/
Secure In-Band Wireless Pairing Secure In-Band Wireless Pairing

Secure In-Band Wireless Pairing - PowerPoint Presentation

danika-pritchard
danika-pritchard . @danika-pritchard
Follow
433 views
Uploaded On 2016-07-25

Secure In-Band Wireless Pairing - PPT Presentation

Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi Secure Wireless Pairing is Important Traditional solutions require user to enter or validate passwords Entering or Validating Passwords is Difficult ID: 419174

adversary message wireless pairing message adversary pairing wireless silence band packet hash bits secure time messages alice

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Secure In-Band Wireless Pairing" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Secure In-Band Wireless Pairing

Shyamnath GollakotaNabeel AhmedNickolai ZeldovichDina Katabi Slide2

Secure Wireless Pairing is Important

Traditional solutions require user to enter or validate passwordsSlide3

Entering or Validating Passwords is Difficult

Ordinary users struggle with picking long random passwordsDevices with no interfaces for entering passwords

Problem Statement:

Secure pairing without having the user enter or validate passwordsSlide4

Tentative Solution:Slide5

Tentative Solution: Use Diffie

-Hellman Key Exchange Anyone can receive/transmitAlice

Bob

Adversary

 Man-in-the-middle attacks

Full fledged man-in-the-middle attack on CDMA and 4G networks at DEFCON 19Slide6

Industry Approach

Academic ApproachUse trusted out-of-band channels e.g., camera-displays, audio, tactile or infrared channels May be infeasible due to cost or size

Users simply press buttons to initiate pairing

e.g.,

WiFi

Push Button configuration, Bluetooth simple pairing

Susceptible to MITM attacks

Status of Secure Pairing Without Passwords

Can we get the best of both worlds? Slide7

Tamper Evident Pairing (TEP)

First in-band secure pairing protocolProtects from MITM attacksDoesn’t require out-of-band channels or passwordsFormally proven to be secureWorks on existing 802.11 cards and OSImplemented and evaluated on operational networksSlide8

Prior out-of-band systems: Assume

attacker can arbitrarily tamper with wireless messages  Can’t trust messages on shared wireless channelOur approach: Understand wireless tampering and detect it Trust un-tampered messages

Collect all messages within a time window; Pair if only one message and no tampering

How do We Protect Against MITM Attacks Without

Out-of-Band

C

hannels?Slide9

1. Adversary

alters

message

How Can Adversary Tamper with Wireless Messages?

2. Adversary

hides

that message was sent

3. Adversary

prevents

message from being sent

Alice

Bob

AdversarySlide10

1. Adversary

alters

message

How Can Adversary Tamper with Wireless Messages?

Alice

Bob

T

ime

Adversary

2. Adversary hides that message was sent

3. Adversary prevents message from being sentSlide11

1. Adversary alters message

How Can Adversary Tamper with Wireless Messages?

Alice

Bob

Adversary

Collision!

Collisions are typical in wireless networks

2. Adversary

hides

that message was sent

3. Adversary prevents message from being sentSlide12

1. Adversary alters message

How Can Adversary Tamper with Wireless Messages?

Alice

Bob

Adversary

2. Adversary hides that message was sent

3. Adversary

prevents

message from being sent

Occupy the medium all the time

Tamper Evident Message:

Can’t be

altered

without detection at receivers

Can’t be

hidden

from the receiver

Can’t be

prevented

from being sentSlide13

1. How to Protect From Altering of Messages?

TimeAlice’s Message

Follow message by message-specific silence pattern

Silence pattern = Hash of message payload

Send a random packet for 1 and remain silent for 0

101000001111

Wireless property: Can’t generate silence from energySlide14

Time

Alice’s Message

Alice’s ‘1’ bits

1. How to Protect From Altering of Messages?

Wireless property: Can’t generate silence from energy

Follow message by message-specific silence pattern

Silence pattern = Hash of message payload

Send a random packet for 1 and remain silent for 0

Changing message requires changing silence patternSlide15

Time

Alice’s Message

1. How to Protect From Altering of Messages?

Wireless property: Can’t generate silence from energy

Follow message by message-specific silence pattern

Silence pattern = Hash of message payload

Send a random packet for 1 and remain silent for 0

Changing message requires changing silence patternSlide16

2. How to Protect From Hiding the Message?

TimeAlice’s Message

Bob misses the messageSlide17

Time

Synchronization pktAlice’s Message

Send an unusually long packet with random content

2. How to Protect From Hiding the Message? Slide18

3. How Do We Ensure Message Gets Sent?

TimeSynchronization pkt

Alice’s Message

Force transmit after timeout

even if medium is occupied

Message

can’t be altered, hidden or prevented,

without being

detected at receivers Slide19

Issue: Unintentional Tampering

Create a number of false positives

Silence period

Legitimate transmission

802.11 devices transmit when channel is unoccupied

Time

Synchronization

pkt

Alice’s MessageSlide20

Issue: Unintentional Tampering

Silence period

Legitimate transmission

802.11 devices transmit when channel is unoccupied

Time

Synchronization

pkt

Alice’s Message

Leverage CTS to reserve the wireless mediumSlide21

Leverage CTS to reserve the wireless medium

CTS

Reserved duration

Issue: Unintentional Tampering

Time

Synchronization

pkt

802.11 devices transmit when channel is unoccupied

Alice’s MessageSlide22

In-Band Secure Pairing Protocol

Industry: User pushes buttons within 120 secondsTimeout after a period greater than 120 secondsPair if only one message is received and no tampering

Push Button

reply

Timeout

Alice

Bob

request

Push Button

Adversary

TimeoutSlide23

In-Band Secure Pairing Protocol

Industry: User pushes buttons within 120 secondsTimeout after a period greater than 120 secondsPair if only one message is received and no tampering

Push Button

reply

Alice

Bob

request

Push Button

reply

Adversary

Two replies

 No pairing

Timeout

TimeoutSlide24

In-Band Secure Pairing Protocol

Industry: User pushes buttons within 120 secondsTimeout after a period greater than 120 secondsPair if only one message is received and no tampering

Push Button

reply

Alice

Bob

request

Push Button

reply

Adversary

Tamper

Tampering detected

 No pairing

Timeout

TimeoutSlide25

TEP is proven secure

Theorem: If the pairing devices are within radio range and the user presses the buttons, an adversary cannot convince either device

to pair with it (except with negligible probability)

Assumptions:

Don’t confuse hash packets (‘1’) for silence (‘0’)

Detect synchronization packetSlide26

Implementation

Implemented in the 802.11 driver Used Atheros 802.11 cards and LinuxSlide27

Minimize duration of hash bits

Use high-definition timers in kernel  40 us hash bits128 bits hash function  Less than 5 milli seconds Set sync packet longer than any packet

Pick sync duration as 17

ms

Implementation Challenges

Minimum 802.11 bit rate

Maximum sized IP packet

= 12

msSlide28

Evaluation

False negativesProved probability of false negatives is negligibleAssumptionsDon’t confuse hash packets (‘1’) for silence (‘0’)Detect synchronization packetFalse positiveEmpirical estimation of its probabilitySlide29

Testbed

12-locations over 21,080 square feetEvery run randomly pick two nodes to perform pairingSlide30

Normalized Received Power

CDF over all locations

Can We Distinguish Between One and Zero Bits?Slide31

Normalized Received Power

CDF over all locations

Can We Distinguish Between One and Zero Bits?

Zero bitsSlide32

Normalized Received Power

CDF over all locations

Receiver doesn’t confuse one hash bits for silence

One bits

Zero bits

Can We Distinguish Between One and Zero Bits?Slide33

False Positives

Mistaking cross-traffic energy as sync packetMistaking corrupted hash bits for an attackSlide34

Can TEP Mistake Cross-Traffic for Sync Packet?

CDF4

3

2

1

5

Look at SIGCOMM 2010 and MIT network

Continuous Energy Duration (in milliseconds)Slide35

CDF

43

2

1

5

SIGCOMM 2010

Look at SIGCOMM 2010 and MIT network

Can TEP Mistake Cross-Traffic for Sync Packet?

Continuous Energy Duration (in milliseconds)Slide36

CDF

Continuous Energy Duration (in milliseconds)

4

3

2

1

5

SIGCOMM 2010

MIT

Look at SIGCOMM 2010 and MIT network

Can TEP Mistake Cross-Traffic for Sync Packet?

Much smaller than 17

ms

of the sync packet

Studied networks show

zero probability

of mistaking cross-traffic for sync packetSlide37

CDF

Number of attempts

Can TEP Mistake Corrupted Hash Bits for Attack?

Due to CTS

WiFi

cross-traffic doesn’t transmit during hash bits

Non-

WiFi

devices like

Bluetooth

may still transmitExp: Use Bluetooth to transfer file between Android phonesSlide38

CDF

Number of attemptsBluetooth is not synchronized with our pairing protocol

TEP works even in the presence of interference from non-

WiFi

devices such as Bluetooth

Due to CTS

WiFi

cross-traffic doesn’t transmit during hash bits

Non-

WiFi

devices like

Bluetooth

may

still

transmit

Exp

: Use Bluetooth to transfer file between Android phones

Can TEP Mistake Corrupted Hash Bits for Attack?Slide39

Pairing with out-of-band channels

(cameras, audio, tactile, infrared,…)

Work on Integrity Codes

Ensuring message integrity but still requires dedicated out-of- band wireless channels

Related Work

TEP is in-band

Tamper evident messages – Stronger than message integrity

Purely in-band pairing protocolSlide40

Conclusions

First in-band secure pairing protocolProtects from MITM attacksDoesn’t require out-of-band channels or passwordsFormally proven to be secureWorks on existing 802.11 cards and OSImplemented and evaluated on operational networks