channel surfing and spatial retreats: defenses against ... · iab 11/18/2004 jamming style dos ......

33
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004

Upload: others

Post on 22-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

Channel Surfing and Spatial Retreats: Defenses against

Wireless Denial of Service

Wenyuan Xu, Timothy Wood,Wade Trappe, Yanyong ZhangWINLAB, Rutgers University

IAB 2004

Page 2: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

2

IAB 11/18/2004

Roadmap

Motivation and Introduction

Detection– MAC Layer Detection– PHY Layer Detection

DoS Defenses– Channel Surfing– Spatial Retreat

Conclusions

Ongoing works

Page 3: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

3

IAB 11/18/2004

Jamming Style DoS

Bob AliceHello … Hi …

Page 4: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

4

IAB 11/18/2004

Jamming Style DoS

Bob AliceHello … Hi …

@#$%%$#@&…

Mr. X

Page 5: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

5

IAB 11/18/2004

Jamming Style DoSBob Alice

Hello … Hi …@#$%%$

#@&…

Mr. X

Alice and Bob are DoS attacked by malicious Mr. X.

A story for the problem of wireless denial of service attack we focus on.– Alice and Bob two communicating

nodes, A and B.– Mr. X an adversarial interferer X.– Mr. X’s insane behavior the jamming

style DoS.– People and nodes in wireless network both

communicate via shared medium.

Jamming style DoS Attack:– Behavior that prevents other nodes from

using the channel to communicate by occupying the channel that they are communicating on

AB

X1

RX1

X2

w2

Page 6: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

Slide 5

w2 DoS: An attack on a system or portion of a system that results in at least the temporary inability of others to use the system for its intended purpose wenyuan, 9/22/2004

Page 7: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

6

IAB 11/18/2004

Jamming Style DoS Bob AliceHello … Hi …@#$%%

$#@&…

Mr. XJamming style DoS: 2 styles– MAC-layer DoS

Bypass the MAC protocol, repeatedly send out packetsIntroduces packet collision

– PHY-layer DoSJam transmission channel by emitting energy in the frequency band corresponding to the channel

Australian CERT [0]:Previously, attacks against the availability of IEEE 802.11 networks have required specialisedhardware and relied on the ability to saturate the wireless frequency with high-power radiation, an avenue not open to discreet attack. This vulnerability makes a successful, low cost attack against a wireless network feasible for a semi-skilled attacker.

A common example: turning on the Microwave is a piece of cake.

This vulnerability makes a successful, low cost attack against a wireless network feasible for a semi-skilled attacker

[0] AusCERT,"AA-2004.02-denial of service vulnerability in IEEE 802.11 wireless devices", http://www.auscert.org

Page 8: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

7

IAB 11/18/2004

Our JammersMAC-layer Jammer– Mica2 Motes (UC Berkeley)

8-bit CPU at 4MHz,512KB flash, 4KB RAM916.7MHz radioOS: TinyOS

– Disable the CSMA– Keep sending out the preamble

PHY-layer Jammer– Waveform Generator– Tune frequency to 916.7MHz

SyncPreamble Packet

Page 9: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

8

IAB 11/18/2004

Handling Jamming: StrategiesWhat can you do when your channel is occupied?– In wired network you can cut the link that causes the

problem, but in wireless…– Make the building as resistant as possible to incoming radio

signals?– Find the jamming source and shoot it down?– Battery drain defenses/attacks are not realistic!

Protecting networks is a constant battle between the security expert and the clever adversary. Therefore, we take motivation from “The Art of War” by Sun Tze:– He who cannot defeat his enemy should retreat.

Detection Strategies– MAC Detection– PHY Detection

Retreat Strategies:– Spectral evasion– Spatial evasion

Page 10: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

Detection: MAC Layer and PHY Layer

Page 11: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

10

IAB 11/18/2004

DoS Detection—MAC LayerIdea:– Want to use channel state information to detect whether a jamming

has occurred.CSMA (TinyOS)– Senses the channel until it detects the channel is idle.– If collision, wait for a random time. (no exponential backoff)

Adversary Model:– We assume there is only one stationary adversary, who blasts on a

single channel at any time. Observation: – Normal scenario: nodes can pass the CSMA after some time– DoS scenario: nodes might never passes the CSMA

Challenges:– How to discriminate a legitimate traffic jam from illegitimate traffic? – What is a good model to minimize the probability of a false

positive?Thresholding is the “bread and butter” of detection theory (Neyman-Pearson, Bayesian inference).– Sensing time?

Adversary Model: There is one stationaryadversary, who continuously blasts on a singlechannel at a time.

Page 12: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

11

IAB 11/18/2004

Empirically setting the thresholdProblem with theoretically setting threshold: Its hard to model more complicated MACs!Let each network device collect statistics regarding waiting time DExperiment– ns-2 simulator– 802.11 protocol– Disabled the MAC layer retransmission– Two nodes, A and B, collected the

statistical data– Using some streams (from sender Si to

receiver Ri) to increase the interfering traffic

Observation:– When only a few streams exist, A can get

the channel quickly with high probability– As the number of streams increases, the

competition for channel becomes more intense, thus taking longer for A to acquire the channel

A B

S1

S2

S3

R1

R2

R3

Sensing Time (ms)

Cumulative Distribution of Sensing Time

Cu

mu

lati

ve D

istr

ibu

tio

n

Page 13: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

12

IAB 11/18/2004

DoS Detection – PHY LayerIdea:– Want to use PHY layer information to detect whether a jamming

has occurred

Observations: – Ambient noise levels in normal (including congested) scenarios and

abnormal scenarios are statistically different.

Challenges:– How to capture the time variant properties efficiently? – What is a good model to use for minimizing the probability of a

false positive?

Network devices can sample noise levels prior to DoS attack and build a statistical model describing usual energy levels in the network.– Discrimination between normal noise level measurements and

abnormal data by employing the various features of the data.– Tools:

statistics: Spectral Discrimination statistics: Distributional Discrimination2χ

Page 14: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

13

IAB 11/18/2004

Platform:– Mica2 Motes (UC Berkeley) – Use RSSI ADC to measure the signal strength– The values are in inverse relationship to power

(signal strength)Three scenario– No communicator– Three communicators (obey CSMA)– Use waveform generator as jammer

No communicator

Three communicators

Jammer

The noise level time

series with a jammer and without a

jammer are different

DoS Detection – PHY Layer

Time

Page 15: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

Defenses: Channel Surfing and Spatial Retreats

Page 16: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

15

IAB 11/18/2004

Network TypesDoS detection can be employed by a single node, however, DoS defenses are group activities.

Three different network scenarios are concerned:– Two party radio communication

Baseline case

– Infrastructured wireless networkConsist of two types of device: access points and mobile devicesAccess points communicate with each other via wired infrastructureMobile devices communicate via the access point to other mobile devices

– Mobile Ad Hoc Wireless NetworksComposed of mobile devices without access points Mobile devices can communicate to each other via multi-hop routing protocol

A B C

D E F G

H I J

K L

X

A

B

X0AP0

AP1

AP2

C

D X1

AB

X1

RX1

X2

Page 17: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

16

IAB 11/18/2004

Dos Defenses– Channel SurfingAdversary Model:– We assume there is only one stationary adversary, who blasts on a

single channel at any time.

Objective:– In case we are blocked at a particular channel, we want to resume

the normal wireless communication with other legal nodes.

Channel Surfing:– If we are blocked at a particular channel, we can resume our

communication by switching to a different (and hopefully safe) channel that does not overlap current channel.

– Inspired by frequency hopping techniques, but operates at the link layer

System Issues:– Must have ability to choose multiple “orthogonal” channels:

Prevents InterferencePractical Issue: PHY specs do not necessarily translate into correct “orthogonal” channelsExample: MICA2 Radio recommends: “choose separate channels with a minimum spacing of 150KHz” but…..

Adversary Model: There is one stationaryadversary, who continuously blasts on a singlechannel at a time.

Page 18: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

17

IAB 11/18/2004

Throughput VS. Channel AssignmentReceiver

Sender

Interferer

Sender sends the packet as fast as it can.

Receiver counts the packet and calculates the throughput

The radio frequency of the sender and receiver was fixed at 916.7MHz.

Increased the interferer’s communication frequency by 50kHz each time.

When the Jammer’scommunication frequency increases to 917.5MHz, there is almost no interference

Page 19: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

18

IAB 11/18/2004

Throughput VS. Channel Assignment

Sender

Wave generator

Interferer Receiver

Page 20: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

19

IAB 11/18/2004

Dos Defenses– Channel SurfingSystem Issues (cont.): – “Orthogonal” channels:

The fact is that we need at least 800KHz to escape the interference.Therefore, explicit determination of the amount of orthogonal channels is important.

– How to determine which channel to hop?The adversary X may periodically stop its interference and try to find the new channel the nodes are currently on.Goal: Maximize the delay before X finds out the new channelTherefore, using next available channel is NOT good!Use a (keyed) pseudo-random channel assignment!

Basic Channel Surfing Algorithm: Both parties detect DoS independently, and change to a pre-determined channel and establish communication there

Page 21: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

20

IAB 11/18/2004

Two Party Radio CommunicationPrototype:– Two Berkeley motes A and B– A sends out a packet to B every 200msecs– Measure the packet delivery rate = #recv/#sent– Used waveform generator as jammer X– A and B try to detect the DoS attack periodically

Code:task void checkDos() {

sent = call SendMsg.send(TOS_BCAST_ADDR,sizeof(uint16_t),&beacon_packet);

if(!sent){if(++failures< thresh)

post checkDos();else post changeChan();

} else {failures = 0;}

}

AB

X1

RX1

X2

Trial Number (Time)

Channel Surfing Experiment

Pack

et

Deli

very

Rate

Jammerturned

on

Change channel

1

0.5

1.5

0

Page 22: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

21

IAB 11/18/2004

DoS Defenses – Spatial RetreatsAdversary Model:– We assume there is only one stationary adversary, who blasts on a

single channel at any time.

Objective: – No channel to switch to...then find a new place to reestablish

connectivity! – What will you do when your nearby microwaves almost kills the

wireless connection of your laptop?

Spatial Retreats:– In order to resume our communication under the jamming style

attack, we should move to a place that is outside of the jammingregions

System Issues:– Where to move?– How to ensure that both parties leave the adversary’s interference

range?– How to maintain radio connectivity following a spatial retreat?– How to adapt to non-circular jamming regions?

Adversary Model: There is one stationaryadversary, who continuously blasts on a singlechannel at a time.

Page 23: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

22

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the Interference Region

– Move into Radio Range

Page 24: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

23

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

Decide the initial positions prior to the introduction of adversaryDetermine a local coordinate systemAgree on the direction of the retreats. for example, y axis.

– Exit the Interference Region

– Move into Radio Range

A

B

X

Y

Page 25: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

24

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

Decide the initial positions prior to the introduction of adversaryDetermine a local coordinate systemAgree on the direction of the retreats. for example, y axis.

– Exit the Interference Region

– Move into Radio Range

A

B

X

Y

X

Page 26: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

25

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the Interference RegionOnce A and B detect the DoS scenario, they try to move away from adversary along the y-axis.A and B stop, as soon as they detect that it is out of the interference range.Problem: A and B cannot talk to each other any more.

– Move into Radio Range

A

B

X

Y

X

B’

A1

Page 27: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

26

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the Interference RegionOnce A and B detect the DoS scenario, they try to move away from adversary along the y-axis.A and B stop, as soon as they detect that it is out of the interference range.Problem: A and B cannot talk to each other any more.

– Move into Radio Range

A

B

X

Y

X

B’

A1

Page 28: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

27

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the interference Region

– Move into Radio RangeWhat if they bypass each other?

– Let B be master and A be slave. Only slave moves

– A moves along x-axis (toward B, never beyond B)

What if moving into the interference range again?

tops moving along the x-axis, moving along y-axis

A

B

X

Y

X

B’

A1

Page 29: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

28

IAB 11/18/2004

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the interference Region

– Move into Radio RangeWhat if they bypass each other?

– Let B be master and A be slave. Only slave moves

– A moves along x-axis (toward B, never beyond B)

What if moving into the interference range again?

tops moving along the x-axis, moving along y-axis

A

B

X

Y

X

B’

A2A1

Page 30: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

29

IAB 11/18/2004

A

B

X

Y

X

B’

A2A1

Two Party Radio communicationThree stage protocol:– Establish Local coordinates

– Exit the interference Region

– Move into Radio RangeWhat if they bypass each other?

– Let B be master and A be slave. Only slave moves

– A moves along x-axis (toward B, never beyond B)

What if moving into the interference range again?

– stops moving along the x-axis, moving along y-axis

A’

A3 A4

Page 31: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

30

IAB 11/18/2004

Conclusions:Due to the shared nature of the wireless medium, it is an easy feat for adversaries to perform a jamming-style denial of service against wireless networks

We proposed two approaches that a single node may employ to detect a DoS Attack– MAC layer: monitoring the sensing time– PHY layer: observing the noise levels in the channel

We have presented two different strategies to defend against the jamming style of DoS attacks– Channel-surfing: changing the transmission frequency to a

range where there is no interference from the adversary– Spatial retreat: moving to a new location where there is no

interference

Page 32: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

31

IAB 11/18/2004

Ongoing works:Study the detection strategies – Jammer turns on for 95% of the time and keeps silent for

the rest of 5% of the time– Jammer will start to jam only if someone is sending out the

message

Investigate the channel-surfing and spatial retreat algorithm in new wireless network topologies:– Infrastructured wireless networks– Ad-hoc network

Study the defenses against DoS with other issues:– High mobility– High redundant (in sensor network)

A large scale (approximately 50 nodes) jamming-tolerant sensor network is being developed and results will be reported soon.

Page 33: Channel Surfing and Spatial Retreats: Defenses against ... · IAB 11/18/2004 Jamming Style DoS ... Australian CERT [0]: Previously, attacks against the availability of IEEE 802.11

32

IAB 11/18/2004

Other InvestigationsMany wireless security threats are being addressed– Secure routing protocol, Temporal Key Integrity Protocol (TKIP),

802.1x, privacy……– Validation of the possibility of DDOS in wireless by mathematical

models.[1]– Using FAIR-MAC to prevent nodes from monopolizing the channel.

Prerequisite: every node follows the fair MAC protocol.[2]– DOMINO: System for Detection Of greedy behavior in the MAC

layer of IEEE 802.11 public Networks. [3]

However, the jamming style DoS is not well studied– Australian CERT announced the issue of MAC layer weaknesses in

802.11 MAC. [0]– Mapping a jamming-area for sensor networks.[4]

[1] Q. Huang, H. Kobayashi, and B. Liu, “Modeling of Distributed Denial of Service Attacks in Wireless Network”, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing

[2] V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of Service Attacks at the MAC layer in Wireless Ad Hoc Network’, IEEE Milcom 2002, Anaheim, California, October 7-10, 2002

[3] M. Raya, J. Hubaux, and I. Aad, “DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots”, 2004, MobiSYS, pp.84-97

[4] A. Wood, J. Stankovic, and S. Son,”JAM: A jammed-area Mapping Service for Sensor Networks”, 2003, 24th IEEE International Real-Time Systems Symposium, pp.287-297