{"title":"Wi-attack: Cross-technology Impersonation Attack against iBeacon Services","authors":"Xin Na, Xiuzhen Guo, Yuan He, Rui Xi","doi":"10.1109/SECON52354.2021.9491605","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491605","url":null,"abstract":"iBeacon protocol is widely deployed to provide location-based services. By receiving its BLE advertisements, nearby devices can estimate the proximity to the iBeacon or calculate indoor positions. However, the open nature of these advertisements brings vulnerability to impersonation attacks. Such attacks could lead to spam, unreliable positioning, and even security breaches. In this paper, we propose Wi-attack, revealing the feasibility of using WiFi devices to conduct impersonation attacks on iBeacon services. Different from impersonation attacks using BLE compatible hardware, Wi-attack is not restricted by broadcasting intervals and is able to impersonate multiple iBeacons at the same time. Effective attacks can be launched on iBeacon services without modifications to WiFi hardware or firmware. To enable direct communication from WiFi to BLE, we use the digital emulation technique of cross technology communication. To enhance the packet reception along with its stability, we add redundant packets to eliminate cyclic prefix error entirely. The emulation provides an iBeacon packet reception rate up to 66.2%. We conduct attacks on three iBeacon services scenarios, point deployment, multilateration, and fingerprint-based localization. The evaluation results show that Wi-attack can bring an average distance error of more than 20 meters on fingerprint-based localization using only 3 APs.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COFlood: Concurrent Opportunistic Flooding in Asynchronous Duty Cycle Networks","authors":"Zhichao Cao, Xiaolong Zheng, Q. Ma, Xin Miao","doi":"10.1145/3570163","DOIUrl":"https://doi.org/10.1145/3570163","url":null,"abstract":"For energy constrained wireless IoT nodes, their radios usually operate in duty cycle mode. With low maintenance and negotiation cost, asynchronous duty cycle radio management is widely adopted. To achieve fast network flooding is challenging in asynchronous duty cycle networks. Recently, concurrent flooding is a promising approach to improve the performance of network flooding. In concurrent flooding, a key challenge is how to select a set of concurrent senders to improve both flooding speed and energy efficiency. We observe that selecting neither large nor small number of concurrent senders can achieve the optimal performance in different deployments. In this paper, we propose COFlood (Concurrent Opportunistic Flooding), a practical and effective concurrent flooding protocol in asynchronous duty cycle networks. The basic idea is based on an energy-efficient flooding tree, COFlood opportunistically selects extra concurrent senders that can speed up network flooding. First, COFlood constructs an energy-efficient flooding tree in distributed manner. The non-leaf nodes are selected as senders and they can cover the entire network with low energy consumption. Moreover, we find that exploiting both early wakeup nodes and long lossy links can speed up the flooding tree based network flooding. Then, COFlood develops a light-weight method to select the nodes that meet the conditions of these two opportunities as opportunistic senders. We implement COFlood in TinyOS and evaluate it on two real testbeds. In comparison with state-of-the-art concurrent flooding protocol, completion time and energy consumption can be reduced by up to 35.3% and 26.6%.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JammingBird: Jamming-Resilient Communications for Vehicular Ad Hoc Networks","authors":"Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Shichen Zhang, Qiben Yan, Huacheng Zeng","doi":"10.1109/SECON52354.2021.9491603","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491603","url":null,"abstract":"Current data-driven intelligent transportation systems are mainly reliant on IEEE 802.11p to collect and exchange information. Despite promising performance of IEEE 802.11p in providing low-latency communications, it is still vulnerable to jamming attacks due to the lack of a PHY-layer countermeasure technique in practice. In this paper, we propose JammingBird, a novel receiver design that tolerates strong constant jamming attacks. The enablers of JammingBird are two MIMO-based techniques: Jamming-resistant synchronizer and jamming suppressor. Collectively, these two new modules are able to detect, synchronize, and recover desired signals under jamming attacks, regardless of the PHY-layer technology employed by the jammers. We have implemented JammingBird on a vehicular testbed and conducted extensive experiments to evaluate its performance in three common vehicular scenarios: Parking lots (0~15 mph), local traffic areas (25~45 mph), and highways (60~70 mph). In our experiments, while the jamming attacks degrade the throughput of conventional 802.11p-based receivers by 86.7%, JammingBird maintains 83.0% of the throughput on average. Experimental results also show that JammingBird tolerates the jamming signals with 25 dB stronger power than the desired signals.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoyu Wang, Hao Zhou, N. Freris, Wangqiu Zhou, Xing Guo, Xiangyang Li
{"title":"CALM: Contactless Accurate Load Monitoring via Modality Distillation","authors":"Xiaoyu Wang, Hao Zhou, N. Freris, Wangqiu Zhou, Xing Guo, Xiangyang Li","doi":"10.1109/SECON52354.2021.9491624","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491624","url":null,"abstract":"The rapid proliferation of Smart Grids calls for a more in-depth understanding of user energy consumption behaviors, based on large data volumes collected by various sources of sensors such as voltmeter and ammeter. Non-Intrusive Load Monitoring (NILM) is a single sensor solution, which can effectively disaggregate individual appliance states from measurements only at the interface to the power source, albeit at the cost of requiring circuit modifications thus introducing suspension of services and potential safety hazards. To overcome the undesirable attribute of NILM and achieve a safe yet highly accurate solution, we devise a contactless sensing system based on inductive current measurements that can conduct load disaggregation without tampering with the power system. Despite using single modality, i.e., the inductive current, our scheme attains state-of-the-art accuracy in existing multi-modality datasets by leveraging modality distillation technique to handle arbitrary input structure. Our main contributions enlist: (1) devising and deploying the first, to the best of our knowledge, purely contactless non-intrusive load disaggregation system; (2) the design of an oracle-apprentice network structure to leverage multi-modality input for training, while operating with single modality; (3) a high estimation accuracy of 95.44% and 96.21%, respectively, is attested on two public datasets, which proves the efficiency of our method.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication through Sensing of Tongue and Lip Motion via Smartphone","authors":"Aslan B. Wong","doi":"10.1109/SECON52354.2021.9491596","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491596","url":null,"abstract":"Current voice-based user authentication explores the unique characteristics from either the voiceprint or mouth movements, which are at risk to replay attacks. During speaking, the vocal tract, tongue, and lip, including the static shape and dynamic movements, expose individual uniqueness, and adversaries hardly imitate them. Moreover, most voice-based user authentications are passphrase-dependent, which significantly reduces the user experience. Therefore, our work aims to employ the individual uniqueness of vocal tract, tongue, lip movement to realize user authentication on a smartphone. This paper presents a new authentication framework to identify smartphone users through articulation, namely tongue and lip motion reading. The main idea is to capture acoustic and ultrasonic signals from a mobile phone and analyze the fine-grained impact of articulation movement on the uttered words. We currently develop a passphrase-independent authentication model by analyzing the articulation in continuous speech, exploring different scenarios, and creating a passphrase-independent authentication model.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134610187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Imtiazul Haque, M. Rahman, Dong Chen, H. Kholidy
{"title":"BIoTA: Control-Aware Attack Analytics for Building Internet of Things","authors":"Nur Imtiazul Haque, M. Rahman, Dong Chen, H. Kholidy","doi":"10.1109/SECON52354.2021.9491621","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491621","url":null,"abstract":"Modern building control systems adopt demand control heating, ventilation, and cooling (HVAC) for increased energy efficiency. The integration of the Internet of Things (IoT) in the building control system can determine real-time demand, which has made the buildings smarter, reliable, and efficient. As occupants in a building are the main source of continuous heat and CO2 generation, estimating the accurate number of people in real-time using building IoT (BIoT) system facilities is essential for optimal energy consumption and occupants’ comfort. However, the incorporation of less secured IoT sensor nodes and open communication network in the building control system eventually increases the number of vulnerable points to be compromised. Exploiting these vulnerabilities, attackers can manipulate the controller with false sensor measurements and disrupt the system’s consistency. The attackers with the knowledge of overall system topology and control logics can launch attacks without alarming the system. This paper proposes a building internet of things analyzer (BIoTA) framework1 that assesses the smart building HVAC control system’s security using formal attack modeling. We evaluate the proposed attack analyzer’s effectiveness on the commercial occupancy dataset (COD) and the KTH live-in lab dataset. To the best of our knowledge, this is the first research attempt to formally model a BIoT-based HVAC control system and perform an attack analysis.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shubha, Tanmoy Sen, Haiying Shen, Matthew Normansell
{"title":"A Diverse Noise-Resilient DNN Ensemble Model on Edge Devices for Time-Series Data","authors":"S. Shubha, Tanmoy Sen, Haiying Shen, Matthew Normansell","doi":"10.1109/SECON52354.2021.9491607","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491607","url":null,"abstract":"Many applications such as healthcare and transportation on edge devices will use deep neural network (DNN) prediction based on time-series data collected by the devices. However, the existence of noises in the on-device sensors negatively impacts the sensing output of the DNN models. The state-of-the-art time-series based DNN approaches can deal with Gaussian noise but cannot effectively handle other types of noises in spite of the existence of different types of noises such as shot, burst, transient noises, and their combination. In this paper, we propose an ensemble-based DNN model, namely E–Sense, which consists of different expert models for different noises and shows higher prediction accuracy. Since an edge device may have limited resources to run a large DNN model, we further propose a novel searching-based model compression method called E−Comp that uses knowledge distillation to compress E−Sense to a smaller DNN model while maintaining the accuracy. Our real experiments on live sensor data and trace-driven experiments on three real traces show that E–Sense outperforms other methods in accuracy, and E–Comp reduces 27% inference time without sacrificing accuracy compared with other DNN compression methods. We also distributed our source code.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sining Yang, Dian-xi Shi, Yingxuan Peng, Wei Qin, Yongjun Zhang
{"title":"Joint Communication-Motion Planning for UAV Relaying in Urban Areas","authors":"Sining Yang, Dian-xi Shi, Yingxuan Peng, Wei Qin, Yongjun Zhang","doi":"10.1109/SECON52354.2021.9491604","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491604","url":null,"abstract":"In this paper, we consider a challenging surveillance scenario where there could exist line-of-sight (LOS) propagations and non-line-of-sight (NLOS) propagations in air-to-ground (ATG) channel and air-to-air (ATA) channel due to obstacles in urban areas, and a ground mobile robot is deployed to survey this area and transmit collected data to a remote base station via an unmanned aerial vehicle (UAV) relay. In this scenario, we aim to plan the optimal transmit power and trajectory of the UAV relay to minimize energy consumption while maintaining the communication quality. Existing works typically rely on the free-space path loss model and the statistical channel model, thus neglect the positions and shapes of obstacles and may fail in practical NLOS scenarios. In this paper, we first exploit the end-to-end packet error rate (PER)-based communication model, which captures the LOS propagation and NLOS propagation. Then, taken the information of obstacles in environment into consideration, we propose an UAV relay-assisted joint communication-motion planning (UAV-JCMP) method for minimizing the total energy consumption in urban areas. By decomposing the concave problem into two subproblems and dividing its domain into several convex subdomains according to LOS conditions, we further get the optimal solution. At last, numerical results demonstrate that substantial energy-efficient improvements can be achieved over methods that only optimize communication energy consumption and methods using statistical channel model. We further discuss the robustness of UAV-JCMP method towards terrain measurement error.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117154307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Better off This Way!: Ubiquitous Accessibility Digital Maps via Smartphone-based Crowdsourcing","authors":"Heba Aly, M. Youssef, A. Agrawala","doi":"10.1109/SECON52354.2021.9491623","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491623","url":null,"abstract":"Accessibility maps are key to support individuals with disabilities to actively participate in the society. The Americans with Disabilities Act (ADA) defines minimum requirements for roads and other public accommodation spaces to be accessible. Yet, it is sufficient to have one accessible route in a place, and available digital-maps lack accessibility information to help finding that accessible route.In this paper, we present the AccessMap system to automatically extend road-maps with accessibility semantics. It enables indoor and outdoor spaces to be automatically marked as visually-impaired and/or wheel-chaired accessible/inaccessible. AccessMap passively crowdsources measurements from sensors available in the users' smartphones to detect accessibility semantics. It employs a probabilistic framework to build and update the map with the semantics. Evaluation of AccessMap in different countries shows that it can passively detect a wide-range of accessibility semantics with high precision and recall (on average around 89.8% and 86.3% respectively). Furthermore, its probabilistic crowdsourcing framework increases the generated map’s average precision and recall to 98.7% and 99% with as few as seven encounters per semantic.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123501651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yilin Yang, Rafael G. L. D'Oliveira, Salim el Rouayheb, X. Yang, H. Seferoglu, Yingying Chen
{"title":"Secure Coded Computation for Efficient Distributed Learning in Mobile IoT","authors":"Yilin Yang, Rafael G. L. D'Oliveira, Salim el Rouayheb, X. Yang, H. Seferoglu, Yingying Chen","doi":"10.1109/SECON52354.2021.9491589","DOIUrl":"https://doi.org/10.1109/SECON52354.2021.9491589","url":null,"abstract":"Distributed computation plays an essential role in cloud and edge computing. Data such as images, audio, and text can be represented as matrices to facilitate efficient computation, especially in the domains of distributed machine learning, computer vision, and signal processing. Many coded computation algorithms have been proposed for big data applications to securely partition and distribute matrices to parallel worker devices. However, these proposals have yet to be adapted for mobile platforms beyond theoretical means. Mobile IoT networks can greatly benefit from secure distributed computing, however, commercial devices such as smartphones and tablets are much more limited in resources compared to platforms in data centers, requiring special design considerations. We investigate existing distribution schemes from an operational complexity and security viewpoint and study their performance in several mobile IoT networks, identifying performance bottlenecks in regards to communication and computation costs. From our findings, we propose new, scalable algorithms optimized to handle the unique constraints of mobile IoT. Extensive evaluations of our proposals on publicly available image classification datasets show how distributed learning can be specially optimized to enhance runtime and battery performance on mobile IoT by over 10×.","PeriodicalId":120945,"journal":{"name":"2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}