Download presentation
Presentation is loading. Please wait.
Published byGarry Burke Modified over 9 years ago
1
Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems
2
Pervasiveness of Security Layers in the Internet divide responsibility Security is important at each layer Physical MAC / Link Network Transport Application 802.11a PHY 802.11 MAC IP TCP, UDP HTTP, IMAP
3
CIA: Not Just an Intelligence Agency Confidentiality: – Data – Privacy (Location, Identity, Traffic, …) Integrity: – Data Integrity – Origin Integrity (Location, Identity, …) Availability
4
Solutions Must Pervade Layers Many security properties are vulnerable at several layers: – Availability – Location privacy Physical MAC / Link Network Transport Application
5
Why Location Privacy? Wireless transmissions can reveal location: – Cellular – Electronic Toll Collection (iPass) – WiFi, Bluetooth, …
6
Providing Location Privacy Power-control for avoiding localization (Physical) Pseudonymous geographic routing (Network) Anonymous rendezvous (Network) Transaction communication model (Transport) Silent periods (Cross-Layer): – Dissociate one transaction from another – Duration depends on density, mobility User Interface (Application)
7
Reducing Localization Precision Existing localization techniques: – Rice: less than 1m with 50% error indoors – Place Lab: 15-30m with 50% error outdoors Need (generally) at least 3 APs passively scan all channels order all APs based on their RSSIs: R 1 >= R 2 >= … >= R n exists R 1 -R i-1 <20 dB & R 1 -R i >20 dB? transmit at the maximum power adjust transmit power to TX AP – R i + RS AP -10dB effective area for TPC YES NO
8
Using Silent Period Decorrelate transmissions: – Deterministic plus random – BusView data validation
9
User Interface Directs all location privacy mechanisms Privacy on/off checkbox Wait notification
10
Why Availability? Many different wireless technologies: – Unlicensed bands share spectrum with industrial applications and other users Users running the same protocol might not cooperate: – Selfish misbehavior – Malicious misbehavior – Software and hardware bugs
11
A Multi-Layer Solution to Availability Jamming mitigation (Physical) Packet leashes (Physical / Network) MAC-level misbehavior detection (MAC) Secure routing protocols (Network)
12
Possible Misbehavior Do not follow MAC-layer rules for “backoff” Transmit Wait B1 = 1 B2 = 20 Transmit Wait B2 = 19 B1 = 1 Misbehaving node Well-behaved node
13
Deterministic Backoff Receivers choose the backoff for the senders – Included in the previous acknowledgement DATA Sender S Receiver R CTS ACK(B) RTS B
14
A Bottom-Up Approach to Availability Start with a trusted core: – (Possibly) a subset of nodes – Very low bandwidth – Highly available Bootstrap services using the core: – Routing – Congestion control Handle failures of core nodes
15
Wireless Security Faculty at Illinois Tamer Basar Roy Campbell Carl Gunter Christoforos Hadjicostis Yih-Chun Hu Ravishankar K. Iyer Klara Nahrstedt William H. Sanders Nitin H. Vaidya
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.