Adversary models in wireless security Suman Banerjee Department of Computer Sciences Wisconsin Wireless and NetworkinG Systems (WiNGS)

Slides:



Advertisements
Similar presentations
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Advertisements

Chris Karlof and David Wagner
Localization for Mobile Sensor Networks ACM MobiCom 2004 Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Group #1: Protocols for Wireless Mobile Environments.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Stony Brook Mesh Router: Architecting a Multi-Radio Multihop Wireless LAN Samir R. Das (Joint work with Vishnu Navda, Mahesh Marina and Anand Kashyap)
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 (Un)Trustworthy Wireless: What your wireless traffic says about you… Jeff Pang with Ben Greenstein, Ramki Gummadi, Tadayoshi Kohno, David Wetherall (UW/Intel.
Secure Space: Location-based Secure Wireless Group Communication Arunesh Mishra, Suman Banerjee Department of Computer Science, University of Maryland,
Arsitektur Jaringan Terkini
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Mesh Networking: Building, managing, and the works Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Laboratory.
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, and Srdjan ˇCapkun Department of Computer Science, ETH Zurich Attacks on Public WLAN-based.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Networking and Internetworking Devices Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Components 101 Travis Hill.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
RobinHood: Sharing the Happiness in a Wireless Jungle Tarun Bansal, Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
بسم الله الرحمن الرحيم. Wireless Mesh Network (WMN) Izzeldin Shibeika – April, UNCC -
Ch 6. Security in WMNs Myungchul Kim
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BEYOND OFDM A Systems Approach to Non-Line-of-Sight Fixed Wireless Rajeev Krishnamoorthy Broadband World Wireless Forum, San Francisco, CA February 19,
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Presented by: Dr. Munam Ali Shah
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Overview of Research Activities Aylin Yener
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Ad Hoc Network.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
WLAN.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Networking Components
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
Packet Leashes: Defense Against Wormhole Attacks
Wireless & Mobile Networking CS 752/852 - Spring 2011
An Overview of Security Issues in Sensor Network
Presentation transcript:

Adversary models in wireless security Suman Banerjee Department of Computer Sciences Wisconsin Wireless and NetworkinG Systems (WiNGS) Laboratory

Wireless localization Madison municipal WiFi mesh network 9 square miles area 200+ APs

Wireless AP radio Wireless backbone radio Municipal Wi-Fi Mesh in Madison Mesh AP on street light

Gateway Mesh Router Municipal Wi-Fi Mesh in Madison

Location applications Assume a disaster scenario Locate position of each rescue personnel within the city in a reliable, secure fashion Can take advantage of existing (trusted?) WiFi mesh deployment and wireless communication of rescue personnel

Location applications G PR S1 UMTS WLAN GPRS1 UMTS GPRS2 Real-time city-bus fleet management Where are the different buses?

Location security Prove a user’s location to the infrastructure GPS does not help Adversarial scenarios: –Integrity attacks: Attacker pretends to be in a different location Attacker makes the system believe that the victim is in a different location –Privacy attack: Attacker infers location of victim and can track the victim

A specific localization approach Partition space into a grid System transmits some packets Participant reports RSSI tuple observed RSSI tuple is unique to a location and is the location signature Pkt-2 Pkt-1 Pkt-3 Pkt-4

Adversarial models (1) Attacker present in one location and observes all traffic using a regular antenna –May be able to infer the RSSI tuple at victim Pkt-2 Pkt-1 Pkt-3 Pkt-4

Potential countermeasure System can employ randomization –Hide transmitter MAC address –Use random transmit power each time Attacker may not know which packet is transmitted by which transmitter –Makes inferencing difficult Pkt-2 Pkt-1 Pkt-3 Pkt-4

Adversarial models (2) Attacker able to tell Angle/Direction-of- Arrival Randomization may not help Pkt-2 Pkt-1 Pkt-3 Pkt-4

Adversarial models (3) Even more sophisticated attacker –Present in multiple locations –Can allow attacker to have better location inference Pkt-2 Pkt-1 Pkt-3 Pkt-4

Time-scheduled transmissions by the system that induce collisions may make inferencing harder More countermeasures Pkt-2 Pkt-1 Pkt-2 Wireless congruity [HotMobile 2007]

Wireless “congruity” Very robust in environments with high entropy First metric : A is a trusted monitor, B is the user being authenticated

Congruity implies spatial vicinity Based on the “congruity”, it is possible to say if X is near A, B or C

Optimizations Considering packets in error is useful Thresholding on RSSI of correctly received packets can also be useful Summary: –Wireless congruity is a promising approach to implement robust location authentication

More countermeasures Trusted system can use MIMO to create NULLs in certain directions Not always easy to determine directions to NULL Has other pitfalls Pkt-2 Pkt-1 Pkt-3 Pkt-4 NULL

Adversarial models (4) Adversary can create NULLs at the victim as well Pkt-2 Pkt-1 Pkt-3 Pkt-4 NULL

Adversarial models (5) Captured node in the system Pkt-2 Pkt-1 Pkt-3 Pkt-4

More adversarial scenarios Bit-jamming attacks (protocol-agnostic) RREQ X RREP RREQ X A X Protocol-aware attacks TCP SYN Random IP packet Behavioral attacks Process and discard

Range of adversary capabilities Protocol knowledge Energy source Location diversity (what communication can it observe and affect) PHY layer capabilities – MIMO, AoA/DoA inference, antenna sensitivity, wormholes Computation capability Characteristics of the wireless topology itself Malice vs mal-function/selfish Collusions Tradeoff against performance, resilience, and other metrics

Summary Most popular wireless communication mechanisms are relatively easy to attack Adversarial models not carefully considered when these protocols were designed

Thank you! Suman Banerjee Department of Computer Sciences University of Wisconsin-Madison Wisconsin Wireless and NetworkinG Systems (WiNGS) Laboratory