Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu Wenbo Shen, Haojin Zhu 1.

Slides:



Advertisements
Similar presentations
Advanced Piloting Cruise Plot.
Advertisements

1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
1 Vorlesung Informatik 2 Algorithmen und Datenstrukturen (Parallel Algorithms) Robin Pomplun.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Objectives: Generate and describe sequences. Vocabulary:
UNITED NATIONS Shipment Details Report – January 2006.
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1A - Adult Chapter 3.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
1 Discreteness and the Welfare Cost of Labour Supply Tax Distortions Keshab Bhattarai University of Hull and John Whalley Universities of Warwick and Western.
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
PP Test Review Sections 6-1 to 6-6
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
2 |SharePoint Saturday New York City
Green Eggs and Ham.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
VOORBLAD.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Adding Up In Chunks.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
1 Using one or more of your senses to gather information.
Subtraction: Adding UP
Januar MDMDFSSMDMDFSSS
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Energy Generation in Mitochondria and Chlorplasts
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Presentation transcript:

Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu Wenbo Shen, Haojin Zhu 1

Content LLocation distinction  Virtual multipath attacks  Defense  Experiment  Summary 2

Goal of location distinction Detect a wireless user’s location change, movement or facilitate location-based authentication. 3

Wireless sensor network: Location distinction can prevent an unauthorized person from moving the sensors away from the area of interest Applications: 4

Example 1: 5

Example 1 (Cont’d): 6

Applications: Wireless sensor network: Location distinction can prevent an unauthorized person from moving the sensors away from the area of interest Sybil attack: Location distinction can detect identities originated from the same location 7

Example 2: 8

X Example 2 (Cont’d): From the same location 9

Applications: Wireless sensor network: Location distinction can prevent an unauthorized person from moving the sensors away from the area of interest Sybil attack: Location distinction can detect identities originated from the same location RFID: Provide a warning and focus resources on moving objects (Location Distinction [MobiCom’ 07]). 10

Example 3: Move Control 11

Example 3: Move Control 12

Existing ways to realize location distinction Wireless channel characteristics Change Location change Spatial uncorrelation property Attack: Generate “arbitrary” characteristic FAIL!! 13

Multipath components Component response: Characterizes the distortion that each path has on the multipath component Component response: Characterizes the distortion that each path has on the multipath component Channel impulse response: The superposition of all component responses Multipath effect Received signal Transmitted signal 14

The channel impulse response changes as the receiver or the transmitter changes location Channel impulse response Channel impulse responses can be utilized to provide location distinction. Calculate the difference 15

 Training sequence based channel estimation Channel Estimation Training Sequence x x y Estimator x h Training Sequence x Channel Impulse response 16

Channel Estimation (Cont’d) – Rewrite the received symbols A Toeplitz matrix  Least-square (LS) estimator 17

Content  Location distinction  Defense  Experiment  Summary VVirtual multipath attacks 18

Example: Creating a virtual multipath 19

Attack Overview: delay-and-sum process. The i th delayed signal copy Virtual channel impulse response The attacker’s aims to make 20

 Send the aggregated signal to the real multipath channel Technical Challenge: Obtaining the weights 21

Content  Location distinction DDefense  Experiment  Summary  Virtual multipath attacks 22

Defending against the attack: Adding a helper 23

Defending against the attack: Adding a helper In this case, the attacker must know the real channel impulse response between herself and the helper. 24

Defending against the attack: Adding a helper  For Receiver:  For Helper: 25

Attackers with helper Can be set passively: it doesn’t actively send out wireless signals to channel To fool both the receiver and the receiver’s helper, the attacker needs to know the real channel impulse responses: 26

Content  Location distinction  Defense EExperiment  Summary  Virtual multipath attacks 27

Experiment floorplan Transmitter: RX Receiver: 10 locations Each node: a USRP connected with a PC Trials: 100 per location Multipath: L=5 28

Example attacks I Randomly chosen channel impulse response Euclidean distance: 29

Example attacks II Euclidean distance : Recover another channel impulse response in another building (CRAWDAD data set [1] ) [1] SPAN, “Measured channel impulse response data set,”

Overall attack impact 95% is much larger thanwith high probability 5%  d est = || estimated CIR under attacks - chosen CIR ||  d real = || estimated CIR under attacks - real CIR || 31

Experiment floorplan  Place the attacker and the helper at each pair of the 10 locations: 10×9=90 pairs. Attacker Helper 32

Defense feasibility evaluation ReceiverReceiver’s helper (Location 8) The Euclidean distance between both estimates: Attacker: Location 2 33

Defense performance evaluation Conclusion: The helper node is effective to help detect virtual multipath attacks. 34

Content  Location distinction  Defense  Experiment SSummary  Virtual multipath attacks 35

Summary We identified a new attack against existing location distinction approaches that built on the spatial uncorrelation property of wireless channels. We proposed a detection technique that utilizes a helper receiver to identify the existence of virtual channels. 36

Thank you! Any questions? 37