2 - Physical Link Flashcards
Physical- & Link-Layer Security tasks
- Transmission of analog signal between two (or more) parties
- Error detection and correction
- Medium access control
- Addressing
Security is traditionally a higher layer issue!
- Cryptographic protocols (e.g. SSL)
- Encipherment (e.g. PGP)
- IPsec
Wired Networks Atacks
Wiretapping
- Past: Telephone tapping for targeted eavesdropping
- Today: British intelligence agency GCHQ taps fibre-optic transatlanic cables carrying Internet traffic between Europe and North America
Network Hubs
- Hubs broadcast packets to all ports (in contrast to switches)
→ everyone attached to the hub can eavesdrop or inject messages!
Physical access to Wireless Networks?
Easy!
- Inherent broadcast nature of wireless networks
- No physical protection
- Signal travels through physical barriers (such as walls)
- Attacker simply needs to be “close enough” (within RF range)
Radio Wave Propagation
Receiving power proportional to 1/d^2 (in watt) roughly
Large-scale fading:
- used e.g. to plan radio coverage areas
- Transmission range
- Detection range
- Interference range
Realistic Signal Propagation: Multipath
Small-Scale Fading
- Rayleigh or Rician distribution
Large-Scale Fading + Small-Scale Fading = approximation
Domains of radio signals
Time x Frequency
Jamming
Wireless communication can be disrupted by interference on the same frequency/band
analogy: A group of people tries to talk but another person plays annoying music loud enough so that nobody is able to understand the others
Non-malicious interference
- collisions with packets of other parties of the same network (contention)
- collisions with other communication systems using the same band (e.g. 802.11 vs. 802.15.4)
Malicious interference: jamming
- Adversary transmits signals on the same frequency on which honest parties communicate
- Destroys legitimate signal at the receiver
- Aims at denial or at least degradation of service
What Is An Ideal Jammer?
Energy efficiency
- Ideal jammers should have high energy efficiency, i.e. low power consumption
Probability of detection / Stealthiness
- Ideal jammers should have low probability of detection, preferably close to 0%
Level of DoS
- Ideal jammers should have high level of DoS, i.e. disrupt communications to the desired or maximum possible extent
Resistance to anti-jamming techniques
- Ideal jammers should be resistant to physical layer jamming mitigation or prevention attacks, i.e. they do not allow signal processing techniques to overcome the attack
How “Ideal” Is A Jammer?
Packet Send Ratio (PSR) =
packets set/packets intended to be sent =
m/n
- Alice wants to send n packets but can only transmit m ≤ n due to jamming interference and usage of CSMA
- Intuitively captures effectiveness of jammers towards transmitter
_______________________________
Packet Delivery Ratio (PDR) =
packets successfully received/packets sent =
q/m
- Alice sent m packets but only q packets were successfully delivered to Bob due to destructive jamming interference
- Successful reception means that packet successfully passed error detection (e.g. CRC)
- PDR captures effectiveness of jammers towards receivers
___________________________
Jamming-to-Signal Ratio (JSR)
- Signal power spread over RF spectrum
- Only overlapping “area” affected → bandwidth dependency of JSR
___________________________
Connectivity Index (CI)
- Attacking the weakest link on the network graph
- CI = 1 = graph connected
- In practice, 0.9 can be seen as a good CI
Jamming Strategies
Constant
- Continually emits radio signal
- noise, tone, or random
- can be detected quite easily
Deceptive
- Constantly injects regular packets to the channel without any gap between subsequent transmissions
- Normal communicators will be deceived and stay in receiving mode
- battery exhaustion
Random
- alternates between jamming and sleeping
- behave like constant or deceptive when jamming
- reduce the energy consumption of a jammer
- increases the stealthiness
Reactive
- start jamming as soon as it senses activity on channel
- Harder to detect
- More power efficient for jammer
- Requires better hardware to react timely
Jamming Detection
Challenge: Discrimination between legitimate and adversarial causes of poor connectivity
- Legitimate: Congestion or device failure
- Adversarial: Jamming
Detection traditionally done using statistics on properties such as signal strength, carrier sensing time, or packet delivery ratio
- Attacks result in changes of the distribution of such statistics
- Subtle jammers are harder to detect since they try to minimize the effect on statistics; but they are also less effective
To improve the false positive rate, multiple statistics are used to distinguish from legitimate causes
Jamming Mitigation
The bad thing about jamming: There is no real defense (such as crypto)
Either you track down the jammer and prevent him from jamming “physically”
Or you run and hide or make it too expensive for the attacker to jam your communication link
Jamming Mitigation: Run-and-hide approaches
Channel Surfing
- Once attack is detected, legitimate users change their frequency to avoid jammer
Spatial retreats
- Physical change of location
JSR Manipulation
- Change:
- transmission power
- distance
- antenna gains
- bandwidth
Jamming Summary
Wireless medium inherently prone to jamming attacks
- There is usually no physical access control
Jammers are usually considered to be more powerful than normal transceivers
- They can emit much stronger signals
Jamming usually happens at a receiver but due to MAC
protocols, it can also affect senders
- For instance if the sender performs carrier sensing before sending
Jamming cannot be prevented completely, only mitigated
Solution: Run and hide
- Detect the jamming attack
- Classify the jammer (e.g. narrow band reactive jammer?)
- Apply appropriate mitigation technique
802.11
Overview
extensions
Security
Original standard from 1997 supports up to 2 Mbit/s and
operates on the 2.4 GHz ISM band.
extensions
- 802.11a (1999): 5 GHz, up to 54 Mbit/s
- 802.11b (1999): 2.4 GHz, up to 11 Mbit/s
- 802.11g (2003): 2.4 GHz, up to 54 Mbit/s
- 802.11n (2009): 2.4/5 GHz, up to 600 Mbit/s (w/ MIMO)
Security
- Confidentiality/ Integrity
- Pre-RSNA: WEP
- RSNA: WPA, WPA2
- Authentication: pre-shared keys, hidden SSID, IEEE 802.1X
IEEE 802.11: System Architecture (Infrastructure)
Stations (STAi) are connected to an Access Point (AP) via the wireless link
An AP and all STAi that are associated with it form a so called Basic Service Set (BSS)
To connect to an AP, each STAi must provide the network’s service set identifier (SSID)
The AP enables access to the distribution system (DS) for associated STAi
The DS interconnects several BSSi to form one logical network, the so called Extended Service Set (ESS)
The DS also allows connections to other (possibly wired) networks via Portals