Channel Spoofer: Defeating Channel Variability and Unpredictability

Slides:



Advertisements
Similar presentations
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Advertisements

The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
FM-BASED INDOOR LOCALIZATION TsungYun 1.
Capacity of Wireless Channels
Enhancing Secrecy With Channel Knowledge
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 Yue Qiao Computer Science and Engineering Sep AirExpress: Enabling Seamless In-band.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
WINLAB Improving RF-Based Device-Free Passive Localization In Cluttered Indoor Environments Through Probabilistic Classification Methods Rutgers University.
Introduction to Quantum Key Distribution
A Modified Non Coherent PN Code Acquisition Scheme Rethnakaran P UbiNetics
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Performance Analysis of Complementary Code Keying (CCK) Modulation in a Multi-Path Channel Paul Yang, University of California at Berkeley SURE Program.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
A Simple Transmit Diversity Technique for Wireless Communications -M
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University ICC 2008 This work is supported in part.
Quantum Cryptography Antonio Acín
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Security Vulnerability and Countermeasures of Frequency Offset Correction in a Systems Hanif Rahbari, Marwan Krunz, and Loukas Lazos Department of.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Selective Jamming Attacks in Wireless Networks Alejandro Proaño - Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.
On the (im)possibility of perennial message recognition protocols without public-key cryptography Peeter Laud Cybernetica AS & University of Tartu
Jamming for good: a fresh approach to authentic communication in WSNs
Key Exchange References: Applied Cryptography, Bruce Schneier
Packet Leashes: Defense Against Wormhole Attacks
What's the buzz about HORNET?
Transmission Security via Fast Time-Frequency Hopping
MinJi Kim, Muriel Médard, João Barros
PHY-Level Security Protection
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Indoor Propagation Modeling
Practical Cryptographic Civil GPS Signal Authentication
Concept of Power Control in Cellular Communication Channels
MAC: Message Authentication Code
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Dynamic Security in Wireless Communications
Recent developments in group key exchange
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Quantum Cryptography Scott Roberts CSE /01/2001.
Efficient Short-Password Key Exchange (ESP-KE)
Whitening-Rotation Based MIMO Channel Estimation
Information-Theoretic Security
Physical Unclonable Functions and Applications
Lecture 4.1: Hash Functions, and Message Authentication Codes
DK presents Division of Computer Science, KAIST
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security vs. Sequence Length Considerations]
Date Submitted: November 11, 2005]
PHY-Level Security Protection
(Digital Modulation Basics)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Secure Diffie-Hellman Algorithm
Zhiqing Luo1, Wei Wang1, Jiang Xiao1,
“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing
PHY Signaling for Adaptive Repetition of 11p PPDU
Presentation transcript:

Channel Spoofer: Defeating Channel Variability and Unpredictability Yue Qiao, Kannan Srinivasan, and Anish Arora Presenter: Jiaqi Xu Computer Science and Engineering December 15th, 2017

Why Physical Layer Security? Security challenges in wireless communication Open nature of wireless medium Challenging security management Resource limit: power, computation Adversaries with growing computation power Cryptographic solutions Physical layer solutions Infrastructure Yes No Computation assumption

An Assumption of PHY Layer Security PHY primitives extracted from wireless channel Believed to be unbreakable given certain physical constraints A cornerstone of physical layer security: unpredictability and uncontrollability of wireless channel

Wireless Channel Basics reflector 1 reflector 2 reflector 3   Bob Alice time transmitted impulse amplitude time received impulses amplitude

Security Properties of Wireless Channel Channel Reciprocity Identical paths in both direction Channel Decorrelation Over space Over time reflector 1 reflector 2 Bob   Alice Eve

Channel Reciprocity Based Secret Sharing   channel observer: Bob transmitter: Alice     ✗ channel controller: Carol Can wireless channel between a transmitting and receiving pair be controllable and predictable in a fine-grained manner by a third party? Is knowing all the propagation paths the only way to perform prediction?

Channel Spoofing Using Obfucator (Ox) Reflective walls, etc Bob Hbc Hac Hc Alice Carol: Fullduplex Ox Create dominant known paths and ignore all the other trivial contributors to the wireless channel. Conventional

Challenges Preservation of Channel Reciprocity Does forwarding hurt channel reciprocity? 2. Effectiveness of Channel Spoofing How much power is needed? 3. Detectability of Channel Spoofing How detectable is Channel Spoofer?

Problem statement Soundness: Alice’s and Bob’s success rate in continually extracting shared secrets is preserved. Disclosure: Alice’s and Bob’s extracted secrets are predicted by Channel Spoofer with non-trivial probability (≫ 50%). Undetectability: Alice and Bob do not detect the presence of Channel Spoofer by physical layer approaches that can be implemented with their system resources.   Alice     Bob       Carol: Channel Spoofer

System Model Alice Bob Carol: Channel Spoofer       Channel reciprocity still holds when the forwarder modifies the channel in a symmetric way!

System Model RSS Measurements CSI Measurements Even for fine-grained channel information, their estimates are still close to each other !

Preservation of Channel Reciprocity Channel Spoofer     Alice Bob   RSS approaches CSI approaches Channel reciprocity holds regardless of whether or not the channel gain from Alice to Channel Spoofer is comparable to that from Bob to Channel Spoofer.

Effectiveness of Channel Spoofing Environment: stable vs fast changing Channel Spoofing scheme: random vs natural RSS approaches (random) CSI approaches (random) CSI approaches (natual) When the power of the received signals through the Cs is 6 dB higher than that not through the Cs, channel spoofing is effective ( prediction accuracy > 93%)

Effectiveness of Channel Spoofing Improvement on prediction accuracy: Drop least confident bits : quantization boundary vs SNR CSI-2bit natural coding scheme: quantization boundary based CSI-2bit natural coding scheme: SNR based

Effectiveness of Channel Spoofing Prediction accuracy against a 128-bit key by dropping least confident bits based on quantization boundaries (natural coding) with 12dB power ratio and 20% dropping rate, the chance that Channel Spoofer would predict the remaining 80% bits (∼102 bits) with no error is 0.336. Number of tries: 2 ∗ 10^8 vs 3 ∗ 10^38

Preempt Countermeasures Countermeasures against Channel Spoofing Analyses of Power and Channel Statistics - Monitor abrupt power changes. - Tell the artificial channel generated by channel spoofer. Using a Protector Transient and non-transient PHY Signatures

Countermeasure: Protector       Alice Bob       Carol: channel Spoofer Protector .) Does a Channel Spoofer create similar channels across space? If so, can we use a third party Protector to detect this abnormity?

Countermeasure: Protector Alice Bob 3m 20cm 10cm Channel Spoofer Protector Protector does not help to tell the presence of a Channel Spoofer

Countermeasure: PARADIS-kNN PARADIS-kNN does not help to tell the presence of a Channel Spoofer

Conclusion This work demonstrates fined-grained channel information can be easily controlled and predicted Channel reciprocity based secret sharing are vulnerable to our proposed attack

Q&A Thanks