| Literature DB >> 30558353 |
Lan Luo1, Yue Zhang2, Bryan Pearson3, Zhen Ling4, Haofei Yu5, Xinwen Fu6.
Abstract
The emerging connected, low-cost, and easy-to-use air quality monitoring systems have enabled a paradigm shift in the field of air pollution monitoring. These systems are increasingly being used by local government and non-profit organizations to inform the public, and to support decision making related to air quality. However, data integrity and system security are rarely considered during the design and deployment of such monitoring systems, and such ignorance leaves tremendous room for undesired and damaging cyber intrusions. The collected measurement data, if polluted, could misinform the public and mislead policy makers. In this paper, we demonstrate such issues by using a.com, a popular low-cost air quality monitoring system that provides an affordable and continuous air quality monitoring capability to broad communities. To protect the air quality monitoring network under this investigation, we denote the company of interest as a.com. Through a series of probing, we are able to identify multiple security vulnerabilities in the system, including unencrypted message communication, incompetent authentication mechanisms, and lack of data integrity verification. By exploiting these vulnerabilities, we have the ability of "impersonating" any victim sensor in the a.com system and polluting its data using fabricated data. To the best of our knowledge, this is the first security analysis of low-cost and connected air quality monitoring systems. Our results highlight the urgent need in improving the security and data integrity design in these systems.Entities:
Keywords: IoT; MITM; air quality monitoring; data integrity; low-cost sensor
Year: 2018 PMID: 30558353 PMCID: PMC6308815 DOI: 10.3390/s18124451
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System Architecture from User’s Perspective.
Figure 2Screenshot from the a.com Map in reference for application popularity.
Figure 3Experiment Setup.
Figure 4Discovered System Architecture.
Figure 5Communication Protocol between an a.com Sensor and Servers.
Data format description for M-1A and M-1B.
| HTTP Request Header | Description | HTTP Request Header | Description |
|---|---|---|---|
| mac | MAC address | pm2_5_atm | PM2.5 w/ correction |
| lat | latitude of the sensor location | pm10_0_atm | PM10.0 w/ correction |
| lon | longitude of the sensor location | pm1_0_cf_1 | PM1.0 w/o correction |
| key1 | key K-1A (K-1B) | pm2_5_cf_1 | PM2.5 w/o correction |
| key2 | key K-2A (K-2B) | pm10_0_cf_1 | PM10.0 w/o correction |
| uptime | uptime in sec | p_0_3_um | particles ≤ 0.3 |
| rssi | signal strength | p_0_5_um | particles ≤ 0.5 |
| current_temp_f | temperature | p_1_0_um | particles ≤ 1.0 |
| current_humidity | humidity | p_2_5_um | particles ≤ 2.5 |
| current_dewpoint_f | dewpoint temperature | p_5_0_um | particles ≤ 5.0 |
| pressure | pressure | p_10_0_um | particles ≤ 10.0 |
| pm1_0_atm | PM1.0 w/ correction |
Data format description for M-2A and M-2B.
| HTTP Request Header | Description |
|---|---|
| key | ThingSpeak key K-1A (K-1B) for identification |
| field1 - field8 | a part of sensor measurements |
Data format description for M-3A and M-3B.
| HTTP Request Header | Description |
|---|---|
| key | ThingSpeak key K-2A (K-2B) for identification |
| field1 - field10 | the other part of sensor measurements |
Response format from the www.a.com server.
| Scenarios | Response |
|---|---|
| MAC address and keys correct | geographic coordinates |
| MAC address correct but keys wrong | geographic coordinates and correct keys |
| MAC address wrong | NOT FOUND |
Discovered MAC address prefixes assigned to Espressif Systems.
| MAC Prefixes | MAC Prefixes |
|---|---|
| 18:FE:34 | 24:0A:C4 |
| 24:B2:DE | 2C:3A:E8 |
| 30:AE:A4 | 3C:71:BF |
| 54:5A:A6 | 5C:CF:7F |
| 60:01:94 | 68:C6:3A |
| 84:0D:8E | 84:F3:EB |
| 90:97:D5 | A0:20:A6 |
| A4:7B:9D | AC:D0:74 |
| B4:E6:2D | BC:DD:C2 |
| C4:4F:33 | CC:50:E3 |
| D8:A0:1D | DC:4F:22 |
| EC:FA:BC | 80:7D:3A |
Figure 6AQI fluctuation for Scenario B. (a) Before data pollution; (b) After data pollution.
Figure 7AQI fluctuation for Scenario A. (a) Before data pollution; (b) After data pollution.
Figure 8AQI fluctuation for Scenario B with optimized data pollution strategy.
Figure 9MAC capturing waiting time in wardriving experiments. (a) Time for each experiment; (b) Time distribution box plot.
Figure 10Single MAC screening time box plot figure.
Theoretical efficiency of MAC address scanning with different number of parallel computing workers.
|
| 5 | 100 | 300 | 500 | 800 | 1000 |
|
|
|
|
|
|
|
|
|
| 4474 | 224 | 75 | 45 | 28 | 23 |