Marcin Poturalski, Manuel Flury,

Slides:



Advertisements
Similar presentations
UWB Channels – Capacity and Signaling Department 1, Cluster 4 Meeting Vienna, 1 April 2005 Erdal Arıkan Bilkent University.
Advertisements

Multiuser Detection for CDMA Systems
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
ISWCS’06, Valencia, Spain 1 Blind Adaptive Channel Shortening by Unconstrained Optimization for Simplified UWB Receiver Design Authors: Syed Imtiaz Husain.
Effectiveness of Distance Decreasing Attacks Against Impulse Radio Ranging Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
IC-29 Security and Cooperation in Wireless Networks 1 Secure and Robust Aggregation in Sensor Networks Parisa Haghani Supervised by: Panos Papadimitratos.
A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks Reza Shokri Tutors: Panos Papadimitratos, Marcin Poturalski 29 January 2008.
Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan Seshan (CMU) Presented by Lei Yang in CS595H, W08 1 Understanding and Mitigating.
Communication Technology Laboratory Wireless Communication Group Partial Channel State Information and Intersymbol Interference in Low Complexity UWB PPM.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
The National Centres of Competence in Research are managed by the Swiss National Science Foundation on behalf of the Federal Authorities NCCR MICS review.
1 A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
July, 2005 Doc: IEEE a Qi, Li, Hara, Kohno (NICT) SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Performance Evaluation of Coded UWB-IR on Multipath Fading Channels
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.
April 25th 2005Doc: IEEE a Zafer Sahinoglu, Mitsubishi Electric SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area.
Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
Doc: IEEE a 19 July Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Non-coherent.
Automatic Gain Control Response Delay and Acquisition in Direct- Sequence Packet Radio Communications Sure 2007 Stephanie Gramc Dr. Noneaker.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:
A Location-aided Energy-aware Routing Method for UWB Sensor Networks Xizhi An and Kyungsup Kwak Graduate School of Information Technology and Telecommunications,
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
Gain (dB) Benefits –Resistance to jamming –Resistance to detection –Sharing of channels among multiple users Applications –Cellular code-division multiple-access.
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
Dynamic Data Rate and Transmit Power Adjustment in IEEE Wireless LANs Pierre Chevillat, Jens Jelitto, and Hong Linh Truong IBM Zurich Research Laboratory.
Performance Analysis of Complementary Code Keying (CCK) Modulation in a Multi-Path Channel Paul Yang, University of California at Berkeley SURE Program.
Doc: IEEE a 19 July Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Non-coherent.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
September, 2005 Doc: IEEE a Qi, Li, Umeda, Hara and Kohno (NICT) SlideTG4a1 Project: IEEE P Working Group for Wireless Personal.
July 2005 France Telecom doc.: IEEE a Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc: IEEE a 5 July 2005 Z. Sahinoglu, Mitsubishi Electric 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
UWB Channels: Time-Reversal Signaling NEWCOM, Dept. 1 Meeting Paris, 13 May 2005 Erdal Arıkan Bilkent University Ankara, Turkey.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Chapter-7 Special topics in ranging Prof. Jae-Young Pyun Presentation By Amod Pudasaini WHYNET lab Date: 5 th May
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
MAC Protocols for Sensor Networks
Department of Electrical Engineering, National Taiwan University of Science and Technology EURASIP Journal on Wireless Communications and Networking.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
April 25th 2005Doc: IEEE a Zafer Sahinoglu, Mitsubishi Electric SlideTG4a1 Project: IEEE P Working Group for Wireless Personal Area.
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
<month year> doc.: IEEE < e>
Date Submitted: [24 June 2005]
Submission Title: [Robust Ranging Algorithm for UWB radio]
Submission Title: [Robust Ranging Algorithm for UWB radio]
Date Submitted: [18 July 2005]
Date Submitted: November 11, 2005]
Signal Waveform Comparisons
Submission Title: [Robust Ranging Algorithm for UWB radio]
Signal Waveform Comparisons
Presentation transcript:

The Cicada Attack: Degradation and Denial of Service Attacks in IR Ranging Marcin Poturalski, Manuel Flury, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec

Outline Context: ranging and secure ranging The Cicada attack Attack performance evaluation Countermeasures Conclusion

Ranging Ranging can be applied in a number of applications Localization and navigation of robot fleets ranging

Ranging Ranging can be applied in a number of applications Tracking of goods ranging

Ranging Many are security sensitive! Ranging can be applied in a number of applications Physical access control Many are security sensitive! ranging

Ranging Many are security sensitive! Ranging can be applied in a number of applications Physical access control Many are security sensitive! Impersonate

Ranging Many are security sensitive! Ranging can be applied in a number of applications Tracking of goods Many are security sensitive! ranging

Ranging Many are security sensitive! Ranging can be applied in a number of applications Tracking of goods Many are security sensitive! Manipulate ranging measurement

How to make ranging secure Securing Ranging How to make ranging secure ?

Securing Ranging Distance bounding protocols S. Brands and D. Chaum. “Distance Bounding Protocols.” EUROCRYPT’93 S. Capkun, L. Buttyan and J. Hubaux. “SECTOR: secure tracking of node encounter in multi-hop wireless networks.” SASN’03 L. Bussard and W. Bagga. “Distance-Bounding Proof of Knowledge to Avoid Real- Time Attacks.” SEC’05 G.P Hancke and M.G. Kuhn. “An RFID distance bounding protocol.” SecureComm’05 C. Meadows, P. Syverson and L. Chang. “Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.” SecureComm’06 J. Reid, J.M.G Nieto, T. Tang and B. Senadji, “Detecting Relay Attacks with Timing-Based Protocols” ASIACCS’07 D. Singelee and B. Preneel. “Distance bounding in noisy environments”. ESAS’07 …

Securing Ranging Distance bounding protocol example: Provides an upper-bound on the computed distance Not possible to decrease the measures distance Messages travel at the speed of light Possible to increase the distance Relay delay messages A B NV tRTT (P ⊕ NV, NP) (NV,P,NP,MACPV(NV,P,NP))

Securing Ranging Not quite Do distance bounding protocols solve the problem …? Physical layer attacks against distance bounding J. Clulow, G.P. Hancke, M.G. Kuhn, T. Moore. “So Near and yet So Far: Distance-Bounding Attacks in Wireless Networks.” ESAS’06 M. Flury, M. Poturalski, P. Papadimitratos, J.-P. Hubaux, J.-Y. Le Boudec. “Effectiveness of Distance-Decreasing Attacks Against Impulse Radio Ranging.” WiSec’10 This paper: New kind of physical layer attack against (IR) ranging Not quite

Impulse Radio Ranging Precise ranging in dense multipath environments The first path is not necessarily the strongest path

The Ranging Process Transmitter T Receiver R Preamble: frame sequence modulated by ternary preamble code Transmitter T 1. Coarse synchronization Lock on strongest path 2. Fine synchronization Back-search for first path Receiver R

The Cicada Attack Denial of Service: Ranging not possible Preamble: frame sequence modulated by ternary preamble code Transmitter T Malicious transmitter M Receiver R Denial of Service: Ranging not possible

The Cicada Attack Degradation of Service: Range decreased Preamble: frame sequence modulated by ternary preamble code Transmitter T Cicada attack Malicious transmitter M Back-search finds bogus first path Receiver R Degradation of Service: Range decreased

Denial vs Degradation Degradation is more stealthy than denial Potentially more severe We focus on an adversary aiming at degradation

The Cicada Attack Very simple to mount Limited effectiveness Requires only an IR transmitter Oblivious to preamble code Limited effectiveness Mild distance decrease Back-search window size, e.g., 20m Random distance decrease

Example Attack

Simulation Setup Transmitter T Receiver R Malicious transmitter M SNRT SNRM Transmitter T Receiver R Malicious transmitter M IEEE 802.15.4a PHY Mandatory LPRF mode Indoor NLOS channel model Attack performance for 3 energy detection receivers: Vanilla – basic energy detection receiver MINF, PICNIC – receivers robust to multi user interference We simulate entire packet reception process

Vanilla Receiver Packet not received Failure of SFD detection or data decoding Packet received Packet received ToA decreased by > 4ns Packet not received Failure of synchronization SNRT = 20dB

Vanilla Receiver SNRT = 20dB The cicada signal sometimes misses the back-search window

Vanilla Receiver SNRT = 20dB Increase cicada signal rate

Vanilla Receiver SNRT = 20dB SNRT = 20dB Increase cicada signal rate

Vanilla Receiver Degradation takes place: SNRT = 20dB Degradation takes place: If the cicada signal is not lost in noise If the cicada signal is lower than the signal of T

MINF Receiver Designed to cope with benign multi-user interference during fine synchronization Z. Sahinoglu and I. Guvenc. “Multiuser interference mitigation in noncoherent UWB ranging via nonlinear filtering.” EURASIP Journal on Wireless Communication Networks, 2006 D. Dardari, A. Giorgetti, and M.Z. Win. “Time-of-arrival estimation of UWB signals in the presence of narrowband and wideband interference.” ICUWB, 2007

MINF Receiver Assume coarse synchronization is achieved Cicada signal is present in every frame Min filter will not remove it samples in frame Remove frames according to code i Apply moving minimum filter frames benign interferer (code j) user of interest (code i)

Attack Performance against MINF SNRT = 20dB Vanilla SNRT = 20dB Attack performs slightly worse than for Vanilla

PICNIC Receiver Design to cope with benign multi-user interference during synchronization M. Flury, R. Merz, and J.-Y. Le Boudec. “Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks.” PIMRC, 2009 Adversary exploits the interference robustness of the PICNIC receiver to improve attack performance SNRT = 20dB PICNIC PICNIC SNRT = 20dB SNRT = 20dB Vanilla

Countermeasures to Degradation Do not perform back-search Loose in benign case ranging performance Perform multiple range measurements Cicada attack increases variance of measurements Modify the modulation scheme Time-hopping in the preamble? Secure synchronization algorithms Complexity and energy consumption is an issue

Conclusion Cicada attack Security must be addressed at all layers Simple attack able to decrease distance measured by IR ranging protocols Exploits fundamental difficulty in distinguishing legitimate and interfering signals Security must be addressed at all layers

http://lca.epfl.ch/projects/snd marcin.poturalski@epfl.ch To learn more… http://lca.epfl.ch/projects/snd marcin.poturalski@epfl.ch

Extra slides

PICNIC Receiver Design to cope with benign multi-user interference during synchronization M. Flury, R. Merz, and J.-Y. Le Boudec. “Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks.” PIMRC, 2009 Component 1: Power Independent Detection (PID) Component 2: Interference Cancelation Detect presence of alternative preamble code If detected, estimate and remove interference Threshold 0 : x < t 1 : x ≥ t + … Correlator output

Attack Performance against PICNIC SNRT = 20dB Vanilla SNRT = 20dB Attack performs slightly worse than for Vanilla Denial sets in at low SNRM

Attack Performance against PICNIC SNRT = 20dB + … Threshold 0 : x < t 1 : x ≥ t SNRT = 20dB Correlator output is maximized for all cicada peaks Make cicada signal more sparse?

Attack Performance against PICNIC SNRT = 20dB SNRT = 20dB Adversary exploits the interference robustness of the PICNIC receiver to improve attack performance

Attack Performance against PICNIC 8 SNRT = 20dB SNRT = 20dB Attack with high rate cicada signal

Distance decrease Back-search window size 64ns