, privacy, and availability are critical. The nature of the IoBT, characterized by the constant movement of troops, vehicles, and military hardware, necessitates wireless communications [2]. Consequently, radio frequency (RF) spectrum must be securely and aptly managed to choose unoccupied frequency bands, establish secure transmissions, intercept enemy messages, and decode valuable data. In the IoBT, one of the most common strategies to enforce the aforementioned tasks involves deploying resource-constrained spectrum sensors that can monitor and decode transmissions across various radio bands [3]. These sensors offer several benefits, including portability, accuracy, simplicity, and cost-efficiency. However, they are also susceptible to cyberattacks.

Select All
1.
S. Russell and T. Abdelzaher, "The internet of battlefield things: the next generation of command control communications and intelligence (c3i) decision-making", MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 737-742, 2018.
2.
D. Papakostas, T. Kasidakis, E. Fragkou and D. Katsaros, "Backbones for internet of battlefield things", 2021 16th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS), pp. 1-8, 2021.
3.
M. Suchanski, P. Kaniewski, J. Romanik, E. Golan and K. Zubel, "Electronic warfare systems supporting the database of the radio environment maps", XII Conference on Reconnaissance and Electronic Warfare Systems, vol. 11055, pp. 180-189, 2019.
4.
E. Izycki and E.W. Vianna, "Critical infrastructure: A battlefield for cyber warfare?", ICCWS 2021 16th International Conference on Cyber Warfare and Security, pp. 454, 2021.
5.
P. S. Chatterjee, "Systematic survey on ssdf attack and detection mechanism in cognitive wireless sensor network", 2021 International Conference on Intelligent Technologies (CONIT), pp. 1-5, 2021.
6.
A. Huertas Celdrán, P. M. Sánchez Sánchez, G. Bovet, G. Martínez Pérez and B. Stiller, "Cyberspec: Behavioral fingerprinting for intelligent attacks detection on crowdsensing spectrum sensors", IEEE Transactions on Dependable and Secure Computing, pp. 1-14, 2023.
7.
A. Huertas Celdrán, P. M. Sánchez Sánchez, C. Feng, G. Bovet, G. Martínez Pérez and B. Stiller, "Privacy-preserving and syscall-based intrusion detection system for iot spectrum sensors affected by data falsification attacks", IEEE Internet of Things Journal, vol. 10, no. 10, pp. 8408-8415, 2023.
8.
S. Rajendran, R. Calvo-Palomino, M. Fuchs, B. Van den Bergh, H. Cordobés, D. Giustiniano, et al., "Electrosense: Open and Big Spectrum Data", IEEE Communications Magazine, vol. 56, no. 1, pp. 210-217, January 2018.
9.
A. Kumar and T.J. Lim, "Edima: early detection of iot malware network activity using machine learning techniques", 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289-294, 2019.
10.
A. Blaise, M. Bouet, V. Conan and S. Secci, "Botfp: Fingerprints clustering for bot detection", NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1-7, 2020.
11.
Y. Fu and Z. He, "Bayesian-inference-based sliding window trust model against probabilistic ssdf attack in cognitive radio networks", IEEE Systems Journal, vol. 14, no. 2, pp. 1764-1775, 2020.
12.
P. M. Sánchez Sánchez, A. Huertas Celdrán, T. Schenk, A. L. B. Iten, G. Bovet, G. Martínez Pérez, et al., "Studying the robustness of anti-adversarial federated learning models detecting cyberattacks in iot spectrum sensors", IEEE Transactions on Dependable and Secure Computing, 2023.
13.
S. Alrabaee, M. Khasawneh, A. Agarwal, N. Goel and M. Zaman, "Applications architectures and protocol design issues for cognitive radio networks: a survey", International Journal of Wireless and Mobile Computing, vol. 7, no. 5, pp. 415-427, 2014.
14.
M. Khasawneh and A. Agarwal, "A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks", Security and Communication Networks, vol. 2017, 2017.

Contact IEEE to Subscribe

References

References is not available for this document.