July 2014 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Threats in IEEE 802.15.8 PAC Date.

Slides:



Advertisements
Similar presentations
Doc.: IEEE Submission May 2014, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Advertisements

Doc.: IEEE Submission July 2014 Nah-Oak Song et al.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Submission Title: [Add name of submission]
May 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Performance Evaluation of Fully Distributed.
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
March 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Fully Distributed Synchronization Scheme for.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
11/22/2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On Ranging and Security] Date Submitted:
doc.: IEEE <doc#>
August 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing and missing simulation result.
August 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing and missing simulation result.
doc.: IEEE <doc#>
<January 2002> doc.: IEEE <02/139r0> May, 2008
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Adaptive Random Access Scheme for PAC Date.
doc.: IEEE <doc#>
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
Submission Title: Proposed Text on Transmit Power Control for TGD
doc.: IEEE <doc#>
<May,2009> doc.: IEEE <doc .....> <July 2009>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Reliable data transmission Date Submitted:
doc.: IEEE <doc#>
<month year> doc.: IEEE < e> <September 2010>
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed change of terminology: frame to superframe.
doc.: IEEE <doc#>
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
<month year> <doc.: IEEE doc> July 2014
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Random access scheme for CAP and Peering Period.
July 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Updates on the random access scheme for PAC.
August 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing and missing simulation result.
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
July 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: High Efficiency RTS/CTS Handshaking Minimizing.
Submission Title: [Frame and packet structure in ]
November 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Simplified geometry for the usage model.
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Updated Proposal on Fully Distributed Synchronization.
doc.: IEEE <doc#>
March 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Overview Text for IEEE TG8 PAC Date.
doc.: IEEE <doc#>
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text for General Description of PAC Date Submitted:
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: New definitions of terminologies for PAC draft.
January 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comments on IEEE PAC Technical.
doc.: IEEE <doc#>
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Simulation Results for an NAV Setting Mechanism.
Submission Title: Proposed resolution of 4G-related comments from LB53
doc.: IEEE <doc#>
January 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comments on IEEE PAC Technical.
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text Proposal for IEEE TG8 PFD: Discovery.
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed Structure of Contention Free Period.
January 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comments on IEEE PAC Technical.
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Updated IEEE PAC Draft] Date Submitted:
<month year> doc.: IEEE <030158r0> <March 2003>
doc.: IEEE <doc#>
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Report on IEEE PAC Draft Status]
March 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Fully Distributed Synchronization Scheme for.
doc.: IEEE <doc#>
July 2003 doc.: IEEE <03/242> July 2003
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Dependable Interest Group Closing.
Submission Title: TG9ma Agenda for September Meeting
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
12/15/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AWGN Simulation Results] Date Submitted:
Presentation transcript:

July 2014 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Threats in IEEE 802.15.8 PAC Date Submitted: [14 July 2014] Source: [Byung-Jae Kwak, Kapseok Chang, Moon-Sik Lee]1, [Sangseok Yun, Sanghun Im, Jeongseok Ha]2 Company: [ETRI, Daejeon, Korea]1, [KAIST, Daejeon, Korea]2 Address: [218 Gajeong-ro, Yuseong-gu, Daejeon, Korea]1, [291 Daehak-ro, Yuseong-gu, Daejeon, Korea]2 Voice: [+82-42-860-6618], [+82-42-350-7524] E-Mail: [bjkwak@etri.re.kr]1, [ssyun@kaist.ac.kr]2 Re: Abstract: Discussion of the possible threats in IEEE 802.15.8 PAC from physical layer point of view. Purpose: Discussion Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. <author>, <company>

Security Threats in IEEE 802.15.8 PAC July 2014 Security Threats in IEEE 802.15.8 PAC July 2014 Byung-Jae Kwak et al., ETRI

July 2014 Introduction This document presents potential security threats of distributed synchronization mechanism Distributed synchronization mechanism is vulnerable to malfunction and malicious attack Just 1 malicious node can mess up the entire synchronization process Some physical layer security techniques can be used to prevent these threats effectively Byung-Jae Kwak et al., ETRI

Security Issues Confidentiality Non-repudiation Authentication July 2014 Security Issues Security Issues Confidentiality Authentication Non- repudiation Integrity Access control Availability Confidentiality Messages sent over wireless links must be encrypted Authentication Origin of messages received over wireless links must be verified Integrity Integrity of messages received over wireless links must be verified Non-repudiation User cannot deny having received nor sent Access control Access to the network should be provided only to legitimate entities Availability* The information must be available when it is needed Byung-Jae Kwak et al., ETRI

Security Threats in IEEE 802.15.8 PAC July 2014 Security Threats in IEEE 802.15.8 PAC Synchronization Malicious timing reference signal Discovery/Peering Battery drain attack Communication Eavesdropping Byung-Jae Kwak et al., ETRI

Synchronization Firefly Synchronization July 2014 Timing offset Synchronized Byung-Jae Kwak et al., ETRI

Synchronization Kuramoto metric 𝜙 : average phase July 2014 Synchronization Kuramoto metric 𝜙 : average phase 𝜙 𝑛 : phase of node 𝑛 Byung-Jae Kwak et al., ETRI

Simulation Results # of legitimate node vs. malicious node July 2014 Simulation Results # of legitimate node vs. malicious node 10 vs. 0, 9 vs. 1, 8 vs. 2 Attack model Static attack : Malicious nodes never adjust their phases with others. They just transmit timing reference signal according to their own clocks Dynamic attack : Malicious nodes change their phases randomly after transmitting timing reference signal Byung-Jae Kwak et al., ETRI

Without Malicious Nodes July 2014 Without Malicious Nodes Byung-Jae Kwak et al., ETRI

With 1 Malicious Node: static attack July 2014 With 1 Malicious Node: static attack Byung-Jae Kwak et al., ETRI

With 1 Malicious Node: worst case July 2014 With 1 Malicious Node: worst case When attacker’s phase is slower than network slightly Byung-Jae Kwak et al., ETRI

July 2014 With 1 Malicious Node Byung-Jae Kwak et al., ETRI

With 2 Malicious Nodes: static attack July 2014 With 2 Malicious Nodes: static attack Byung-Jae Kwak et al., ETRI

With 1 Malicious Node: dynamic attack July 2014 With 1 Malicious Node: dynamic attack Byung-Jae Kwak et al., ETRI

With 2 Malicious Nodes: dynamic attack July 2014 With 2 Malicious Nodes: dynamic attack Byung-Jae Kwak et al., ETRI

Conventional Techniques July 2014 Conventional Techniques EBS scheme [1] It can deal with up to 1 malicious node Just one node is not enough for security FTA-RFA scheme [2] It can deal with up to 𝑓 malicious nodes However, the network should be 5𝑓+1 connected network Byung-Jae Kwak et al., ETRI

Physical Layer Security Technique July 2014 Physical Layer Security Technique Ignore pulses from malicious nodes using some features of physical layer How do you recognize timing reference signal from a malicious device? Ex: Signalprints Location-specific channel response Received signal strength indication Byung-Jae Kwak et al., ETRI

Malicious Node Elimination July 2014 Malicious Node Elimination Network synchronized after elimination Byung-Jae Kwak et al., ETRI

Malicious Node Elimination July 2014 Malicious Node Elimination Network synchronized after elimination Byung-Jae Kwak et al., ETRI

July 2014 Conclusion Disturbance from just 1 node can perturb entire network’s synchronization Conventional approaches are not suitable for IEEE 802.15.8 PAC model Physical layer security techniques can successfully eliminate malicious node’s attack with low complexity Every user should have the ability to detect and eliminate an attack from malicious nodes for network stability Some countermeasures to attacks in physical layer (not limited to the synchronization attack) should be dictated/enforced by standard due to the distributed nature of PAC Byung-Jae Kwak et al., ETRI

July 2014 References [1] P. Yadav, J. A. McCann, “EBS: decentralized slot synchronization for broadcast messaging for low-power wireless embedded systems,” ACM COMSWARE 2011, Verona, July, 2011 [2] R. Leidenfrost, W. Elmenreich, C. Bettstetter, “Fault-tolerant averaging for self-organizing synchronization in wireless ad hoc networks,” IEEE ISWCS 2010, York, Sep., 2010 Byung-Jae Kwak et al., ETRI