Secure Pairing of Wireless Devices by Multiple Antenna Diversity Liang Cai University of California, Davis Joint work with Kai Zeng, Hao Chen, Prasant.

Slides:



Advertisements
Similar presentations
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Advertisements

Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Wireless and going mobile Browsing via low energy photons.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
1 SMART ANTENNA TECHNIQUES AND THEIR APPLICATION TO WIRELESS AD HOC NETWORKS JACK H. WINTERS /11/13 碩一 謝旻欣.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
Conducted and Wireless Media (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 7, Tuesday 2/21/2007)
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Networks Olga Agnew Bryant Likes Daewon Seo.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS (MIMO)
1. 2  What is MIMO?  Basic Concepts of MIMO  Forms of MIMO  Concept of Cooperative MIMO  What is a Relay?  Why Relay channels?  Types of Relays.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
OSI Reference Model and Security COMP 423. The Physical Layer Establish and terminate the physical and logical connections to the media Manage the flow.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
1 Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup Cynthia KuoCarnegie Mellon University.
Proximity-Based Authentication of Mobile Devices Eyal de Lara Department of Computer Science University of Toronto Alex Varshavsky, Adin Scannel, Anthony.
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
July 24, 2008 SOUPS 2008 Universal Device Pairing using an Auxiliary Device Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris Polytechnic Institute of.
Bluetooth Presented by Venkateshwar R Gotur CMPT
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Infrastructure Mobility: A What-If Analysis Mahanth Gowda Nirupam Roy Romit Roy Choudhury.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
NETWORKING & SYSTEM UPDATES
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Cascading : An Overview of the Strategy Yujie Zhu and Raghupathy Sivakumar GNAN Research Group, Georgia Tech Energy-Efficient Communication Strategy for.
Wi-Fi - IEEE Standards and the future of Wi-Fi Mingnan Yuan Department of Electrical and Computer Engineering Auburn University March 9, 2016.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dirk Grunwald Dept. of Computer Science, ECEE and ITP University of Colorado, Boulder.
ICT Unit 4: Network and the effects of using them
To improve home wireless network speed Find the Perfect Spot for Your Router For best Wi-Fi coverage, the wireless router needs to be placed in.
Outline What is Wireless LAN Wireless Transmission Types
Jamming for good: a fresh approach to authentic communication in WSNs
Intro to MIS – MGS351 Network Basics
Channel Control Interim substates for adding new slaves
Packet Leashes: Defense Against Wormhole Attacks
5G Communication Technology
Network Basics Extended Learning Module E
“I don’t have to be careful, I’ve got a gun.”
Presentation transcript:

Secure Pairing of Wireless Devices by Multiple Antenna Diversity Liang Cai University of California, Davis Joint work with Kai Zeng, Hao Chen, Prasant Mohapatra

Ubiquitous Wireless Devices 2

Wi-Fi Direct Allows peer-to-peer Wi-Fi connection (without AP) Requires no new hardware Specification and certified devices are coming soon 3

Secure Device Pairing Bootstrap secure communication between two devices. Common approach: shared PIN code Problems –Many devices have no keyboard (so they hardcode secrets) –Potential user error and vulnerability Solution: using out-of-band (OOB) channels 4

Visual Channel (Seeing is Believing) 5

Acoustic Channel (Loud and Clear) 6

Motion Channel (Shake well before use) 7

Limitations of OOB Channels OOB channels are not ubiquitous on all devices Some OOB channels are vulnerable to attacks (Halevi etc. CCS ’10) 8

Desirable Device Pairing Scheme Use no out-of-band channel Does NOT require the user to –Enter secrets (simplify user tasks), or –Verify secrets (avoid user mistakes) 9

Our scheme: Good Neighbor Use the wireless channel Securely pair devices based on proximity 10

Why not using Distance-bounding Protocols Cryptographic protocol that allows verifier V to establish an upper bound on physical distance to a prover P. Based on the fact that electro-magnetic waves travel nearly at the speed of light, but cannot travel faster Rely on a rapid bit exchange and require precise clocks to measure light-speed messages 11

Threat model Attackers can –Have powerful antennas –Have exact copies of the pairing devices –Know the exact location of the pairing devices Attackers can NOT –Come in close proximity of the receiver (Eg. less than 1m). –Compromise the pairing devices. –Jam the channel 12

Naïve Approach: Inferring proximity by RSS d = d 1 d = d 2 Changing P 0 Receiver Sender 13

L Improvement: Inferring proximity by RSS ratio d1d1 d2d2 Ratio : d’ 1 d’ 2 Ratio: >>0 ≈0 14

Antenna Diversity and IEEE n MIMO IBM T42P (Antennas diversity) Spatial diversity: to improve the quality and reliability of a wireless link Dell e5400 (MIMO antennas) Spatial diversity Spatial multiplexing (From 54Mbps to 600 Mbps) 15

Practical Problem: Unstable RSS Values Problem: –RSS values may fluctuate Solution: –Sender (S) sends a series of packets –Receiver (R) calculates the mean and deviation of the RSS values 16

Practical Problem: RSS saturation Problem: –RSS value saturates when the signal is too strong or too weak. Solution: (power probing) –S sends probing packets with different transmission power levels –R chooses the optimal power level that results in the largest RSS ratio 17

Practical Problem: Automatic Rate Adaptation Problem: –Inconsistent RSS values if the Automatic Rate Adaptation feature is enabled. Solution: –Disable Automatic Rate Adaptation. 18

Final scheme 19

Typical RSS ratio of successful device pairing RSS ratio 20

Antennas used in our experiments Type 1: internal antennas for Dell E5400 laptop Type 4: Dipole antenna Type 3: RP-SMA (f) socket Type 2: antennas for laptop mini PCI cards 21

Logarithmic relationship between RSS value and the sender-receiver distance 22

Linear relationship between RSS value and the transmission power 23

RSS saturation is observed when the distance decreases 24

Prototype 26cm Modify the driver to export RSS values seperately Threshold setting: r H = -r L = 11 σ valve =0.6 T valve = 1s Receiver Sender 25

26 Video

Prototype r<20cm 20cm<r<1m r>1m 27

Potential Attack using Multipath Effect Attacker may exploit multipath effect to find faraway locations that cause large RSS ratios 28

Mitigating with Frequency hopping 29

Potential Attack using Beam Forming Risk: Attackers may form a beam of signal with an antenna array Attackers need a very large antenna array (size of hundreds of meters when L=20cm, d>10m) 30

Future works Mutual authentication Apply our scheme to Bluetooth Applications that requires Near Field Communication 31

Conclusion A novel device-pairing scheme –Based on proximity –Requires no Out-of-Band Channel –Requires no user input or verification 32