Physical- & Link-Layer Security tasks
Security is traditionally a higher layer issue!
Wired Networks Atacks
Wiretapping
Network Hubs
- Hubs broadcast packets to all ports (in contrast to switches)
→ everyone attached to the hub can eavesdrop or inject messages!
Physical access to Wireless Networks?
Easy!
Radio Wave Propagation
Receiving power proportional to 1/d^2 (in watt) roughly
Large-scale fading:
Realistic Signal Propagation: Multipath
Small-Scale Fading
- Rayleigh or Rician distribution
Large-Scale Fading + Small-Scale Fading = approximation
Domains of radio signals
Time x Frequency
Jamming
Wireless communication can be disrupted by interference on the same frequency/band
analogy: A group of people tries to talk but another person plays annoying music loud enough so that nobody is able to understand the others
Non-malicious interference
Malicious interference: jamming
What Is An Ideal Jammer?
Energy efficiency
- Ideal jammers should have high energy efficiency, i.e. low power consumption
Probability of detection / Stealthiness
- Ideal jammers should have low probability of detection, preferably close to 0%
Level of DoS
- Ideal jammers should have high level of DoS, i.e. disrupt communications to the desired or maximum possible extent
Resistance to anti-jamming techniques
- Ideal jammers should be resistant to physical layer jamming mitigation or prevention attacks, i.e. they do not allow signal processing techniques to overcome the attack
How “Ideal” Is A Jammer?
Packet Send Ratio (PSR) =
packets set/packets intended to be sent =
m/n
_______________________________
Packet Delivery Ratio (PDR) =
packets successfully received/packets sent =
q/m
___________________________
Jamming-to-Signal Ratio (JSR)
___________________________
Connectivity Index (CI)
Jamming Strategies
Constant
Deceptive
Random
Reactive
Jamming Detection
Challenge: Discrimination between legitimate and adversarial causes of poor connectivity
Detection traditionally done using statistics on properties such as signal strength, carrier sensing time, or packet delivery ratio
To improve the false positive rate, multiple statistics are used to distinguish from legitimate causes
Jamming Mitigation
The bad thing about jamming: There is no real defense (such as crypto)
Either you track down the jammer and prevent him from jamming “physically”
Or you run and hide or make it too expensive for the attacker to jam your communication link
Jamming Mitigation: Run-and-hide approaches
Channel Surfing
- Once attack is detected, legitimate users change their frequency to avoid jammer
Spatial retreats
- Physical change of location
JSR Manipulation
Jamming Summary
Wireless medium inherently prone to jamming attacks
- There is usually no physical access control
Jammers are usually considered to be more powerful than normal transceivers
- They can emit much stronger signals
Jamming usually happens at a receiver but due to MAC
protocols, it can also affect senders
- For instance if the sender performs carrier sensing before sending
Jamming cannot be prevented completely, only mitigated
Solution: Run and hide
802.11
Overview
extensions
Security
Original standard from 1997 supports up to 2 Mbit/s and
operates on the 2.4 GHz ISM band.
extensions
Security
IEEE 802.11: System Architecture (Infrastructure)
Stations (STAi) are connected to an Access Point (AP) via the wireless link
An AP and all STAi that are associated with it form a so called Basic Service Set (BSS)
To connect to an AP, each STAi must provide the network’s service set identifier (SSID)
The AP enables access to the distribution system (DS) for associated STAi
The DS interconnects several BSSi to form one logical network, the so called Extended Service Set (ESS)
The DS also allows connections to other (possibly wired) networks via Portals
BSS authentication. Attack?
Open System Authentication
- no encryption, anyone can associate
Control messages in plain text
- Anyone can inject messages with spoofed sender
Disassociation attacks to disconnect particular STAi from the AP
Deauthentication attacks to disconnect particular STAi from ESS
IEEE 802.11: Access Control/Authentication
Pre-RSNA (broken!)
Robust Security Network Association (RSNA)
IEEE 802.11: Access Control – Hidden SSIDs
security by obscurity
Must be known in order to connect to the network
Usually included in beacon frames which are broadcast by the AP
Found in packet header of management frames
⇒ Can be sniffed
IEEE 802.11: Access Control – MAC Filtering
security by obscurity
APs can restrict access to the DS by allowing only certain MAC addresses (whitelisting)
MAC address sent unencrypted with every packet
- Attacker can sniff allowed MAC addresses and spoof them
IEEE 802.11: WEP
WEP (wired equivalent privacy) uses a shared key for authentication
WEP uses RC4 as a pseudo-random number generator (PRNG):
Encryption process: seed = Initialization Vector (IV) || Key keystreem = RC4(seed) ICV = crc(payload) + payload Ciphertext = ICV xor keystreem message = IV || Ciphertext
decryption process is the inverse of encryption
WEP Weakness
The Keys
- IEEE 802.11 does not specify any key management
Poor Encryption
Key Scheduling
WEP is a disaster
802.11i (WPA, WPA2) sorts out most of WEP’s problems