Intel Secured Location Threat Model

Slides:



Advertisements
Similar presentations
PHY Security FRD and SRD Text
Advertisements

Security for location determination at a Public Domain
Security Enhancement to FTM
Location Measurement Protocol for Unassociated STAs
Resource Negotiation for Unassociated STAs in MU Operation
802.11az Negotiation Date: Authors: May 2017 Month Year
Trigger Frame Format for az
PHY Security FRD and SRD Text
Passive Location Date: Authors: March 2017
CP-replay Threat Model for 11az
Relay Threat Model for TGaz
Locationing Protocol for 11az
Security for location determination at a Public Domain
PHY-Level Security Protection
SU Sounding Measurement Exchange and Feedback
Protected LTF Using PMF in SU and MU Modes
Ranging ID and its Lifetime Management
Month Year doc.: IEEE yy/xxxxr0 July 2015
Pre-association Security Negotiation for 11az SFD Follow up
Month Year doc.: IEEE yy/xxxxr0 July 2017
Functional Requirement for Secure Ranging
Frame Protection for 11az
Pre-association Security Negotiation for 11az SFD Follow up
Wake Up Frame to Indicate Group Addressed Frames Transmission
Availability Window Advertisement
Resource Allocation for Unassociated STAs – Follow Up
Consistency Check Across Multiple Channel Estimates
Two-sided LMR Feedback between AP and STA
Secure Ranging Measurement
Pre-Association Security Negotiation (PASN) for 11az
Improvement to TWT Parameter set selection
TWT SP initiation and termination and legacy PS
Resource Negotiation for Unassociated STAs in MU Operation
Month Year doc.: IEEE yy/xxxxr0 July 2015
First Path FTM SFD Text Date: Authors: December 2017
Existence Indication of Attacker or Jammer in LMR
An unified az Protocol Date: Authors: Nov 2016
Intel Secured Location Threat Model
Functional Requirement for Secure Ranging
Availability Window Update
Pre-Association Negotiation of Management Frame Protection (PANMFP)
802.11ba Architecture Discussion
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Replay Attack to Secured TB Ranging
Replay Attack to Secured TB Ranging
FTM Frame Exchange Authentication
Fast Session Transfer Session Setup in TVWS
PHY-Level Security Protection
11az related bits in the Extended Capabilities element
CR for CID 1115 Date: Authors: May 2019
Security in SDR & cognitive radio
Fast Session Transfer Session Setup in TVWS
Measurement Report Feedback in 11az
doc.: IEEE yy/xxxxr0 Date:
CP Replay Attack Protection
Intel Secured Location Threat Model
Secure SU and MU Ranging Measurement Procedure
AoD in Passive Ranging Date: Authors: Name Affiliations
HEz Ranging Availability Window
11az Ranging and Location Privacy
Availability Window Termination
FTM TOA measurement on non-HT duplicate PPDUs
PHY Security SRD Text Update
Location Measurement Protocol for 11ax
First Path FTM SFD Text Date: Authors: December 2017
Functional Requirements for a .11az Scalability Requirements
11az Negotiation Protocol (update)
Indicating NGV Capabilities in MAC Header
CR for CID 1115 Date: Authors: May 2019
Availability Window Advertisement
Presentation transcript:

Intel Secured Location Threat Model Month Year doc.: IEEE 802.11-yy/xxxxr0 Intel Secured Location Threat Model Date: 2017-01-16 Authors: Bar-Shalom, Abramovsky, and Chittabrata, Intel John Doe, Some Company

Abstract This submission describes a set of attacks & identifies REVmc FTM protocol vulnerabilities. It also presents a threat model proposal that identifies adversary capabilities and the derived protocol functional requirements. Bar-Shalom, Abramovsky, and Chittabrata, Intel

What is Protocol Security? Protocl Security definition: Authentication - Authenticates user identity. Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the text. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the encrypted message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Protocol Vulnerability (1): Eavesdropping Adversary Goal: Detect ISTA location Adversary Setup: FTM capable Wi-Fi NIC Laptop Method of Attack: Eavesdrop the ongoing FTM and estimate ISTA location based on measurement results (t1,t4), the RSTA’s location and own location. Motivation: Commercial intelligence Criminal activity Bar-Shalom, Abramovsky, and Chittabrata, Intel

REVmc FTM Vulnerabilities – Recap: Hyperbolic Navigation using FTM Bar-Shalom, Abramovsky, and Chittabrata, Intel

REVmc FTM Vulnerabilities – Recap: Hyperbolic Navigation using FTM – cont’d Bar-Shalom, Abramovsky, and Chittabrata, Intel

Protocol Vulnerability (1): Eavesdropping – cont’d The adversary can passively estimate the ISTA’s LOP. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Protocol Vulnerability (1): Eavesdropping – Analysis The adversary is logging the medium and processes it offline. This results in the ISTA’s LOP By eavesdropping multiple FTM sessions, interception of LOPs yields ISTA location. ISTA identity (MAC addr.) combined with its location is exposed. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Protocol Vulnerability (2.1): SW Impersonation - Data Integrity Month Year doc.: IEEE 802.11-yy/xxxxr0 Protocol Vulnerability (2.1): SW Impersonation - Data Integrity Adversary Goal: To spoof the ISTA true location to a random/false location. Adversary Setup: FTM sniffer Wi-Fi jammer (can use cheap SDR) – optional Method of Attack Use FTM NIC to imitate several RSTA Provide STA false LCI IE Provide STA false (t1,t4) values Optional: Jam ISTA from discovering beacons of true RSTA Motivation: Criminal activity Open: Could a complete ‘fixed location’ be spoofed or only range by using (t1,t4)? Is unsecured location configuration information (LCI) query consa security issue? location configuration information (LCI): As defined in IETF RFC 6225: includes latitude, longitude, and altitude, with uncertainty indicators for each. Bar-Shalom, Abramovsky, and Chittabrata, Intel John Doe, Some Company

Protocol Vulnerability (2.2): HW Impersonation - Data Integrity Adversary Goal: To spoof the ISTA true location to a false location. Adversary Setup: FTM sniffer Commercial, off-the-shelve (COTS) SDR equipment Method of Attack Send ACK to affect t4 calculation for desired false geolocation Variations: MAC level – earlier ACK PLCP– send only STF/LTF part. STF/LTF are unprotected so measurement could be easily modified. Motivation: Criminal activity Bar-Shalom, Abramovsky, and Chittabrata, Intel

HW Impersonation/Data Integrity – How to Spoof Legacy Sounding L-STF & L-LTF give the timing reference to the VHT-LTF, which could be spoofed by the adversary RSTA (AP) Transmission Bar-Shalom, Abramovsky, and Chittabrata, Intel

Summary We have demonstrated two types of security vulnerabilities of the FTM protocol, using COTS low-cost components. A SW-based attack (msec level response time) for both spoofing (active) and eavesdropping (passive) An HW-based attack (SIFS-level response time) modifying the VHT LTF and by that affecting the TOA measurement. The FRD should reflect protection against these types of adversaries. The following slides compile these types of adversaries and attacks into proposed functional requirements. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Straw poll 1 We support the following FRD requirements: The 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in associated state: Authentication - Authenticates user identity. Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the text. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the encrypted message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Y: 19 N: 0 A: 5 Bar-Shalom, Abramovsky, and Chittabrata, Intel

Motion 1 Moved by: Chris Hartman Seconded By: Chao Chun Wang Move to agree that the FRD of the 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in the associated state: Authentication - Authenticates user identity. Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the text. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the encrypted message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Moved by: Chris Hartman Seconded By: Chao Chun Wang Intel

Motion to Amend Move to amend the motion in Slide 14 to read: Move to agree that the FRD of the 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in the associated state: Authentication – Mutual authentication of initiator and responder Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the text. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the protected message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Moved by: Nehru Bhandaru Seconded: Jouni Malinen Y: 17 N: 0 A: 0 Intel

Motion 1 Moved by: Chris Hartman Seconded By: Chao Chun Wang Move to agree that the FRD of the 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in the associated state: Authentication – Mutual authentication of initiator and responder Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the text. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the protected message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Moved by: Chris Hartman Seconded By: Chao Chun Wang Y: 16 N: 2 A: 1 Motion passes Bar-Shalom, Abramovsky, and Chittabrata, Intel

Straw poll 2 We support the following FRD requirements: The 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in the unassociated state: Authentication - Mutual authentication of initiator and responder (provided there is a prior security context established). Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the message* used in 11az-positing protocol. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the protected message* has not been tampered with * - message refers to frame and/or field(s) within the frame. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Motion 2 Move to agree that the FRD of the 11az positioning protocol shall have at least one secured mode that meets all of the following security requirements in the unassociated state: Authentication - Mutual authentication of initiator and responder (provided there is a prior security context established). Encryption Algorithm - The cryptographic cipher combined with various methods for encrypting the message* used in 11az-positing protocol. Key Management - Create, distribute and maintain the keys. Message Integrity - Ensures that the encrypted message* has not been tampered with. * - message refers to frame and/or field(s) within the frame. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Straw poll 3 – Attacker Capabilities We agree that an adversary may have at least one or more of the following capabilities and limitations: [R1] An adversary that uses commercial NIC/Sniffer [R2] At most, the adversary may deploy/use two non-co-located Tx and Rx chains. [R3] The adversary shall be TOA and TOD capable on all received/transmitted frames. [R4] The adversary shall be able to compose and transmit any 802.11 packet or part of it. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Motion 3 Move to agree that an adversary may have at least one or more of the following capabilities and limitations: [R1] An adversary that uses commercial NIC/Sniffer [R2] At most, the adversary may deploy/use two non-co-located Tx and Rx chains. [R3] The adversary shall be TOA and TOD capable on all received/transmitted frames. [R4] The adversary shall be able to compose and transmit any 802.11 packet or part of it. Bar-Shalom, Abramovsky, and Chittabrata, Intel

Straw poll 4 – Protocol Requirements The 11az protocol shall have at least one secured mode that supports privacy, authenticity and integrity against adversaries with the following response time. Type A Adversary is assumed to have response time to standard-specified OTA events or scenario dependent fields of 1 msec or longer. Type B Adversary is assumed to have response time to known OTA events or known pre-defined fields of 1usec or longer (up to 1msec). Note: the STA capabilities is TBD (for both types of adversaries). Bar-Shalom, Abramovsky, and Chittabrata, Intel

Motion 4 Move to agree that the 11az protocol shall have at least one secured mode that supports privacy, authenticity and integrity against adversaries with the following response time. Type A Adversary is assumed to have response time to standard-specified OTA events or scenario dependent fields of 1 msec or longer. Type B Adversary is assumed to have response time to known OTA events or known pre-defined fields of 1usec or longer (up to 1msec). Note: the STA capabilities is TBD (for both types of adversaries). Bar-Shalom, Abramovsky, and Chittabrata, Intel