Techniques for Protecting IEEE 802.11 Ranging Measurements from Attacks

may 2017 n.w
1 / 11
Embed
Share

Learn about techniques to safeguard IEEE 802.11 ranging measurements from various levels of attacks like denial of service, perturbation, and spoofing. Explore strategies such as phase encoding of LTF base sequences and cyclic shifting of training signals to enhance PHY security.

  • IEEE
  • Security Techniques
  • Ranging Measurements
  • Attacks
  • PHY Security

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. May 2017 doc.: IEEE 802.11-17/0780r2 Ranging PHY Security Date: 2017-05-10 Authors: Name Erik Lindskog Affiliations Address Qualcomm Phone email elindsko@qti.qualcomm.com nkakani@qti.qualcomm.com Naveen Kakani Qualcomm alirezar@qti.qualcomm.com Ali Raissinia Qualcomm ning@qti.qualcomm.com Ning Zhang Qualcomm xiaoxinz@qti.qualcomm.com Christine Zhang Qualcomm crberger@marvell.com Christian Berger Marvell Submission Slide 1 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  2. May 2017 doc.: IEEE 802.11-17/0780r2 Abstract This presentation describes some techniques for protecting frames for ranging measurements from PHY level attacks. Submission Slide 2 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  3. May 2017 doc.: IEEE 802.11-17/0780r2 Ranging PHY Security Attacks Levels of attacks Denial of service attack: The attacker interferes with the ranging signal such as to generate a denial-of- service attack. This is very hard to protect from. Perturbation attack: The attacker is interfere with the victim s ranging, but is the attacker is not able to control the resulting perceived range. Spoofing attack: The attacker interferes with the victim s ranging and is able to control the victim s perceived range. The spoofing attack is the most dangerous kind of attack as it has the greatest potential to provide an incentive for the attacker. Submission Slide 3 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  4. May 2017 doc.: IEEE 802.11-17/0780r2 Overlay Attack on NDP based Ranging Example training sequence overlay attack Attacker Initiator Responder NDPA NDP T1 NDP Attack T2 or T2* NDP T3 NDP Attack T4 or T4* T2/T2* and T3 feedback Computed incorrect RTT* = (T2*-T1 + T4* T3)/2 Submission Slide 4 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  5. May 2017 doc.: IEEE 802.11-17/0780r2 Example PHY Security Techniques (1) Phase encoding of LTF base sequence: Apply varying phase rotations to the LFT base sequence High variability in training sequence May affect PAPR Using sequences with good PAPR can be an option Requires HW change Submission Slide 5 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  6. May 2017 doc.: IEEE 802.11-17/0780r2 Example PHY Security Techniques (2) Cyclic shifting of training signal: Apply varying cyclic shifts to the training signal Less variability in training sequence Preserves PAPR Can likely be implemented in SW or possibly with smaller HW change Submission Slide 6 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  7. May 2017 doc.: IEEE 802.11-17/0780r2 Cyclic Shift PHY Security in NDP Frames Variable cyclic shift on ranging training Attacker does not know the shift => Attacker can in general not perform a spoofing attack No change in basic channel estimation is needed No data is demodulated Compensate for shift in SW in ranging calculations Submission Slide 7 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  8. May 2017 doc.: IEEE 802.11-17/0780r2 Cyclic Shift PHY Security Applied to 802.11Revmc FTM evolution Variable cyclic shift applied to LTF and subsequent fields Enables decoding of payload in frame No change required to channel estimation and data processing in receiver Change to cyclic shift required in transmitter May only require SW or smaller HW change Compensate for cyclic shift in SW for ranging purposes Submission Slide 8 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  9. May 2017 doc.: IEEE 802.11-17/0780r2 Compensation for Used Cyclic Shift The cyclic shift used need not be conveyed but can be included in the time stamps. The transmitting STA knows the CSD applied and can thus compensate for it the time stamps it either communicates, or just uses. For example, referring to the NDP based EFTM exchange in slide 4: If the initiator applies a CSD of t_a to the first measurement frame , the initiator can instead of using the true t_1 in its calculations, use a compensated t_1 t_1 = t_1 + t_a (or is it - t_a ) Similarly, if the responder applies a CSD of t_b to the second measurement frame , then responded can instead of feeding back t_3 send a compensated t_3: t_3 = t_3 + t_b (or is it -t_b ) Other time stamps communicated or used can be compensated correspondingly. Submission Slide 9 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  10. May 2017 doc.: IEEE 802.11-17/0780r2 Enhanced Security The most vulnerable use case is that of range estimation, e.g. confirmation of one STA being close to another STA E.g. car key close to car Require multiple range estimates for such sensitive use cases. Attacker has to guess a whole sequence of applied CSDs Can make it arbitrarily difficult for the attacker to guess the CSDs Submission Slide 10 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

  11. May 2017 doc.: IEEE 802.11-17/0780r2 Proposal To prevent spoofing attacks, apply per packet varying CSDs to LTFs used for ranging in NDP based ranging measurement frames L-LTF fields and beyond in evolution of 802.11REVmc FTM frames Used CSDs can be conveyed by compensating communicated or used time stamps Especially sensitive use cases can have the security enhanced by requiring multiple ranging measurements, each with a different varying CSD applied. Submission Slide 11 Erik Lindskog, Naveen Kakani, Ali Raissinia, Ning Zhang and Christine Zhang - Qualcomm

More Related Content