Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
175 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces (2402.13773v3)

Published 21 Feb 2024 in cs.CR

Abstract: Wireless communication infrastructure is a cornerstone of modern digital society, yet it remains vulnerable to the persistent threat of wireless jamming. Attackers can easily create radio interference to overshadow legitimate signals, leading to denial of service. The broadcast nature of radio signal propagation makes such attacks possible in the first place, but at the same time poses a challenge for the attacker: The jamming signal does not only reach the victim device but also other neighboring devices, preventing precise attack targeting. In this work, we solve this challenge by leveraging the emerging RIS technology, for the first time, for precise delivery of jamming signals. In particular, we propose a novel approach that allows for environment-adaptive spatial control of wireless jamming signals, granting a new degree of freedom to perform jamming attacks. We explore this novel method with extensive experimentation and demonstrate that our approach can disable the wireless communication of one or multiple victim devices while leaving neighboring devices unaffected. Notably, our method extends to challenging scenarios where wireless devices are very close to each other: We demonstrate complete denial-of-service of a Wi-Fi device while a second device located at a distance as close as 5 mm remains unaffected, sustaining wireless communication at a data rate of 25 Mbit/s. Lastly, we conclude by proposing potential countermeasures to thwart RIS-based spatial domain wireless jamming attacks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (58)
  1. WiFi says "hi!" back to strangers! In Proceedings of the 19th ACM Workshop on Hot Topics in Networks, pages 132–138, 2020.
  2. Non-cooperative Wi-Fi localization & its privacy implications. In Proceedings of the 28th Annual International Conference On Mobile Computing And Networking, pages 570–582, 2022.
  3. Selective jamming of LoRaWAN using commodity hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pages 363–372, Melbourne VIC Australia, November 2017. ACM.
  4. Smart jamming attacks in 5G new radio: A review. In 10th Annual Computing and Communication Workshop and Conference (CCWC), pages 1010–1015. IEEE, 2020.
  5. Wireless communications through reconfigurable intelligent surfaces. IEEE Access, 7:116753–116773, 2019.
  6. The reflectarray antenna. IEEE Transactions on Antennas and Propagation, 11(6):645–651, 1963.
  7. Malicious mmwave reconfigurable surface: eavesdropping through harmonic steering. In Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications, HotMobile ’22, page 54–60, New York, NY, USA, 2022. Association for Computing Machinery.
  8. Wavefront manipulation attack via programmable mmwave metasurfaces: From theory to experiments. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’23, pages 317–328, New York, NY, USA, June 2023. Association for Computing Machinery.
  9. Metawave: Attacking mmwave sensing with meta-material-enhanced tags. In The 30th Network and Distributed System Security (NDSS) Symposium, volume 2023, 2023.
  10. Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transactions on Networking, 19(1):286–298, 2011.
  11. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open Journal of the Communications Society, 1:957–975, 2020.
  12. Richard Hedley Clarke. A statistical theory of mobile-radio reception. Bell System Technical Journal, 47(6):957–1000, 1968.
  13. Metawave Corporation. KLONE & TURBO (5G Connectivity) | Metawave, 2024. https://www.metawave.com/kloneturbo (Accessed: February 03, 2024).
  14. Optimally diverse communication channels in disordered environments with tuned randomness. Nature Electronics, 2(1):36–41, 2019.
  15. Towards resilient 5G: Lessons learned from experimental evaluations of LTE uplink jamming. In IEEE International Conference on Communications Workshops (ICC Workshops), pages 1–6. IEEE, 2019.
  16. Greenerwave. Our technology - Greenerwave, 2024. https://greenerwave.com/our-technology/, (Accessed: February 03, 2024).
  17. Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, pages 21–28, 2019.
  18. Jamming and anti-jamming techniques in wireless networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4):197–215, 2014.
  19. Truncate after preamble: PHY-based starvation attacks on IoT networks. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pages 89–98, 2020.
  20. Performance of DSSS against repeater jamming. In 13th IEEE International Conference on Electronics, Circuits and Systems, pages 858–861. IEEE, 2006.
  21. Open source reconfigurable intelligent surface for the frequency range of 5 GHz WiFi. In IEEE International Symposium On Antennas And Propagation (ISAP), pages 1–2. IEEE, 2023.
  22. Modeling and design of electronically tunable reflectarrays. IEEE Transactions on Antennas and Propagation, 55(8):2200–2210, 2007.
  23. The road towards 6G: A comprehensive survey. IEEE Open Journal of the Communications Society, 2:334–366, 2021.
  24. Shaping complex microwave fields in reverberating media with binary tunable metasurfaces. Scientific Reports, 4(1):6693, 2014.
  25. Shaping electromagnetic waves with flexible and continuous control of the beam directions using holography and convolution theorem. Scientific Reports, 9(1):11825, 2019.
  26. Carving secure Wi-Fi zones with defensive jamming. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pages 53–54, 2012.
  27. RIS-jamming: Breaking key consistency in channel reciprocity-based key generation, March 2023.
  28. A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems. Ad Hoc Networks, 87:1–16, 2019.
  29. A communications jamming taxonomy. IEEE Security & Privacy, 14(1):47–54, 2016.
  30. Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications Letters, 18(1):110–113, 2013.
  31. IRS-Based wireless jamming attacks: When jammers can attack without power. IEEE Wireless Communications Letters, 9(10):1663–1667, 2020.
  32. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys & Tutorials, 11(4):42–56, 2009.
  33. Cover chirp jamming: Hybrid jamming–deception attack on FMCW radar and its countermeasure. In Proceedings of the Workshop on Attacks and Solutions in Hardware Security, pages 39–50, 2023.
  34. Reflectarray antennas: Theory, designs, and applications. 2018.
  35. Near-field-focused microwave antennas: Near-field shaping and implementation. IEEE Antennas and Propagation Magazine, 59(3):42–53, 2017.
  36. Sensorless, permissionless information exfiltration with Wi-Fi micro-jamming. In 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018.
  37. A machine learning approach for detecting and classifying jamming attacks against OFDM-based UAVs. In Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, pages 1–6, 2021.
  38. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials, 13(2):245–257, 2010.
  39. Richard Poisel. Modern Communications Jamming Principles and Techniques, Second Edition. Artech house, 2011.
  40. Selective jamming attacks in wireless networks. In IEEE International Conference on Communications, pages 1–6. IEEE, 2010.
  41. Review paper on hardware of reconfigurable intelligent surfaces. IEEE Access, 2023.
  42. mmSpoof: Resilient spoofing of automotive millimeter-wave radars using reflect array. In 2023 IEEE Symposium on Security and Privacy (SP), pages 1807–1821, May 2023.
  43. PHY-layer security is no alternative to cryptography. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pages 160–162, Boston Massachusetts, July 2017. ACM.
  44. Akbar M Sayeed. Deconstructing multiantenna fading channels. IEEE Transactions on Signal Processing, 50(10):2563–2579, 2002.
  45. Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pages 111–121, 2017.
  46. Metasurface-in-the-middle attack: From theory to experiment. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec ’22, pages 257–267, New York, NY, USA, May 2022. Association for Computing Machinery.
  47. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time. In IEEE Symposium on Security and Privacy, pages 174–188. IEEE, 2013.
  48. Mirror, mirror on the wall: Wireless environment reconfiguration attacks based on fast software-controlled surfaces. In Proceedings of the ACM on Asia Conference on Computer and Communications Security, pages 208–221, 2022.
  49. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks (TOSN), 7(2):1–29, 2010.
  50. 6G wireless systems: Vision, requirements, challenges, insights, and opportunities. Proceedings of the IEEE, 109(7):1166–1199, 2021.
  51. Machine learning-based jamming detection and classification in wireless networks. In Proceedings of the ACM Workshop on Wireless Security and Machine Learning, pages 39–44, 2023.
  52. Full-duplex meets reconfigurable surfaces: RIS-assisted SIC for full-duplex radios. In IEEE International Conference on Communications (ICC), pages 1106–1111. IEEE, 2022.
  53. On limitations of friendly jamming for confidentiality. In IEEE symposium on security and privacy, pages 160–173. IEEE, 2013.
  54. Metasurface-enabled smart wireless attacks at the physical layer. Nature Electronics, 6(8):610–618, 2023.
  55. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network. IEEE Communications Magazine, 58(1):106–112, 2019.
  56. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46–57, 2005.
  57. Ristealth: Practical and covert physical-layer attack against WiFi-based intrusion detection via reconfigurable intelligent surface. In 21th ACM Conference on Embedded Networked Sensor Systems (SenSys 2023), 2023.
  58. Et tu Alexa? when commodity WiFi devices turn into adversarial motion sensors. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020, NDSS ’20. Internet Society, 2020.
Citations (1)

Summary

We haven't generated a summary for this paper yet.