Ghostbuster: Detecting the Presence of Hidden Eavesdroppers

Slides:



Advertisements
Similar presentations
OFDM Transmission over Wideband Channel
Advertisements

(Orthogonal Frequency Division Multiplexing )
Determining and Characterizing the Number of Frequency Hopping Interferers using Time and Frequency Offset Estimation Alican Gök Prof. Danijela Cabric.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
MIMO Communication Systems
R2 R3 R4 R5 AP The throughput does not grow in the same way as wireless demands Limited wireless spectrum & unlimited user demands AP R1 R6.
Whole-Home Gesture Recognition Using Wireless Signals —— MobiCom’13 Author: Qifan Pu et al. University of Washington Presenter: Yanyuan Qin & Zhitong Fei.
Networking with Wi-Fi like Connectivity Victor Bahl, Ranveer Chandra, Thomas Moscibroda, Microsoft Research Rohan Murty*, Matt Welsh Harvard University.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Channel Estimation for Mobile OFDM
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Implement a 2x2 MIMO OFDM-based channel measurement system (no data yet) at 2.4 GHz Perform baseband processing and digital up and down conversion on Nallatech.
A Wireless Spectrum Analyzer in Your Pocket
1 EQ2430 Project Course in Signal Processing and Digital Communications - Spring 2011 On phase noise and it effect in OFDM communication system School.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
Sep 08, 2005CS477: Analog and Digital Communications1 Example Systems, Signals Analog and Digital Communications Autumn
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
DOF: A Local Wireless Information Plane Stanford University Steven HongSachin Katti 1 August 17, 2011.
Phase Tracking During VHT-LTF
Lecture 1. References In no particular order Modern Digital and Analog Communication Systems, B. P. Lathi, 3 rd edition, 1998 Communication Systems Engineering,
1 Techniques to control noise and fading l Noise and fading are the primary sources of distortion in communication channels l Techniques to reduce noise.
Wireless Communication Technologies 1 Outline Introduction OFDM Basics Performance sensitivity for imperfect circuit Timing and.
Support WiFi and LTE Co-existence
NTU Confidential Baseband Transceiver Design for the DVB-Terrestrial Standard Baseband Transceiver Design for the DVB-Terrestrial Standard Advisor : Tzi-Dar.
1 Lab. 13 SISO Wireless System I  In a typical communication system, receiving starts with synchronization.  For a packet-based system, it includes –
Omid Abari Hariharan Rahul, Dina Katabi and Mondira Pant
NTUEE Confidential Toward MIMO MC-CDMA Speaker : Pei-Yun Tsai Advisor : Tzi-Dar Chiueh 2004/10/25.
Presented by: Sohaib Malik.  A radio whose functionality can be changed by changes in only the software  Key feature: ◦ Reprogramability ◦ Reusability.
The inner receiver structure applied to OFDM system Advisor: Yung-an kao Student: Chian Young.
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
Space Time Codes. 2 Attenuation in Wireless Channels Path loss: Signals attenuate due to distance Shadowing loss : absorption of radio waves by scattering.
A Simple Transmit Diversity Technique for Wireless Communications -M
MIMO: Challenges and Opportunities Lili Qiu UT Austin New Directions for Mobile System Design Mini-Workshop.
PAPR Reduction Method for OFDM Systems without Side Information
Introduction to OFDM and Cyclic prefix
Antenna Developments for WiFi Phase Applications Diversity MIMO.
Security Vulnerability and Countermeasures of Frequency Offset Correction in a Systems Hanif Rahbari, Marwan Krunz, and Loukas Lazos Department of.
Achieving Single Channel, Full Duplex Wireless Communication
1.) Acquisition Phase Task:
244-6: Higher Generation Wireless Techniques and Networks
PHY Design Considerations for af
MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS (MIMO)
CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion
LECTURE 07: TIME-DELAY ESTIMATION AND ADPCM
Optimal Receivers in Multipath: Single-Carrier and OFDM
Suman Bhunia and Shamik Sengupta
Walking Speed Detection from 5G Prototype System
Wednesday, November 07, 2018 Little Wireless and Smart Antennas Jack H. Winters 2/26/04.
Ambuj Varshney1, Oliver Harms1, Carlos Perez-Penichet1,
Klaus Witrisal Signal Processing and Speech Communication Lab
John Ketchum, Bjorn A. Bjerke, and Irina Medvedev Qualcomm, Inc.
Wednesday, November 21, 2018 Little Wireless and Smart Antennas Jack H. Winters 2/26/04.
UWB Receiver Algorithm
Adwait Dongare, Revathy Narayanan et al. Carnegie Mellon University
Whitening-Rotation Based MIMO Channel Estimation
doc.: n Jeff Gilbert Atheros Communications
doc.: n Jeff Gilbert Atheros Communications
Achieving Single Channel, Full Duplex Wireless Communication
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
No Time to Countdown: Backing Off in Frequency Domain
Preambles for MIMO channel estimation
(Digital Modulation Basics)
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
3D Localization for Sub-Centimeter Sized Devices
MIMO I: Spatial Diversity
AoD in Passive Ranging Date: Authors: Name Affiliations
Implicit Channel Sounding in IEEE (Feasibility Study)
Presentation transcript:

Ghostbuster: Detecting the Presence of Hidden Eavesdroppers Anadi Chaman, Jiaming Wang, Jiachen Sun Romit Roy Choudhury, Haitham Hassanieh UIUC Presenter: Haofan Cai CMPE 253, 02/06/2019

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Motivation

Motivation

Motivation Eavesdropping is a longstanding problem! No way to regulate or know who is listening on the wireless channel!

Defense Against Eavesdropping: Encryption Encryption breaks due to security loopholes. Vulnerability in WPA2 [SIGSAC’17] Low power devices employ weak or no encryption. Ultra-Low Power RFIDs [S&P’09, CCS;09, Usenix’12, Defcon’13, NSDI’15] Side Channel Attacks [CRYPTO’14, CHES’15, CCS’16, RSA’16, MobiCom’15] Medical Implants [S&P’10, SIGCOMM’11]

View the problem at a different angle: Can we detect the hidden presence of wireless eavesdroppers?

What is Ghostbuster ? A system that can reliably detect an eavesdropper in the presence of ongoing transmissions. Does not require any modifications to current transmitters and receivers. Implemented and empirically tested against SDR & WiFi cards based eavesdroppers.

Eavesdropper’s Digital Receiver Why can Ghostbuster find eavesdropper? Key Observation: Even passive receivers leakage RF signals on to the wireless medium Mixer Amplifier Baseband Processing RF Leakage Local Oscillator Eavesdropper’s Digital Receiver Receiver’s oscillator creates a sinusoid signal at the carrier frequency of operation

Profiling RF Leakage Simplified receiver architecture is COST WiFi cards frequency of the leaked signal fl can be expressed as a function of the center frequency fc for each one of the architectures:

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations Conclusions

Challenge 1:Weak Leakage RF Leakage

Challenge 1: Weak Leakage Noise RF Leakage RF Leakage is extremely weak: buried under noise floor Hard to detect with today’s receivers?

A Potential Solution Average noise by taking an FFT over a large time window 200 ms Time FFT 2.45 GHz Frequency

A Potential Solution Average noise by taking an FFT over a large time window 1 sec Time FFT 2.45 GHz Leakage Frequency

A Potential Solution Average noise by taking an FFT over a large time window 1.5 sec Time FFT Leakage 2.45 GHz Frequency

Challenge 2: On-going transmission However, large time windows are bound to include transmitted packets! Time Time

Challenge 2: On-going transmission However, large time windows are bound to include transmitted packets! Time Leakage is orders of magnitude weaker than TX signals. FFT 2.45 GHz Frequency

Challenge 3: Leakage from legitimate receivers Leakage is orders of magnitude weaker than TX signals. Other legitimate receivers also create RF leakage. How to extract the eavesdropper’s leakage in the presence of ongoing transmissions and leakage from other receivers?

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Leverage carrier frequency offset (CFO) Ghostbuster Step 1 Null On Going Transmissions Spatial Domain: MIMO Frequency Domain: Cancel Artifacts Step 2 Separate Leakages from other receivers Leverage carrier frequency offset (CFO)

Leverage carrier frequency offset (CFO) Ghostbuster Step 1 Null On Going Transmissions Spatial Domain: MIMO Frequency Domain: Cancel Artifacts Step 2 Separate Leakages from other receivers Leverage carrier frequency offset (CFO)

MIMO(multiple-input and multiple-output) Transmitter y1(t) ht1 x(t) ht2 y2(t) Ghostbuster he1 e(t) he2 Eavesdropper y1(t)=he1e(t)+ht1x(t) y2(t)=he2e(t)+ht2x(t)

OFDM (Orthogonal frequency-division multiplexing) OFDM bins Transmitted signal :

Ghostbuster ⋯ MIMO alone is not sufficient. Time Discontinuities Discontinuities in time result in artifacts & spurious frequencies that are very hard to cancel. Symbol 1 Symbol 2 Symbol 3 Symbol N ⋯

Leverage carrier frequency offset (CFO) Ghostbuster Step 1 Null On Going Transmissions Spatial Domain: MIMO Frequency Domain: Cancel Artifacts Step 2 Separate Leakages from other receivers Leverage carrier frequency offset (CFO)

Discontinuities & Artifacts Consider a single frequency Frequency Time More samples more samples Large Time Window

Discontinuities & Artifacts Consider a single frequency Frequency Time More samples more samples Large Time Window

Discontinuities & Artifacts Consider a single frequency Frequency Time More samples more samples Large Time Window

Discontinuities & Artifacts Consider a single frequency Frequency Time More samples more samples Large FFT Large Time Window

Discontinuities & Artifacts Consider a single frequency Frequency Time More samples more samples Large FFT Artifacts Large Time Window

Discontinuities & Artifacts Artifacts add up from all frequencies & symbols Leakage Artifacts add up from all packets in the time window

Canceling Artifacts Need to estimate the continuous (Off-Grid) frequency positions & coefficients Solve: Fix , solve for :Weighted Least Squares Fix ,,solve for. : Convex for good initial estimates of Solve using gradient descent.

Canceling Artifacts Solves for given a fixed In this case, the error function E is convex in . The optimization is a weighted least squares problem and has the following closed-form solution:

Canceling Artifacts Solves for given a fixed In this case, the error function E is non-convex in due to the complex exponentials. However, if we have good initial estimates of that are with in a small interval around fk, then the function becomes convex within this interval and we can use gradient descent to minimize it.

Leverage carrier frequency offset (CFO) Ghostbuster Step 1 Null On Going Transmissions Spatial Domain: MIMO Frequency Domain: Cancel Artifacts Step 2 Separate Leakages from other receivers Leverage carrier frequency offset (CFO)

Separate Leakages from other receivers What about leakage from other receivers? Leverage CFOs caused by hardware imperfections (Typically 100s Hz ~few kHz ) Use time windows of 1 sec to tens of seconds Count the number of legitimate receivers NL, number of detected receivers ND, if ND≠ NL, 2.45 GHz Frequency

Separate Leakages from other receivers What about leakage from other receivers? Leverage CFOs caused by hardware imperfections (Typically 100s Hz ~few kHz ) Use time windows of 1 sec to tens of seconds Count the number of legitimate receivers NL, number of detected receivers ND, if ND≠ NL, 2.45 GHz Frequency

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Implementation Implementing Ghostbuster use USRP(Software Defined Radios) Tested 16 WiFi Cards & 4 USRP daughterboards as eavesdroppers.

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Experiment Results SNR in dB versus Ghostbuster’s distance from a Wifi card eavesdropper with FFT window size of 1 sec. SNR in dB versus Ghostbuster’s distance from a USRP eavesdropper with FFT window size of 10 ms

Impact of FFT window size Hit rate for WiFi card and USRP eavesdroppers versus FFT window size when the eavesdropper is placed 1 m away from Ghostbuster Hit rate for WiFi card and USRP eavesdroppers versus FFT window size when the eavesdropper is placed 5 m away from Ghostbuster

Confusion Matrix Confusion matrix of classification probabilities obtained on experiments on USRP receivers in the range 1 m to 5 m. Confusion matrix of classification probabilities obtained on experiments on WiFi cards

WiFi Cards placed in monitor mode Leakage measured 1m away using 1 sec FFT Window Operating @ 2.4 GHz Operating @ 5 GHz 30 25 20 15 10 5 Peak SNR of Leakage in dB AR93XX AR9271 AR9485 BCM4360 BCM4352 BCM43526 BMC4329 BCM43xx AR9170 Intel 5100 Intel 7260 Intel 3165 Intel 7265 Intel 8260 Intel 5300 Intel 4965 l Broadcom Intel Qualcomm-Atheros Chipsets cover range of hardware architectures & WiFi protocols: 802.11a/b/g/n/ac

WiFi Cards placed in monitor mode Leakage measured 1m away using 1 sec FFT Window Operating @ 2.4 GHz Operating @ 5 GHz 30 25 20 15 10 5 Peak SNR of Leakage in dB NOT SUPPORTED NOT SUPPORTED NOT SUPPORTED BCM4360 BCM4352 BMC4329 BCM43xx Intel 5100 Intel 7260 Intel 3165 Intel 7265 Intel 8260 Intel 4965 AR93XX AR9170 AR9271 AR9485 BCM43526 Intel 5300 l Broadcom Intel Qualcomm-Atheros Chipsets cover range of hardware architectures & WiFi protocols: 802.11a/b/g/n/ac

Result Summary Ghostbuster can detect: WiFi Card eavesdroppers up to 7 meters away. USRP eavesdroppers up to 14 meters away. Detection Accuracy & Range improves with: Larger time windows. (10 ms < 100 ms < 1 sec) More MIMO chains. (2 MIMO < 3 MIMO < 4 MIMO) Ghostbuster can detect eavesdropper in the presence of transmissions & other receivers: With 95% accuracy with 1 other receivers. With 89.9% accuracy with 3 other receivers.

Outline Motivation What is Ghostbuster Design Challenges System Architecture Implementation Evaluation Results Limitations & Conclusions

Limitations & Conclusions Ghostbuster can detect eavesdroppers in the presence of ongoing transmissions & other receivers without requiring any modifications to current transmitters and receivers. A lot of future work: What if number of legitimate RXs is not known? Can we localize the eavesdropper? Can we reduce computational complexity? Opens the door for more practical applications: Detecting Remote Explosives More Efficient Carrier Sense Synchronizing Clocks through Leakage