scalable location-based security in wireless …dbfaria/files/faria-dissertation.pdf · this...

183
SCALABLE LOCATION-BASED SECURITY IN WIRELESS NETWORKS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Daniel Braga de Faria December 2006

Upload: others

Post on 23-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

SCALABLE LOCATION-BASED SECURITY IN WIRELESS NETWORKS

A DISSERTATION

SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

AND THE COMMITTEE ON GRADUATE STUDIES

OF STANFORD UNIVERSITY

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

FOR THE DEGREE OF

DOCTOR OF PHILOSOPHY

Daniel Braga de Faria

December 2006

Page 2: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

c© Copyright by Daniel Braga de Faria 2007

All Rights Reserved

ii

Page 3: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

I certify that I have read this dissertation and that, in my opinion, it is fully

adequate in scope and quality as a dissertation for the degree of Doctor of

Philosophy.

(David R. Cheriton) Principal Advisor

I certify that I have read this dissertation and that, in my opinion, it is fully

adequate in scope and quality as a dissertation for the degree of Doctor of

Philosophy.

(Mary G. Baker)

I certify that I have read this dissertation and that, in my opinion, it is fully

adequate in scope and quality as a dissertation for the degree of Doctor of

Philosophy.

(Fouad Tobagi)

Approved for the University Committee on Graduate Studies.

iii

Page 4: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

iv

Page 5: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Abstract

This dissertation presents a location-based approach to wireless security. It differs from

current solutions in that it uses information about the physical location of clients to leverage

physical security measures instead of relying on long-term secrets such as passwords and

private keys. Our approach adapts to the wireless scenario an intuitive security model that

is effective and already commonplace in wired LANs. We show that it addresses three

problems with current solutions.

First is the inability of network administrators to define geographical boundaries for

wireless coverage. While access to Ethernet ports can be controlled by locking them inside

buildings, wireless links extend connectivity beyond physical boundaries, making networks

reachable to users across the street or in nearby buildings, therefore more vulnerable to

attacks. We show that our services allow networks to provide connectivity to clients located

within the intended service area (SA). Moreover, we show that malicious devices located

outside the SA either need to get physically close to it – running afoul of physical security

measures – or are faced with impractical hardware demands.

The second problem is the lack of proper accountability. Without additional mecha-

nisms, wireless networks are unable to accurately locate and securely identify traffic sources

because clients are no longer physically connected to network ports. Even with user au-

thentication and cryptographic packet protection, some link-layer services still rely on MAC

addresses to identify clients, making networks vulnerable to denial-of-service attacks that

are both effective and easy to implement. We show that our services allow wireless devices

to be distinguished and located accurately, making misbehaving clients again physically

exposed and accountable for their acts.

Finally, most solutions that increase security to acceptable levels incur substantial man-

agement costs. Unlike these, our approach is to improve security in a cost-effective manner.

Our architecture takes advantage of higher numbers of access points not only to improve

v

Page 6: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

accuracy but also to configure itself autonomously, with minimal operator participation.

We use extensive measurements in a real setting to show that such automatic calibration

provides for accurate services while also allowing networks to scale to large numbers of

access points.

vi

Page 7: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Acknowledgements

I would like to start by thanking my advisor, David Cheriton, for mentoring me over the

past six years. David has a natural ability to identify key research problems, and helped

me polish my own ideas since my first group meeting. I look back at my thesis proposal,

written three years ago, and the importance of his guidance is immediately clear.

I would also like to thank the members of my reading committee, Mary Baker and Fouad

Tobagi. Their valuable comments improved this dissertation considerably.

Over these past years I have made many friends, some of which have been listening to

crazy research ideas since my first days at Stanford. Katerina Argyraki and Evan Greenberg

have read papers of mine so many times that I was embarrassed to show them any piece

of this dissertation. No more work, guys! I have also learned a lot, both personally and

technically, from other colleagues from the Distributed Systems Group: Tassos Argyros,

Mark Gritter, Vince Laviano, Sam Liang, Dapeng Zhu, and many others.

I have also had the support of many friends outside of my research group. Francois

Conti, Eugene Nudelman, Javier Nicolas Sanchez, Paulo Pinheiro da Silva, and Qixiang

Sun have been particularly important to me.

Without the help of Christine Fiksdal and Hector Gamez – the sheriffs of Gates – many

of the measurements reported in this dissertation would not exist.

My parents, Carlos and Ana Lucia Faria, together with my brother, Rafael Faria, have

made me who I am. I cannot thank you enough. Even from such a long distance, I have

also received an impressive amount of support from all my relatives, even though they still

do not understand why I moved thousands of kilometers away from them.

Finally, no words can describe how grateful I am for all the support I have received from

my wife, Gisele Faria, over all these years. Gi, I dedicate this dissertation to you, although

I think this alone is not enough. I thank you with all my heart.

vii

Page 8: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

viii

Page 9: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Contents

Abstract v

Acknowledgements vii

1 Introduction 1

1.1 Link-Layer Security in Local Area Networks . . . . . . . . . . . . . . . . . . 1

1.1.1 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.2 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Security in Wired LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.3 Challenges in Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.4 Location-Based Approach to Wireless Security . . . . . . . . . . . . . . . . 7

1.4.1 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.4.2 Accountability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.4.3 Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.5 Assumptions About the Network . . . . . . . . . . . . . . . . . . . . . . . . 10

1.6 Terms and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

1.7 Original Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.8 Outline of Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2 Related Work 15

2.1 Leveraging User Location Information . . . . . . . . . . . . . . . . . . . . . 15

2.1.1 Signal Strength-Based Localization Systems . . . . . . . . . . . . . . 16

2.1.2 Making RSSI-Based Systems Robust Against Attacks . . . . . . . . 18

2.1.3 Decreasing Calibration Efforts . . . . . . . . . . . . . . . . . . . . . 18

2.1.4 Ultrasound and Infrared Based Systems . . . . . . . . . . . . . . . . 20

ix

Page 10: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.1.5 Other Localization Systems . . . . . . . . . . . . . . . . . . . . . . . 21

2.2 Exploring Location-Limited Channels . . . . . . . . . . . . . . . . . . . . . 21

2.3 Distance Bounding and Location Verification Mechanisms . . . . . . . . . . 23

2.4 Detecting Identity-Based Denial-of-Service Attacks . . . . . . . . . . . . . . 24

2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3 Automatic System Calibration 27

3.1 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

3.2 The Log-Distance Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

3.3 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

3.4 The Calibration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

3.4.1 Sample Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

3.4.2 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

3.4.3 Model Instance Computation . . . . . . . . . . . . . . . . . . . . . . 34

3.5 Handling Heterogeneous Environments . . . . . . . . . . . . . . . . . . . . . 35

3.6 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.6.1 Network Testbed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.6.2 Data Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

3.6.3 Calibration Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.6.4 Measuring Heterogeneity . . . . . . . . . . . . . . . . . . . . . . . . 40

3.7 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.7.1 Alternate Path Loss Models . . . . . . . . . . . . . . . . . . . . . . . 42

3.8 Summary and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

4 Robust Localization 45

4.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

4.2 Attack Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

4.3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

4.4 Client Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

4.5 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

4.6 Position Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

4.7 Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

4.7.1 Signal Threshold (T ) . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

4.7.2 Minimum Quorum (Q) . . . . . . . . . . . . . . . . . . . . . . . . . . 58

x

Page 11: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.7.3 Confidence Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.7.4 Configuration Tuple . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

4.8 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

4.8.1 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

4.8.2 Localization Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . 61

4.8.3 False Negatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.8.4 Handling False Negatives . . . . . . . . . . . . . . . . . . . . . . . . 67

4.8.5 Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

4.8.6 Building Penetration Loss . . . . . . . . . . . . . . . . . . . . . . . . 68

4.8.7 Minimum Amplification Demands . . . . . . . . . . . . . . . . . . . 69

4.8.8 False Positives – Omnidirectional Antennas . . . . . . . . . . . . . . 71

4.8.9 False Positives – Directional Antennas . . . . . . . . . . . . . . . . . 75

4.8.10 Localization in Multi-Story Buildings . . . . . . . . . . . . . . . . . 79

4.9 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

4.10 Summary and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5 Range-Based Authentication 83

5.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

5.2 Attack Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.4 Principle of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

5.5 Authentication Handshake . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

5.6 Using Unicast Nonce Messages . . . . . . . . . . . . . . . . . . . . . . . . . 92

5.7 Transmission Power Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

5.8 Handshake Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

5.9 Selective Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5.10 Minimizing Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

5.11 Secure Session Implementation . . . . . . . . . . . . . . . . . . . . . . . . . 98

5.12 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

5.12.1 Channel Quality vs. SNR . . . . . . . . . . . . . . . . . . . . . . . . 98

5.12.2 Authentication at Close Range . . . . . . . . . . . . . . . . . . . . . 101

5.12.3 Handling False Negatives . . . . . . . . . . . . . . . . . . . . . . . . 104

5.12.4 Attacker Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

xi

Page 12: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12.5 Attack Resource Demands . . . . . . . . . . . . . . . . . . . . . . . . 106

5.12.6 Effective Coverage Reduction . . . . . . . . . . . . . . . . . . . . . . 108

5.12.7 Session Establishment Overhead . . . . . . . . . . . . . . . . . . . . 109

5.12.8 Selective Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

5.13 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

5.14 Summary and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

6 Detecting Identity-Based Attacks 119

6.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

6.2 Attack Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

6.3 Signalprints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

6.3.1 Signalprint Representation . . . . . . . . . . . . . . . . . . . . . . . 121

6.3.2 Signalprint Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 122

6.3.3 Signalprint Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 124

6.4 Matching Signalprints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

6.4.1 Differential Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

6.4.2 Max-Matches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

6.4.3 Min-Matches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

6.4.4 Matching Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

6.5 Attack Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

6.5.1 Resource Depletion Attacks . . . . . . . . . . . . . . . . . . . . . . . 131

6.5.2 Masquerading Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . 132

6.6 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

6.6.1 Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

6.6.2 Signal Strength Oscillation . . . . . . . . . . . . . . . . . . . . . . . 134

6.6.3 Signalprints and Physical Proximity . . . . . . . . . . . . . . . . . . 136

6.6.4 Moving Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

6.6.5 Directional and Beamforming Antennas . . . . . . . . . . . . . . . . 142

6.7 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

6.8 Summary and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

7 Conclusion 145

7.1 A Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

7.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

xii

Page 13: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

7.3 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

Bibliography 151

xiii

Page 14: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

xiv

Page 15: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

List of Tables

4.1 Notation used to describe the localization system. . . . . . . . . . . . . . . . 50

4.2 Directional antenna patterns used during simulation. . . . . . . . . . . . . . 76

5.1 Notation used to describe a range-based authentication handshake. . . . . . 88

5.2 Authentication statistics for each location sampled. . . . . . . . . . . . . . . 103

5.3 Performance measurements for the main operations in a handshake using 4

distinct machines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

6.1 Matching results. Each row shows a matching rule, the figure (if any) con-

taining the signalprints created from our measurements that satisfy that rule,

the number of access points used as sensors, the number of matches pro-

duced, and the percentages of matches created by locations within 5, 7, and

10 meters from each other. The first four rules are used to detect packets

transmitted by the same device, while the last two detect packets sent by

distinct devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

xv

Page 16: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

xvi

Page 17: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

List of Figures

3.1 Temporal RSSI oscillations relative to the 75th percentile detected during

calibration for three pairs of access points (measurements described in Sec-

tion 3.6). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

3.2 Our 45×24m service area in the Gates Building 4A Wing with the placement

of access points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.3 All the 135 locations sampled to create the survey data set. . . . . . . . . . 38

3.4 Measurements in the calibration data set and the best fit found for the log-

distance model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

3.5 Measurements in the survey data set and the best fit found for the log-

distance model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

3.6 Path loss exponent values (αi) found for each AP. . . . . . . . . . . . . . . 41

3.7 Path loss exponent (α) values found for each group of 6 APs. . . . . . . . . 42

4.1 Localization system overview. . . . . . . . . . . . . . . . . . . . . . . . . . . 48

4.2 RSSI oscillation for a stationary device. . . . . . . . . . . . . . . . . . . . . 51

4.3 Pattern difference between client at (25,25) and attacker at (80,25) using

α = 3.0. The client’s pattern presents a clear peak, as it is located inside

the service area. The attacker’s pattern resembles a plateau, a result of the

increased distance to the SA. . . . . . . . . . . . . . . . . . . . . . . . . . . 57

4.4 Localization accuracy using all 12 access points. The first two curves show

the error distribution resulting from the survey data set using the calibration

and the survey models. The third curve presents the error distribution found

through simulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

4.5 This figure shows the localization error for each location in the survey data set

and the locations that produce false negatives with the aggressive configuration. 63

xvii

Page 18: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.6 For each location in the survey data set, this figure shows the real locations

(arrow tails) and the corresponding positions estimated by the system (arrow

heads). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

4.7 Localization error as a function of the number of APs using the survey data

set and the calibration model. . . . . . . . . . . . . . . . . . . . . . . . . . . 64

4.8 Localization error as a function of the standard deviation associated with the

path loss model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

4.9 Measurements outside the building. . . . . . . . . . . . . . . . . . . . . . . . 69

4.10 Predicted minimum amplification level needed to satisfy the threshold con-

dition around the SA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

4.11 False-positive rates around the SA as a function of GUN using the aggressive

configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4.12 False-positive rates for GUN = 5 dB using the conservative configuration. . . 74

4.13 False-positive rates for directional antenna with θ = 40◦ and 14 dBi, against

the aggressive configuration and with GUN = 5 dB. . . . . . . . . . . . . . . 77

4.14 False-positive rates for the other simulated directional antennas. . . . . . . 78

5.1 Example of a range configuration that covers most of our service area with

8 access points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.2 Detailed description of an authentication handshake. . . . . . . . . . . . . . 89

5.3 Frames received during each round as a function of average SNR. . . . . . . 99

5.4 Percentage of corrupted frames as a function of SNR level. . . . . . . . . . . 100

5.5 Bit errors per frame (left y-axis) and total number of frames (right y-axis)

relative to measured SNR levels. . . . . . . . . . . . . . . . . . . . . . . . . 101

5.6 Locations sampled during authentication experiments. . . . . . . . . . . . . 102

5.7 Expected SNR outside the building. The rectangle represents our service

area, while access points are shown as triangles. The axes show coordinates

in meters, while the curves show the SNR at each location. . . . . . . . . . 107

5.8 Predicted SNR for an attacker outside the building as a function of his dis-

tance to the external wall (dA). . . . . . . . . . . . . . . . . . . . . . . . . . 108

xviii

Page 19: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.9 Jamming experiments. Each row in the figure represents a measurement

round. A full tick represents a frame received successfully, while a half-tick

represents a frame with bit errors. Frames not captured by the receiver are

not shown. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

5.10 Predicted SNR for access point and jammer outside the building (jammer

placed at the external wall). . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

6.1 Overview of the signalprint generation process. . . . . . . . . . . . . . . . . 123

6.2 Variation in RSSI for a stationary client that uses two different power levels.

Each graph presents measurements with respect to a single AP. The top

and bottom curves correspond respectively to the samples collected with the

client transmitting at 15 and 0 dBm. . . . . . . . . . . . . . . . . . . . . . . 127

6.3 Signalprint matching examples. Figure 6.3(a) shows two signalprints and

their corresponding sizes. Figures 6.3(b) and 6.3(c) demonstrate how max-

matches and min-matches are computed. . . . . . . . . . . . . . . . . . . . . 129

6.4 Two matching rules applied to signalprints S1 and S2. . . . . . . . . . . . . 130

6.5 RSSI oscillation for a stationary device. Each graph was created by choosing

one of the locations sampled and one access point within its range. It shows

the variation in signal strength for consecutive frame transmissions relative

to the median RSSI (shown as 0 dBm) for that location-AP pair. . . . . . . . 135

6.6 Figures 6.6(a) and 6.6(b) show the location pairs producing a minimum of

respectively 4 and 5 5-dB max-matches using the 6-AP configuration (APs

shown as triangles). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

6.7 Figures 6.7(a) and 6.7(b) extend respectively figures 6.6(a) and 6.6(b) with

a clause that allows no 8-dB min-matches. . . . . . . . . . . . . . . . . . . . 138

6.8 Location pairs producing a minimum of 3 5-dB max-matches using the 4-AP

configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

xix

Page 20: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

xx

Page 21: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 1

Introduction

“We’re not lost. We’re locationally challenged.”

– John M. Ford

1.1 Link-Layer Security in Local Area Networks

Local area networks (LANs) have become indispensable: the installed base for both wired

and wireless LAN technologies has reached impressive numbers and it still grows at high

yearly rates. Employees expect their companies to provide them with bandwidth-rich en-

vironments, mobile users expect wireless service to be available everywhere, and every new

hardware generation is expected to provide faster and cheaper network devices. Conse-

quently, it is no surprise that the local area network market has soared over the last few

years. According to research, the worldwide market for enterprise switches and routers

alone has grown to over $19 billion in 2005 and is expected to reach $25 billion in 2009 [94].

As with any other asset, local area networks need to be secured. In this dissertation

we focus on two aspects of network security: access control and accountability. To control

access to their resources, networks need mechanisms that allow them to specify who their

intended users are. For instance, companies usually want to provide employees with unre-

stricted network access but limit the connectivity provided to visitors and business partners.

Additionally, installations want their users to be accountable for their network traffic. This

applies not only to enterprise installations but also to public networks such as those available

in cafeterias, libraries, and airport lounges, which can also have their infrastructure used

1

Page 22: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2 CHAPTER 1. INTRODUCTION

for malicious purposes. The revenue related to network security appliances and software

has surpassed $4 billion in 2005 and is expected to grow to $5.7 billion in 2009 [95].

Our work identifies a dichotomy between wired and wireless LANs with respect to

these security aspects and proposes a solution that is compatible with current network

architectures and consistent with current technology trends. We begin this chapter by

showing that in wired networks, proper access control and accountability can be achieved

using a simple security model that leverages physical security measures. We then show

that inherent characteristics of wireless links break this simple model and that current

mechanisms that address this “wireless security problem” incur considerable management

costs. In fact, studies suggest that security and privacy are still the main barriers to the

adoption of wireless LANs [92]. Finally, we present an overview of our solution and describe

how it improves security in wireless LANs without a substantial increase in total cost of

ownership. We show that our proposed services take advantage of large numbers of cheap

access points to collect real-time information about the physical location of clients and

reduce the security gap between wired and wireless networks in a cost-effective manner.

In sections 1.1.1 and 1.1.2 we describe in more detail what we refer to as access control

and accountability. We present the relevant issues related to security in wired and wireless

networks in sections 1.2 and 1.3, respectively. The remaining sections describe our approach,

its main properties and results, and the original contributions of this dissertation.

1.1.1 Access Control

Access control can be defined as the mechanism used by a system to grant or revoke the

right to perform some action. In this dissertation we focus on access control at the link

layer, i.e., the procedure used by devices to convince the network that their packets should

be forwarded. Consider a client1 that “connects” to the network and requests service.

The client could be an Ethernet device connecting to a physical port or an IEEE 802.11

card associating with an access point (AP). Before providing any service, the network

authenticates the client: it can check the identity of its user, the physical port (or access

point) the client is connected to, or even base its decision on finer-grained information

regarding the device’s physical location. If authentication succeeds, the network authorizes

the client to use its resources and provides it with a network configuration which dictates its

1We use the term client to denote a device connecting to the network and the term user to represent the

person operating the device.

Page 23: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.1. LINK-LAYER SECURITY IN LOCAL AREA NETWORKS 3

level of connectivity. For example, this configuration can specify an IP address and proper

VLAN settings, which coupled with access control lists placed in the network define the

exact level of network visibility provided to the client.

Different environments require different access control policies. For example, a visitor

with a wireless-enabled laptop entering an enterprise campus can be provided with a basic

level of service (e.g. only email and Web access) without ever having to prove his or her

identity. Filtering state at the network is responsible for providing proper isolation, therefore

minimizing the damages caused by a misbehaving visitor. On the other hand, employees

connecting to wired ports within their offices can be provided with more privileged settings,

such as being allowed to connect to development machines and internal servers. If needed,

a company can even provide specific users with special privileges using rules such as “allow

user JohnTheCEO to connect to server srv12 when using physical port 65A and after a

successful two-factor authentication. In the other extreme, a cafeteria – which probably

houses no sensitive information – may provide all clients connected to its access points with

the same level of service.

1.1.2 Accountability

A system has proper accountability if the actions of an entity are traceable uniquely to

that entity. According to the Merriam-Webster Online Dictionary, accountability is “...an

obligation or willingness to accept responsibility or to account for one’s actions [18].” A

proper accountability framework allows a network to check whether clients are respecting

service rules and to react to situations in which that is not the case.

We consider a local area network to have an acceptable level of accountability if it

can robustly identify the device responsible for a specific network traffic and establish the

physical location of misbehaving clients. For example, an enterprise hit by the latest worm

would like to know the exact ports being used by all compromised hosts, such that proper

filters can be put in place to prevent a widespread event and such that operating systems

can be patched. Likewise, it would like to identify (and possibly disconnect) a guest device

that uses the wireless network to launch a denial-of-service (DoS) attack against a major

website. As cafeterias today see providing wireless access as an important requirement

to attract new customers, they would also like to pinpoint a misbehaving client that uses

dishonest methods to consume most of the available bandwidth.

Page 24: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4 CHAPTER 1. INTRODUCTION

1.2 Security in Wired LANs

Access control in wired networks is a less complicated problem because they are able to

leverage physical security measures already deployed. Enterprises can lock their Ethernet

ports inside buildings protected by keys, badges, and security personnel, physical security

measures that are necessary for the protection of all company assets. Wired ports are just

a subset of these assets, being reasonably protected without any additional mechanism and

without increasing management costs. If a user has the credentials needed to walk into an

office and connect her laptop to a wired port, most of the time there is nothing else she

needs to do to use the network. In this case, network access control decisions are inherently

based on the physical location of clients, and network security is directly related to the level

of physical security implemented.

In fact, this base security level seems sufficient for most wired installations. I.e., for the

purposes of access control at the link layer, most wired networks reach a level of protection

considered acceptable by simply leveraging physical security measures. This way they can

avoid the additional costs incurred by mechanisms such as PPPoE [80] and IEEE 802.1X [3].

Extra security is left to upper layers: for instance, applications can use protocols such as

IPSec [70], SSL/TLS [42], and SSH [118, 117] to create end-to-end secure tunnels and

implement finer-grained access control.

In wired networks, accountability can also be easily implemented because clients have

to be physically attached to ports, being therefore easily trackable and constantly exposed.

Once malicious activity is detected, the network can identify the port being used and find the

offending device, which may have its connection terminated or even be physically removed.

1.3 Challenges in Wireless Security

Enterprises see many advantages in deploying wireless LANs (WLANs), a technology that

in the past few years has witnessed considerable market penetration. Compared to wired

networks, WLANs incur lower installation costs per user given the reduced cabling and

manual labor required. Moreover, connectivity is provided to mobile users at no extra cost,

improving efficiency and productivity. According to Infonetics Research, the worldwide

revenue from wireless LAN equipment reached $2.4 billion in 2005, and it is estimated

that respectively 57%, 62%, and 72% or small, medium, and large organizations in North

America will have deployed WLAN equipment by 2009 [92, 93].

Page 25: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.3. CHALLENGES IN WIRELESS SECURITY 5

One major challenge regarding the deployment of wireless networks is dealing with the

unpredictable nature of signal propagation. While signal strength decreases with distance,

the rate of decay inside a building depends on the construction materials used, floor lay-

outs, the placement of furniture and other obstacles, as well as the number of people and

their moving patterns. The resulting reflection, diffraction, and scattering of waves creates

environment-dependent oscillations in received signal strength, which challenge not only

services such as network planning but also all others that rely on signal strength statistics.

Regarding security, one major disadvantage of wireless networks is that they violate

the physical security model that is so effective in wired LANs, therefore requiring addi-

tional mechanisms to implement proper access control and accountability. Unlike the wired

scenario, there is no inherent access control: wireless links extend connectivity beyond phys-

ical boundaries, making networks available in parking lots, across the street, and in nearby

buildings, adjacent locations where coverage was not intended. When left unprotected,

these wireless links make networks vulnerable to misuse and attacks. It is also more diffi-

cult to make clients accountable for their acts, as misbehaving devices can move freely and

be 50 meters from the access points they use. Moreover, malicious users can use directional

antennas and amplifiers to produce higher signal strength levels and create many different

signal strength patterns to further obfuscate their physical locations.

To make matters worse, current access control solutions are not suitable for all wireless

installations: they either provide little security improvements or incur high management

overhead. On one hand, there are mechanisms that are easy to deploy but that add little or

no protection. For instance, installations may leave their wireless links open, hide network

names (SSIDs in 802.11 jargon), or use MAC address lists. As these solutions can be

easily circumvented, networks are still at risk of being compromised. On the other hand,

there are several mechanisms that provide higher security levels and fine-grained access

control capabilities, but at much higher costs. In this category are mechanisms based

on passwords or private keys, including authentication protocols proposed by the IEEE

802.11i [7] standard to secure wireless LANs, such as EAP-TLS [20], EAP-TTLS [53], and

PEAP [87]. The higher management costs come from adding and removing users, granting

and revoking access rights, as well as protecting sensitive information (keys), which is vital

for keeping systems uncompromised. These mechanisms also place a lot of responsibility on

users, who have to choose proper passwords and keep them safeguarded.

Page 26: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6 CHAPTER 1. INTRODUCTION

As a result of this trade-off between security and management costs, a large percent-

age of wireless networks still operate with insecure configurations and many of them are

commonly victims of network abuse. A world-wide wardriving effort performed in June

2004 detected over 200,000 access points, with more than 60% of them running without

cryptographic protection (then using WEP) and over 30% with the default SSID set by the

manufacturer [8]. In enterprise environments, insecure configurations are also common. A

study performed by RSA and NetSurity in March 2005 revealed that over 30% of enterprise

wireless LANs in London, Frankfurt, New York, and San Francisco lacked basic security

measures [100, 101, 102, 103]. While these configurations may be complemented by VLANs

and firewalls to restrict the services available to wireless clients, networks are still left unpro-

tected and vulnerable to misuse. Of 700 institutions that responded to the 2005 CSI/FBI

Computer Crime and Security Survey, over 15% acknowledged that their wireless networks

were victims of abuse during the previous year [37]. This number is clearly a lower bound,

as these institutions need at least to be aware that such attacks took place and willing to

share that information.

Unfortunately, this situation is doomed to get worse because the number of deployed

access points keeps rising at a considerable rate, allowing malicious users to find vulnerable

networks with minimal efforts. According to the study by RSA, the number of access points

detected in London and Frankfurt increased respectively by 62% and 66% between 2004 and

2005 [100, 101]. Market research shows that WLAN unit shipments increased 39% between

2004 and 2005, with access points accounting for 81% of the wireless equipment revenue [93].

Finally, link-layer services may be vulnerable to a large class of denial-of-service attacks

based on identity spoofing even if users are authenticated and session keys generated to

protect traffic. This happens because despite the established session keys, these services

identify clients using only their MAC addresses, which can be easily forged. For exam-

ple, an attacker in an IEEE 802.11 network can disrupt service to well-behaved clients by

spoofing their addresses or the addresses of their access points and requesting disconnec-

tion. Bellardo and Savage have shown that effective attacks can be easily implemented: a

10-second deauthentication attack can immediately knock a client off the network and pos-

sibly incur minute-long outages given the interaction between 802.11 and TCP [29]. These

attacks can be currently implemented in 802.11 networks even if the security mechanisms

proposed by the 802.11i standard are used, given that control and management frames are

still transmitted without cryptographic protection and [7]. Another option would be for

Page 27: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.4. LOCATION-BASED APPROACH TO WIRELESS SECURITY 7

the attacker to use many different addresses to submit high rates of requests in order to

overload a shared authentication server (e.g. a RADIUS [97] server). These attacks are also

possible in 802.11i-enabled networks because clients need to contact these servers as part

of the authentication process, during which messages are inherently unprotected.

In summary, if on one hand wireless LAN technology is compelling for many reasons, on

the other they introduce a new security paradigm that creates challenges for access control

and accountability. It is clear that security problems will continue to exists unless cheaper

yet effective solutions become available.

1.4 Location-Based Approach to Wireless Security

The objective of our research is to answer the following question: is there a way to also

leverage physical security measures in wireless LANs so that security increases to an accept-

able level without a considerable increase in management costs? This dissertation shows

that the answer is yes.

Our approach can be summarized by three design guidelines:

1. Leverage information about the physical location of clients. Such information

is used to limit network service to those clients located within the intended coverage

area and also to make clients again physically exposed and accountable for their acts;

2. Take advantage of increased numbers of access points. When WLAN devices

become commodities – IEEE 802.11 hardware provides a great example – larger num-

bers of APs can be installed without considerably increasing total cost of ownership

while improving robustness and the accuracy of location-based services;

3. Minimize human assistance during system configuration and maintenance.

This is required to allow networks to scale to large numbers of APs and also to provide

management costs that are feasible to most installations.

We show in this dissertation that our approach decreases the gap between wired and

wireless security, providing an alternative that is reasonably priced and that cannot be

easily circumvented.

Page 28: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

8 CHAPTER 1. INTRODUCTION

1.4.1 Access Control

Our proposed mechanisms improve access control by allowing network administrators to

define geographical boundaries for wireless service, minimizing undesired coverage and re-

ducing the likelihood of attacks and network abuse [50]. In order to use the network, clients

are forced to move closer to the infrastructure, therefore leveraging any physical security

measures deployed. We show that standard devices beyond this intended coverage area are

denied service and that extending the range of the network requires impractical amounts of

resources such as amplification and antenna gain.

In order to impose such boundaries, a network has to check whether each client is

physically located within the intended coverage area. We propose two mechanisms – a

robust localization system and range-based authentication – that exploit inherent properties

of the wireless channel to achieve this goal.

We first present the design and evaluation of our localization system. Similar to earlier

systems, it monitors client transmissions and uses signal strength measurements collected at

different vantage points to estimate the position of clients as they use the network. Unlike

other systems, however, it was designed to identify (and reject) clients trying to access the

network from locations beyond the intended coverage area and to face malicious transmitters

that may increase their transmission power levels or use directional antennas to access the

network. The fact that it was designed with such adversaries in mind makes our system

suitable for access control purposes while still providing accurate location estimates.

We later present the design of a range-based authentication protocol that explores re-

ceiver sensitivity constraints to further increase the costs required to extend the intended

coverage area. Each access point is configured with a maximum range so that, together,

all APs cover the whole service area. In this protocol, a client authenticates successfully

by proving to be within range of one of the access points. While the localization system

forces clients to act as transmitters, in this mechanism clients seeking connectivity act as

receivers, for which amplification is a harder problem.

These two mechanisms allow a network to implement location-based access control (LBAC),

in which a client’s rights vary according to its physical location. For example, a visitor al-

lowed to attend a seminar inside an enterprise building can be automatically provided with

basic network connectivity as soon as his location can be verified. Likewise, service can be

terminated as he walks out of the premises.

Page 29: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.4. LOCATION-BASED APPROACH TO WIRELESS SECURITY 9

1.4.2 Accountability

Our architecture improves accountability as the use of a localization system provides real-

time information about the physical location of transmitters (clients or otherwise), making

them once again physically exposed and therefore accountable for any misbehavior. As

shown later, most clients have their positions estimated within 2 meters (6.56 feet) of their

real locations, which is comparable to a wired network in which the exact location of the port

is known, but where clients can use cables tens of meters long. Almost 50% of respondents

in the CSI/FBI survey acknowledged being victims of “insider abuse of network access,” so

such capabilities would be useful in many installations. For example, networks could use

such precise location information to detect (and remove) rogue access points as soon as they

are installed by employees, and to track “visitors” granted with basic connectivity in public

spaces who appear responsible for suspicious network traffic.

To further improve accountability, we present a mechanism that allows networks to

differentiate between distinct devices even in the face of MAC address spoofing. Our mech-

anism assigns to each transmitter a signal strength pattern, which we call a signalprint,

that functions as a location-based device identifier. We show that distinct devices produce

different signalprints (and can therefore be successfully distinguished) unless they are in

close proximity to each other. For instance, this capability allows IEEE 802.11 networks

to detect identity-based denial-of-service attacks. If a malicious device uses the MAC ad-

dress of an access point to disconnect an unsuspecting client, the attempt can be easily

spotted if the attacker is on a different floor or in the parking lot, as the two signalprints

produced are clearly distinguishable. Furthermore, the physical location of the attacker can

be established by inputting the signalprint into a localization system like the one we have

designed.

1.4.3 Scalability

In order to scale to large numbers of access points without incurring high management costs,

services need to minimize their dependence on human assistance during reconfiguration.

One often finds that when calculating total cost of ownership (TCO) for a new service,

capital expenses – or CAPEX, mostly composed of equipment costs – are dominated over

time by operational expenses (OPEX), which include labor costs resulting from system

installation and maintenance [50]. As an example in wireless networks, services that require

Page 30: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

10 CHAPTER 1. INTRODUCTION

human-assisted sampling of the wireless coverage (such as the “site surveys” needed for some

localization systems) can substantially increase OPEX, given that access points are usually

incrementally deployed and often relocated. In fact, research suggests that centralized

wireless architectures can achieve lower TCO mostly due to a considerable decrease in

operational expenses [52].

Our system uses the access points already deployed to configure itself without opera-

tor participation. We show that all the information regarding signal strength attenuation

within the coverage area that is needed by our localization and range-based authentication

mechanisms can be autonomously established by the system, with little or no impact on

accuracy and quality of service.

1.5 Assumptions About the Network

Our location-based approach to security is suitable for a wireless local area network with

the following properties:

• RF data collection: access points are able to measure, on a frame-level basis,

wireless transmission properties such as signal strength and noise levels;

• Centralized control: a network device aggregates all the wireless traffic and also

manages all the access points;

• Physical security: the level of physical protection surrounding the planned coverage

area is consistent with the intended security level and threat model.

The first property is necessary because all our proposed services characterize wireless

transmitters using such RF measurements. For instance, signal strength measurements are

the input to our localization system and are also used to construct the signalprint assigned

to each transmitter.

Currently, IEEE 802.11-compatible hardware provides all the necessary RF information,

being used in our testbed and measurements. While we focus on the use of 802.11 tech-

nology in this dissertation mostly due to its wider adoption, our mechanisms are equally

suitable for other WLAN standards such as HiperLAN/2 [49], and some of them can even

be used in shorter-range wireless personal area networks (WPANs) such as Bluetooth/IEEE

802.15.1 [13] and UWB/IEEE 802.15.3 [5]. A detailed study of implementing location-based

security using these technologies is left as future work.

Page 31: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.6. TERMS AND DEFINITIONS 11

We consider networks where access points are simple devices controlled by a centralized

wireless appliance (WA). Our ideas closely follow industry standards such as CAPWAP [31,

116], where APs are made as simple as possible and where most of the functionality is placed

at the WA, which is computationally more powerful. One of the objectives of this approach

is to transform APs into wireless commodities: cheap, unspecialized devices that can be

deployed at higher numbers and easily replaced, reducing management overhead without a

significant increase in capital expenses. The CAPWAP architecture is in path for industry

adoption, providing a concrete example of deployment scenario for our services.

This central point of control is necessary for several reasons. First, it provides a nat-

ural place to implement services that require traffic aggregation, such as localization and

signalprint calculation. Second, it is required whenever network-wide configuration or syn-

chronization is needed, such as during channel assignment (important for localization and

intrusion detection), access point selection (which APs are used for authentication and data

sessions), and transmission power control (achieving the desired coverage with minimum

interference and leakage).

Finally, a coherent level of physical security is essential to any location-based security

mechanism. Location-based access control policies are useful if only targeted clients are

allowed within the physical space where service is provided. (Note, however, that they may

not necessarily be provided with the same level of service.) For this reason, our mechanisms

are suitable for an installation with an attack model consistent with the level of physical

security implemented. They can be used in enterprise environments and other installations

with sensitive information because the more stringent security requirements are coupled

with proper physical security measures. Our services can also be used in public spaces such

as cafeterias and other hotspots because the lack of physical security is counterbalanced by

a weaker threat model and a willingness to serve a wider user base.

1.6 Terms and Definitions

We use the term service area (SA) to denote the physical space that defines the geographical

boundaries for wireless coverage, i.e. where clients need to be physically located to be

provided with network connectivity. For example, in an enterprise environment, the service

area may be configured as the interior of an office building. While this may be the case in

most scenarios, the physical limits of the service area may not coincide with the boundaries

Page 32: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

12 CHAPTER 1. INTRODUCTION

for the placement of access points or the enforcement of physical security. For instance, an

enterprise seeking additional protection could deploy additional APs acting as sensors in a

demilitarized zone (DMZ) around the service area, a buffer zone that is physically secure

but where wireless service is denied.

While the service area defines the physical space where wireless service is to be provided,

the reference client establishes the minimum hardware requirements, i.e. the capabilities

needed by a wireless device to be accepted when located inside the service area. Our services

set configuration parameters according to reference client’s capabilities such as transmission

power levels, noise figure estimates, and antenna properties such as directivity and gain.

The reference client needs to be set carefully, as there is a trade-off between security

and heterogeneity: the more flexible an installation is in terms of the devices it accepts, the

weaker the security level achieved. For example, an enterprise that periodically upgrades the

hardware used by its employees and changes the definition of the reference client accordingly

will always maximize the resources required by attackers. For our testbed deployment, we

use a standard 802.11a/b/g PCMCIA card as the reference client. We assume that its

maximum transmission power lies between 15 and 20 dBm, that it is provided with an omni-

directional antenna with 0 dBi of gain, and with a noise figure inferior to 10 dB. These

values are compatible with current PCMCIA cards such as the Cisco 350 [4].

1.7 Original Contributions

The popularity of wireless LANs has exposed a significant security gap between wireless

and wired networks, mainly due to how these two technologies leverage physical security

measures. Current solutions that address the “wireless security” problem and that in fact

provide satisfactory levels of protection require user credentials, incurring higher manage-

ment costs. The thesis of this dissertation is that it is possible to leverage physical security

measures in wireless LANs using information related to the physical location of clients,

therefore improving security in a cost-effective manner.

This dissertation makes the following original contributions:

• We show that well-behaved clients within a service area and provided with proper

hardware are correctly identified and located accurately, allowing the implementation

of location-based access control and improving accountability;

Page 33: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

1.8. OUTLINE OF DISSERTATION 13

• We show that attacks can be prevented or detected by physical security measures.

We demonstrate that in order to extend coverage beyond the intended service area,

malicious clients need to either get close to the SA (running afoul of physical security

measures) or employ high-gain antennas and amplifiers, making these attempts not

only harder to implement but also easier to detect. We also show that identity-

based DoS attacks can be detected with high probability unless an attacker is in close

proximity to his or her victim;

• We show that our architecture incurs low management costs. The system can configure

itself using the access points already deployed, with no operator participation. We

show that this automatic calibration achieves satisfactory results despite the challenges

associated with signal strength modeling.

The main achievement of our location-based approach is a substantial increase in the

costs of mounting attacks beyond the service area, simultaneously providing higher secu-

rity than basic mechanisms and lower management costs than solutions that rely on user

credentials.

1.8 Outline of Dissertation

The remainder of this dissertation describes our system architecture and evaluation. Chap-

ter 2 describes relevant prior work regarding location-based services and security in wireless

networks. In Chapter 3 we describe how the system uses the deployed access points to con-

figure itself autonomously. Chapters 4, 5, and 6 present the design of our three proposed

mechanisms and their evaluation using measurements in our testbed. Chapter 4 describes

our proposed localization system. Chapter 5 presents range-based authentication, while

Chapter 6 shows how signalprints can be used to detect identity-based DoS attacks in wire-

less LANs. Finally, Chapter 7 presents a summary of our results, suggestions for future

work, and concludes this dissertation.

Page 34: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

14 CHAPTER 1. INTRODUCTION

Page 35: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 2

Related Work

This chapter surveys prior attempts to leverage user location information for both general

and security purposes. In Section 2.1, we discuss prior work on wireless localization systems.

Section 2.2 describes techniques that explore the inherently constrained nature of wireless

links for security purposes. In Section 2.3, we present prior work on distance bounding

protocols and location verification mechanisms, designed to provide stronger security guar-

antees than standard localization systems. Finally, Section 2.4 surveys prior work related

to detection and mitigation of identity-based denial-of-service attacks. We focus mostly on

systems designed for use in wireless LANs, although we also present some relevant contri-

butions in other fields such as wide-area localization and wireless sensor networks.

2.1 Leveraging User Location Information

This section surveys systems that use measurements from different vantage points to estab-

lish the physical location of mobile devices. These systems can be broadly characterized

according to the kinds of measurements they use, including estimates of distance (range),

angle of arrival, and received signal strength levels. In sections 2.1.1-2.1.3 we focus on sys-

tems that employ signal strength measurements to locate mobile devices. Systems based

on infrared and ultrasound measurements are discussed in Section 2.1.4. Other relevant

localization systems are addressed in Section 2.1.5.

15

Page 36: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

16 CHAPTER 2. RELATED WORK

2.1.1 Signal Strength-Based Localization Systems

The main advantage of signal strength-based localization systems is that they can be easily

deployed. Estimating the energy level in a wireless channel is necessary to implement

techniques such as CSMA, so signal strength statistics can be easily provided by devices

on a per-frame basis. For instance, the availability of RSSI1 measurements in IEEE 802.11

devices has supported a large volume of research on device localization.

All systems described in this section have at least one significant disadvantage regarding

their use as a security building block in large-scale networks. First, they were not evalu-

ated in adversarial settings, where malicious clients try to obfuscate their locations using

amplifiers or directional antennas. We examine systems designed for security applications

in Section 2.1.2. Second, most systems require a considerable amount of manual calibration

before they can be used. One needs to measure signal strength levels at many locations

inside the service area to create a RSSI database which is then used to “train” the system.

We discuss systems designed to reduce the amount of manual calibration in Section 2.1.3.

Pioneer systems such as RADAR [26, 27] and SpotON [64] demonstrated that accurate

localization in wireless LANs was possible using only RSSI measurements. Using only 3

access points in a 43.5 m×22.5 m service area, the best algorithm used by the RADAR

system (the “empirical method”) achieved a median localization error lower than 3 meters

(the euclidean distance between real and estimated locations) [26]. Another contribution of

RADAR was to propose the use of path loss models for localization in WLANs, although

this approach generated results inferior to those of the empirical method.

At least two localization systems were developed as part of Project Aura using the

IEEE 802.11 infrastructure at Carnegie Mellon University [54, 106]. Small et al. showed

that signal strength measurements for a stationary device are fairly stable, which agrees

with our results [106]. The CMU-PM algorithm designed by the authors based on pattern-

matching techniques was shown to provide better accuracy than a triangulation-based al-

gorithm (CMU-TMI), although the former incurred a higher training overhead [54].

These earlier systems generated considerable interest in wireless localization and moti-

vated many other researchers to approach the problem using pattern recognition techniques.

Instead of modeling signal attenuation directly – which would allow signal strength predic-

tion to be extrapolated to locations that were not sampled – localization is performed by

comparing live signal strength measurements to RSSI distributions pre-computed for the

1Received Signal Strength Indicator. We use RSSI and signal strength interchangeably.

Page 37: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.1. LEVERAGING USER LOCATION INFORMATION 17

finite set of locations visited during system calibration. As the main objective was to im-

prove accuracy, this direction was consistent with the results of earlier work, which favored

pattern matching over modeling physical properties directly.

In their design of the Nibble location service, Castro et al. proposed the use of Bayesian

networks to locate users at the granularity of rooms [33]. In one of their deployment

scenarios, the authors used 10 access points and a set of 12 locations, calibrating the system

over the course of a few days. Whenever a location was produced by their algorithm, it was

correct 97% of the time, although 15% of the readings did not produce a location estimate.

Roos et al. used machine learning techniques to design a system that achieved an average

localization error inferior to 2 meters on a 16×40m office space provisioned with 10 access

points [98]. They proposed two localization methods and showed that both performed better

than nearest neighbor search (similar to the algorithm used by RADAR). To achieve these

results, however, the authors relied heavily on manual sampling: the training data set was

created by sampling locations every 2 meters on a grid. The authors also showed that at

least one calibration point was needed every 25 squared meters of area for their algorithm

to achieve an average error inferior to 2 meters.

Ladd et al. used similar techniques to build a system that provides median error inferior

to 1.5 meters [76]. Their system estimates not only the location but also the orientation

of a mobile device. Their measurements were performed inside an office building, within

a 32.5×17 m area. The authors themselves consider the necessary training as one of the

disadvantages of their system [76].

The main objectives of the Horus system were to provide better accuracy than that of

earlier systems while also decreasing the processing overhead associated with the localization

service [119, 120, 121]. Computation requirements were reduced by performing localization

at the clients and using clustering techniques, which group locations covered by similar sets

of access points [119, 121]. With locations in one of the testbeds covered by an average of 6

APs and with locations sampled every 5 feet to train the system, Horus achieved a median

error inferior to 0.5 meters [121]. (The authors also showed that, with the same data set,

RADAR [26] and the system proposed by Roos et al. [98] achieved median errors of 2.96

and 0.48 meters, respectively.)

Page 38: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

18 CHAPTER 2. RELATED WORK

2.1.2 Making RSSI-Based Systems Robust Against Attacks

Only recently have researchers focused on improving the robustness of RSSI-based local-

ization algorithms against malicious devices. For instance, a client that wishes to disguise

its location can use different transmission power levels over time, use amplifiers to gener-

ate high RSSI measurements even from distant locations, or use directional antennas to

decrease the number of RSSI measurements reported and create different signal strength

patterns.

Tao et al. [109] presented techniques to improve the performance of a previously pub-

lished localization system [76] when locating transmitters with unknown transmission power

levels. By modeling the difference between RSSI values reported by pairs of access points,

their system was shown to achieve higher accuracy when locating users with different wire-

less cards or employing different transmission power levels.

2.1.3 Decreasing Calibration Efforts

Recently, researchers have focused on decreasing the amount of human effort needed to con-

figure RSSI-based localization systems. Many systems already provide enough accuracy to

enable most location-based applications, but reducing the amount of manual configuration

is still necessary to decrease overall installation costs and encourage broader deployment.

Krumm and Platt investigated the impact on localization accuracy of reducing both

the number of RSSI measurements collected at each location and the number of locations

sampled during system calibration [75]. Their algorithm uses an interpolation function to

predict RSSI levels at locations that were not sampled during calibration. Using data col-

lected at 137 locations (one location every 19.5 m2) and a total of 22 APs in a building

with an area of 2,680 m2, their system provided an RMS error of 3.75 meters. The au-

thors showed that using 50% and 20% of the calibration locations increases the error by

respectively 20% (0.74 m) and 42% (1.59 m).

Haeberlen et al. designed a localization system that locates users at the granularity of

rooms and requires between 1 and 2 minutes of calibration per cell (an area of approximately

25 m2) [58]. They evaluated their system in a 12,000 m2 office building divided into 512 cells

and provided with 33 access points (average of over 14 APs within range of each location).

The correct cell is returned by the system for 95% and 90% of the trials when respectively

33 and 17 access points are used.

Page 39: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.1. LEVERAGING USER LOCATION INFORMATION 19

Concurrently to our work, Gwon et al. proposed the use of inter-AP measurements

to implement a calibration-free localization system [57]. In their scheme, each access point

establishes a mapping curve (essentially a path loss model instance) for each neighboring AP,

based on periodic RSSI measurements. A mobile client reports RSSI measurements back

to a localization server, which establishes the client’s position using the mapping curves

calculated by the closes AP (the one with the highest reported RSSI). Their algorithm

always uses 3 access points for localization and was shown to achieve a median error of 5.4

meters inside an office building with dimensions of 39.8×25.5 meters and with 4 APs.

In their design of the LEASE system, Krishnan et al. use special emitters – devices

placed strategically throughout the service area – to perform location fingerprinting mea-

surements [74]. All the calibration data is generated using transmissions performed by the

emitters and the corresponding RSSI measurements reported by access points. As in the

work of Krumm et al., a interpolation function is used to predict RSSI levels at locations

that do not contain emitters. They evaluated their system in two buildings with a total area

of over 7,000 m2 and 9 access points. They estimated the median error to be 4.5 meters

when 12 emitters are used and just over 2 meters when 104 emitters are used.

Chen et al. evaluated the use of RFID tags to assist calibration in a RSSI-based local-

ization system [34]. RFID readers placed in corridors were used to detect linear trajectories

of mobile users with passive RFID tags. Assuming clients move at constant speeds, the

system finds the RSSI samples generated by clients at intermediary points while walking

from one RFID reader to another, and uses these samples for calibration purposes. Using

the same localization algorithm, the authors found that moving from a manual calibration

process to an automatic one assisted by RFID tags increased the average localization error

slightly, from 2.73 to 2.9 meters.

Lim et al. have recently designed a RSSI-based localization system that also requires

no manual configuration [79]. Using inter-AP measurements, their algorithm calculates

a signal-distance map, which is then used to estimate the distance from a mobile client

to each anchor node. A lateration algorithm is used to calculate a client’s geographical

position using these distance estimates. With 8 access points distributed across a 26×23

m building wing and with RSSI measurements taken at 25 different locations, their system

provided a median localization error between 2 and 3 meters. The authors also showed that,

at least with their algorithm, localization accuracy changes considerably over time due to

fluctuations in signal strength measurements ([79], page 8).

Page 40: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

20 CHAPTER 2. RELATED WORK

2.1.4 Ultrasound and Infrared Based Systems

Systems based on infrared and ultrasound transmissions can provide accurate localization

and enable the implementation of many context-aware applications, but are not suitable

for our purposes. To use these technologies to secure wireless LANs, current hardware

would have to be modified to include infrared or ultrasound capabilities, which would incur

non-trivial costs.

The Active Badge system used special badges equipped with infrared transmitters to

track people and objects within a building [114]. Badges periodically transmit their unique

identifications, which are detected by infrared receivers and relayed to a centralized server.

Localization is simpler than in RF-based systems: infrared transmissions do not propagate

through walls and other obstacles, transmitters usually have short ranges (6 meters for the

hardware used in [114]), and the location of a mobile device can be estimated as the location

of the receiver that heard its last transmission.

The system proposed by Harter et al. used RF and ultrasound transmissions to track

mobile users equipped with special devices called bats [60, 61]. Periodically, a base station

uses an RF transmission to probe each bat device, which responds by transmitting an

ultrasonic pulse. Sensors deployed throughout the building – which are reset through the

wired network simultaneously with the RF transmission – receive the bat’s ultrasonic pulse

and report the corresponding times-of-arrival to a centralized server. These are used to

estimate the distances between sensors and the bat, which has its location determined

through multilateration. With 100 ultrasound receivers and two base stations in a building,

the system was able to estimate the location of mobiles devices to within 9 centimeters of

their real locations 95% of the time [61].

Priyantha et al. designed the Cricket system to allow low-cost implementation of in-

building location-aware applications while maintaining user privacy [88]. Like the Bat

system, Cricket also uses RF and ultrasound transmissions, although in a slightly different

way. Periodically, beacon devices spread across a building transmit an RF signal simulta-

neously with an ultrasonic pulse. Mobile devices equipped with listeners calculate their

distances to each beacon using the delay between RF signals and the ultrasonic pulse and

the difference between the speeds of light and sound in air. Using the closest beacon as a

location estimate, mobile devices can be localized with a granularity of 4×4 feet [88]. The

authors later extended this system to calculate the orientation of mobile clients with an

accuracy of 3-5◦ [89].

Page 41: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.2. EXPLORING LOCATION-LIMITED CHANNELS 21

2.1.5 Other Localization Systems

Niculescu et al. proposed a system based on angle-of-arrival (AoA) measurements that elim-

inates calibration but that requires special-purpose access points [45]. Their implementation

uses APs with revolving directional antennas (horizontal and vertical beamwidth values of

approximately 30◦ and 33 RPM) that are able to estimate the angle of an incoming trans-

mission with a median error of 22◦. Using only AoA measurements and with 7 APs placed

across a 56×25 m area, their system provided a median error of 2.9 meters with a total of 32

locations sampled. When AoA measurements are coupled with range estimates produced

using a path loss model, the median error decreases to 2.1 meters.

Finally, the Global Positioning System (GPS) provides localization services using range

estimates based on time-of-flight measurements from at least 4 satellites [48, 55]. Differ-

ential GPS (DGPS) is a mechanism proposed to enhance localization accuracy using two

receivers located within kilometers of each other. In summary, the largest error sources

in the standard GPS system – related to the estimated satellite positions and propagation

through the ionosphere – are identical for users in close range and cancel out in relative

measurements. The concept behind DGPS inspired the use of differential signal strength

values when designing our signalprint-based mechanism.

2.2 Exploring Location-Limited Channels

Several researchers have proposed the use of location-limited channels (LLCs) for security

purposes. A LLC, according to the definition by Balfanz et al. [28], is a communication

channel with the “property that human operators can precisely control which devices are

communicating with each other.” While many of these works use a LLC to distribute keys

that can be latter used for authentication purposes over a communication channel (such

as 802.11 links), our work explores the constrained nature of the communication channels

themselves to check whether devices are in close proximity to each other. Our approach

provides security improvements without requiring extra hardware support (e.g. infrared,

ultrasound, or GPS capabilities).

In their pioneer work, Denning and MacDoran proposed location-based authentication

as a way to use geodetic localization to improve network security [40]. In their mechanism,

a location signature sensor (LSS) uses raw signals transmitted by all GPS satellites within

its range to create an unforgeable location signature that is unique to that specific place

Page 42: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

22 CHAPTER 2. RELATED WORK

and time. Mobile clients can acquire these signatures from the LSS and use them – for an

amount of time in the order of milliseconds – to prove their physical location to remote

hosts. Their mechanism requires special devices and targets remote authentication, while

our protocols target local authentication.

Stajano and Anderson defined a security policy model used to establish secure yet tran-

sient associations between two devices [107, 108]. In this model, an “imprintable” slave

(e.g. a new home appliance just taken out of the box) is set to obey the first master (e.g.

a remote control) that sends it a secret key over a physically secure channel (e.g. physical

contact). After being imprinted, a slave only accepts commands from its current master,

which can send the slave device back to the imprintable state with a “death” command.

As masters transmit session keys unencrypted during imprinting – the authors avoided the

use of asymmetric cryptography to allow their mechanism to be used in power-constrained

devices – the channel used for that purpose needs to be protected against eavesdropping,

which justifies their use of physical contact as communication channel.

Kindberg and Zhan proposed a general model that explores location-limited channels

to implement location authentication [71]. They defined receive-constrained and send-

constrained channels and proposed several protocols that use them to verify the location of

a mobile client. The authors suggest that Bluetooth, infrared, and even IEEE 802.11 can be

used as base technologies to implement constrained channels, but they focus on the design

of the authentication protocols and provide no empirical data regarding the performance of

real communication links. Using their notation, our range-base mechanism can be classified

as a protocol that explores a receive-constrained channel.

Balfanz et al. built on the work of Stajano and Anderson and designed a mechanism

used to bootstrap trust in ad-hoc networks [28]. In their scheme, two devices first exchange

public keys (or secure hashes of these) over a location-limited channel. For example, a

user in an airport lounge that points to a specific printer using an infrared link can have

reasonable confidence that the public key acquired was actually sent by the device he or she

intended to communicate with. With public keys exchanged, the two devices can proceed

to authenticate each other over a wider-ranged network (e.g. IEEE 802.11) using standard

protocols such as TLS [42] or IKE [68]. Their mechanism allows the use of identity-based

authentication in ad-hoc networks without reliance on a wide public key infrastructure. The

authors argue that their use of asymmetric cryptography reduces the secrecy requirements

on the location-limited channel compared to the work of Stajano and Anderson, allowing

Page 43: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.3. DISTANCE BOUNDING AND LOCATION VERIFICATION MECHANISMS 23

them to use audio or infrared for this purpose.

The design of Zero Interaction Authentication, by Corner et al., makes use of a short-

range wireless link for communication between a wearable authentication token (e.g. a

PDA) and a laptop with an encrypted file system [36]. With traditional encrypted file

systems, users need to authenticate periodically to supply a decryption key which unlocks

the data in the laptop. Data is vulnerable to theft as long as cached decryption keys are

valid, so in these systems there is a trade-off between security and usability. With ZIA, a

user authenticates infrequently to the token, which provides transient decryption keys to

the laptop much more frequently using a secure wireless channel established using standard

Diffie-Hellman techniques. The security of this mechanism depends on the limited range of

the wireless link between laptop and token because the laptop maintains unencrypted (and

therefore unprotected) data while it can communicate with the token.

2.3 Distance Bounding and Location Verification Mechanisms

Distance bounding mechanisms aim to determine or verify the physical distance between two

communicating entities while providing strong security guarantees. Location verification

protocols usually use distance bounding as a building block to verify the physical location

of a mobile host using multiple vantage points. We use the terminology proposed by Sastry

et al., in which a verifier (e.g. an AP) checks the correctness of location claims made by

a prover (e.g. a 802.11 device) [104]. Given the accuracy targeted by these systems, they

usually employ time-of-flight (ToF) measurements using RF signals or ultrasound pulses.

The deployment of mechanisms that rely on measurements using RF signals requires

not only accurate timing at the verifier, but also strict processing delay guarantees at both

devices to produce accurate measurements. If the prover takes 50 nanoseconds to respond,

it adds an artificial 15 meters to the range estimate (assuming c = 3 × 108 m/s), which

may cause the verifier to reject the prover’s range or location assertion. Brands and Chaum

proposed a mechanism that establishes an upper bound on the distance between two devices

communicating using a wired link, which is used to prevent man-in-the-middle attacks in

security protocols [30]. Their proposal consists of a challenge-response protocol in which the

verifier times the delay between sending out a challenge bit and receiving back a response.

Waters and Felten designed a protocol that employs round-trip measurements to allow

a prover using a wireless network to demonstrate its proximity to a verifier [115]. The

Page 44: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

24 CHAPTER 2. RELATED WORK

authors used this capability to implement a location verification protocol. Hu et al. used

similar techniques to prevent wormhole attacks in wireless sensor networks [65]. Capkun and

Hubaux studied the vulnerabilities of multiple positioning techniques and designed verifiable

multilateration, an algorithm that uses ToF measurements to verify the position of a wireless

device [112, 113]. Similar techniques have also been explored by other researchers [77].

Protocols that use ultrasound pulses for range estimation considerably simply timing

requirements, but the additional hardware capabilities demanded limit their adoption as

security building blocks for wireless LANs. Sastry et al. proposed the Echo protocol, which

employs time-of-flight measurements involving both ultrasound and RF messages to check

whether a client is within a geographical region of interest [104].

2.4 Detecting Identity-Based Denial-of-Service Attacks

A malicious wireless device implements identity-based attacks (also called sybil attacks) by

changing its identity over time or by using the identities of other devices to impair their

ability to communicate. At the link layer, this can be accomplished by simply changing MAC

addresses. Most works on wireless intrusion detection, both in industry and in academia,

have focused on other kinds of attacks do not require identity spoofing, such as detecting

rogue access points and identifying “greedy” clients that do not respect rules defined by the

MAC protocol. We do not address these here.

Bellardo and Savage have shown that effective DoS attacks in 802.11 networks can

be mounted with standard hardware [29]. They measured the impact of several identity-

based attacks, including the ones targeting authentication and association services, and

presented practical solutions that can be realized with low overhead and without modifying

clients. For example, the authors suggest that access points buffer deauthentication and

disassociation requests for brief periods of time (5-10 seconds) before processing them. In

this case, conflicting requests would be taken as indications of an attack.

A technique called RF fingerprinting (RFF) has been developed to identify distinct

transceivers across multiple wireless systems [47, 110]. The fingerprint for a transmitter is

created from several features (such as phase, and amplitude) extracted during a period of

transient behavior that occurs as the device powers up before a transmission. These “turn-

on transients” tend to be different for each transceiver, allowing even units build on the same

factory to be distinguished. RFF systems have been used to detect cloned phones in cellular

Page 45: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

2.5. CONCLUSION 25

systems [96], and several researchers have proposed their use in wireless LANs [59, 111].

One disadvantage of RFF is that it requires specialized hardware to measure the signal

properties needed with enough precision. Experimental results, however, have shown that

some devices can produce fingerprints that are indistinguishable from each other [47].

Concurrently to our work, Demirbas et al. have proposed the use of RSSI measurements

from multiple sensors to detect sybil attacks in wireless sensor networks [39]. As testbed,

the authors use up to four Mica2 motes operating as sensors at 433 MHz, with motes always

located in close proximity to each other (30 cm to 10 m). Our research demonstrates that

reliable attack detection is possible for larger 802.11 installations, where clients can be more

than 40 meters from access points.

Mechanisms such as client puzzles have been designed to slow down attack sources,

reducing the damages caused by resource depletion attacks [19, 24, 38, 67]. Before any

resource is committed to an incoming request, computational puzzles are sent back to

clients that require CPU- or memory-intensive operations. Despite being protocol-agnostic,

puzzles demand that both clients and servers be modified, increasing deployment overhead

when compared to a mechanism that can be implemented solely at the WA.

On a side note, Gruteser et al. have proposed the use of temporary interface identifiers to

improve privacy in WLANs: clients change their MAC addresses whenever they associate

with an access point, reducing the chances of being tracked [56]. The authors evaluate

this mechanism against an attacker that uses signal strength information to identify MAC

addresses used by the same client. Our research complements this analysis to show that with

higher number of access points, attackers may be able to track clients even after address

changes, unless the number of active devices in the network is large enough as to create

multiple similar signalprints.

2.5 Conclusion

In this chapter we have identified several issues that need to be addressed before location-

based services can be effectively used as security building blocks in large-scale wireless LANs.

We showed that major disadvantages of prior work include the requirement of specialized

hardware and non-trivial amounts of operator assistance during configuration.

Page 46: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

26 CHAPTER 2. RELATED WORK

A localization system can be used to monitor activity on a wireless LAN, pinpoint the

location of misbehaving clients, and allow location-based access control policies to be imple-

mented. To be readily deployed, such a system needs to leverage the hardware architecture

currently used by the network it is trying to protect. Requiring additional hardware ca-

pabilities increases costs and discourages wide-scale adoption. Moreover, the system needs

to configure itself automatically in order to scale to large installations and cope with the

dynamics of wireless networks. Finally, they have to be prepared to face malicious devices.

We showed that prior works in wireless localization do not address at least one of these

issues. We present a system that addresses them in Chapter 4.

We also showed that security mechanisms that work by controlling or measuring the

communication range between entities were either designed with the sole objective of dis-

tributing long-term keys or targeted strong security guarantees that are only realizable with

specialized hardware. Our proposed range-based authentication mechanism, presented in

Chapter 5, explores the inherently constrained nature of wireless links to authenticate clients

in close proximity to access points. Our mechanism requires no hardware modification, so

it can be readily deployed.

Finally, we showed that effective identity-based DoS attacks can be implemented in

wireless LANs and that prior work has not explored the use of location-dependent infor-

mation (such as RSSI measurements) to identify attack sources. Techniques such as RF

fingerprinting, which aim to identify properties of specific devices, are applicable to wireless

LANs but require additional hardware support. In Chapter 6 we describe a mechanism that

uses information related to the location of mobile devices to provide reliable detection of

identity-based attacks and immediate deployment.

Page 47: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 3

Automatic System Calibration

In this chapter we describe the process of calibration, which is executed autonomously and

periodically by our system to collect information regarding signal attenuation within a

service area. Calibration results are used by our localization system (Chapter 4) and when

using range-based authentication (Chapter 5).

3.1 Objective

The objective of calibration is to establish proper parameters for a path loss model, a

mathematical function able to predict, with reasonable accuracy, signal attenuation within

a service area. These model parameters are used by two of our services to estimate RSSI

levels given the locations of transmitters and receivers. Our localization system uses it to

estimate the physical location of each client based on signal strength measurements reported

by the access points, while our range-based authentication protocol uses it to control the size

of each cell and to find the minimum power levels required for that purpose. (Throughout

this chapter we also use the term model instance to denote a specific set of values for model

parameters.)

The main challenge associated with the calibration process is to deal with environment-

specific properties without high configuration overhead. Signal attenuation within a service

area depends strongly on factors such as construction materials, building layouts, as well

as the number and location of people. This creates a clear trade-off involving accuracy

and configuration costs. Services that require accurate prediction often rely on manual site

surveys, fine-grained measurements performed by network administrators during system

27

Page 48: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

28 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

setup. While the models resulting from these measurements are usually quite accurate –

they can account even for phenomena that are not well understood – they impose high

management costs due to the human assistance required. Furthermore, these are likely to

be recurring costs, as access points are usually incrementally deployed and often relocated,

requiring new models to be created through additional site surveys.

Our approach is to leverage the increasing number of access points and have our system

establish model parameters autonomously, allowing calibration to be performed without

operator assistance and therefore with low management costs. Periodically, access points

send each other sample frames and report the corresponding RSSI measurements to the WA,

which finds the model parameters that best approximate attenuation within the service area.

The low prices for WLAN hardware allows service areas to be over-provisioned with APs

without a significant increase in total cost of ownership. During calibration, such higher

numbers of APs provide more vantage points and therefore produce more accurate model

instances. By removing the need for costly site surveys, our approach allows networks to be

continuously “recalibrated” without increasing management costs. This allows the system

to react promptly to the installation of additional access points and dynamic changes in

the environment that may affect signal attenuation, such as changes in layout or a sudden

increase in the number of people in a building.

In this chapter we show that proper model parameters can be found autonomously by

our system, without operator participation. Using measurements in our testbed network,

we show that model parameters found during calibration are comparable to values resulting

from a finer-grained, manual sampling performed within the same service area. Results

presented in the next chapters show that such autonomous configuration has little impact on

the accuracy our services. Consequently, by using the parameters found during calibration,

our services can be deployed with acceptable management overhead, which is consistent

with our objective to improve security in wireless LANs without a significant increase in

management costs.

The rest of this chapter is organized as follows. In Section 3.2 we describe the log-

distance model, used in our current implementation. In Section 3.3 we describe the main

challenges of modeling signal attenuation and how they are addressed by our system. Sec-

tion 3.4 describes how our system finds the model parameters that best match a service area,

while in Section 3.5 we address calibration in heterogeneous environments. In Section 3.6

we present a detailed description of our testbed, the measurements performed within it,

Page 49: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.2. THE LOG-DISTANCE MODEL 29

and calibration results. Finally, in Section 3.7 we discuss the use of other path loss models

and other alternatives regarding the calibration process.

3.2 The Log-Distance Model

Our current implementation employs the log-distance path loss model [91], which states that

received signal strength (or received power, in dBm) at a distance d (in meters) from the

transmitter is given by:

Pr(d) = Pr(d) + Xσ (3.1)

= Pr0 − 10α log(d) + Xσ

where Pr0 is the signal strength 1 meter from the transmitter, a function of the transmission

power used, the gain of the transmitter antenna (if any), as well as the expected loss in

the first meter. The parameter α is known as the path loss exponent, the value Pr(d)

denotes the expected power d meters from the transmitter, and Xσ represents a Gaussian

random variable with zero mean and standard deviation of σ dB [91]. The well-known free-

space equation – which states that signal strength decays as a function of the square of the

distance (in Watts) – is equivalent to Equation 3.1 with α = 2.

This model accounts for both large-scale path loss and shadowing [91]. The large-scale

loss corresponds to the attenuation due to the distance between transmitter and receiver,

being represented in the equation by the term containing the path loss exponent. Shad-

owing, represented by the random variable Xσ, accounts for variations in signal strength

for locations that are equidistant to the transmitter. Multiple experiments in the litera-

ture have demonstrated that shadowing tends to be log-normally distributed, i.e. can be

modeled as Gaussian variables in a logarithmic scale (dB or dBm) [91]. Equation 3.1 does

not account for small-scale fading; we show that a filtering stage can be used during both

calibration and localization to reduce the impact of signal strength oscillations caused by

this phenomenon.

We selected this model for two main reasons. The first is its simplicity: all it needs is

the distance between transmitter and receiver, not requiring details about the environment

that would be harder to configure, such as building blueprints and information about the

Page 50: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

30 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

disposition of furniture and other obstacles that affect signal propagation. This is consistent

with our autonomy objective: while this model is not be as precise as others, the parameters

for a specific SA (α and σ) can be established by the system without operator participation.

The second is that this model is well accepted, having being used to approximate path

loss inside buildings across a wide frequency range, with plenty of measurements available

in the literature. It was first used by Alexander [22], while Seidel et al. report the results

of modeling two office buildings at 914 MHz [105]. Medbo et al. [82] performed a similar

study at 5.2 GHz with measurements performed within school and office buildings, while

Cheung et al. [35] use Equation 3.1 to model attenuation inside a townhouse at both 802.11

frequencies. As shown in Section 3.6, we use this equation to model attenuation in a

standard office environment. Other installations that have also been shown to follow this

model can be found in [23, 62, 82, 84, 91].

3.3 Challenges

The rate at which signal strength attenuates with distance depends on the characteristics of

each environment. It is strongly affected by construction materials, the disposition of walls,

furniture, and other obstacles, as well as the number of people and their moving patterns.

All these affect how electromagnetic waves get reflected, diffracted, and scattered within a

service area and the resulting signal strength attenuation. In this section we present three

issues addressed by our system as a result of this.

. Model parameters vary substantially from one installation to another.

Measurements in the literature have reported empirical values for α in the range between

1.8 (lightly obstructed environments with corridors) and 5 (multi-floored buildings), while

values for σ usually fall between 4 and 12 dB [62, 91]. Values for the path loss exponent

within office buildings tend to fall within 3 and 5. For example, Seidel et al. found the

best fit for the log-distance model with α = 3.27 when modeling attenuation within a soft-

partitioned building with cubicles [105]. Measurements in our testbed network yielded a

model instance with α = 4.05 (Section 3.6).

Consequently, fixed parameter values cannot be used for all installations: the values for

(α, σ) that define an instance of the log-distance model have to be found empirically for

each environment. Addressing this issue is the main objective of our calibration mechanism.

Page 51: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.3. CHALLENGES 31

. Model parameters can vary over time.

Signal attenuation can also change over time due to dynamic factors such as the number

of people within a service area. As our body attenuates wireless signals, an office building

full of people will likely generate different channel responses compared to measurements

performed during weekends or after hours. For instance, researchers have shown that the

number and movement of people affect the magnitude of temporal RSSI variations caused by

multipath. Using measurements at 1.1 GHz and varying the distance between transmitter

and receiver from 5 to 30 meters, Hashemi et al. demonstrated that the average standard

deviation of RSSI variations relative to the median signal strength level increases as the

number of people increase, reaching values of respectively 8.7, 16.4, 18.5, and 21.6 dB when

1, 2, 3, and 4 individuals were moving close to the receiver [63]. The same behavior was

detected by Moraitis et al. for measurements performed at 60 GHz [85].

We address this problem by making calibration a “continuous” process, which can be

implemented with minimal costs given that it requires no operator assistance. Instead

of establishing model parameters once before service is provided, the system periodically

calculates new values, being able to account for dynamic changes in the environment without

service disruption.

While our system can certainly adapt to changes, it is unclear how the number of people

within an SA affect model parameters over time. (The results presented above refer to effects

of people on small-scale fading, not large-scale path loss or shadowing, which are directly

modeled by Equation 3.1.) We show in Section 3.4 that the effects of temporal oscillations

due to small-scale fading can be reduced by proper filtering. They will only affect model

parameters if the base RSSI levels are also affected, i.e., if the values outputted by the

filtering stage change considerably over time. Only measurements performed within a SA

undergoing these situations would allow us to quantify the gain of frequent recalibration.

. Multiple model instances can be necessary in heterogeneous SAs.

Within a heterogeneous service area (e.g. a multi-story building), the use of a single model

instance may produce high standard deviation values and poor prediction accuracy, a conse-

quence of the simplicity of Equation 3.1. In homogeneous environments, with symmetrical

layouts and similarly-sized rooms, a single instance can be used with reasonable accuracy.

We show later in this chapter that this is the case for our network testbed. In heterogeneous

Page 52: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

32 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

environments, significant improvements can be achieved using multiple model instances that

can account for distinct characteristics of each building section. For example, Seidel et al.

present the results of modeling signal attenuation within two multi-story office buildings,

one with 4 and the other with 5 floors [105]. Using a single instance to cover both build-

ings – with measurements both within and between floors – the authors found a standard

deviation of 16.3 dB. With two models, one for each building, linear regression produced

models with 12.8 and 13.3 dB of standard deviation. Finally, by modeling three wings within

two floors separately, the authors significantly improved signal strength prediction, with σ

values found between 4.1 and 8.3 dB.

Our system follows this approach and uses multiple model instances to account for

heterogeneity. By default, different model instances are used for different floors in a multi-

story building. Additionally, multiple instances can be used for different sections of the

same floor, as we discuss in Section 3.5.

3.4 The Calibration Process

The calibration process comprises three steps, which are described in the following sections.

3.4.1 Sample Generation

During the first step, the WA collects signal strength measurements relative to each pair of

access points. Each AP periodically scans other channels, measures received signal strength

for transmissions performed by other access points operating in that frequency, and reports

the RSSI levels detected back to the WA. The WA coordinates this process, which continues

until samples have been collected for each pair of APs and in each direction. This procedure

can be executed while the network is operating without significantly affecting active clients.

3.4.2 Filtering

The objective of the filtering step is to reduce the impact of temporal signal strength

oscillations on the model parameters produced. The procedure just described generates a

set of signal strength samples for each pair of access points and in each direction. During

filtering, a more reliable RSSI value is extracted from this distribution. Based on the

samples transmitted from APi to APj , a filtered signal strength level is calculated, which

we denote by Prij .

Page 53: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.4. THE CALIBRATION PROCESS 33

10 0

-10-20-30-40

0 50 100 150 200

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200

Varia

tion

(dB)

Sample

Figure 3.1: Temporal RSSI oscillations relative to the 75th percentile detected during cali-bration for three pairs of access points (measurements described in Section 3.6).

Page 54: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

34 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

These temporal RSSI variations, mostly caused by multipath, affect even stationary

clients. They are worsened by the movement of obstacles or people near receivers and

transmitters, with oscillations as high as 30 dB. Filtering helps find the base RSSI level

over which these temporal oscillations are superimposed, lowering standard deviation val-

ues associated with instances of Equation 3.1 and consequently improving signal strength

prediction and localization accuracy.

Our current implementation of the filtering stage returns a high percentile of the signal

strength distribution for each pair of access points. The numbers presented in this disserta-

tion were generated using the 75th percentile. For example, Figure 3.1 shows the calibration

measurements relative to three pairs of access points. The base RSSI level in each graph

(0 dBm, shown as dotted line) is the 75th percentile of the distribution for that AP pair.

While multipath can cause both constructive and destructive variations in signal strength,

our measurements suggest that strong oscillations (> 15 dB) are mostly destructive. In this

scenario, higher percentiles of the distribution provided more reliable estimates for Prij

than the median or average RSSI levels.

Reducing the impact of RSSI oscillations is equally important when establishing the

physical location of a transmitter, so a similar filtering mechanism is implemented by our

localization system. In Chapter 4 we present additional measurements performed in our

network testbed that further demonstrate the effectiveness of filtering.

3.4.3 Model Instance Computation

Given that the WA knows not only the location of all access points but also the transmis-

sion power used by each of them, it uses the filtered RSSI levels to create a tuple of the

form (dij , P rij) for transmissions from APi to APj , where dij denotes the physical distance

between the two APs. Tuples like these are generated for all pairs of access points within

range of each other.

Linear regression is then used to find the model parameters (α, σ) that best match the

RSSI samples collected within a service area, a standard procedure [105, 91]. As shown

in Equation 3.1, the log-distance model is a linear function involving signal strength in a

logarithmic scale (such as dBm) and the logarithm of the distance between transmitters and

receivers. The slope of the best linear fit and the sample standard deviation s are used as

estimators for α and σ, respectively.

Page 55: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.5. HANDLING HETEROGENEOUS ENVIRONMENTS 35

3.5 Handling Heterogeneous Environments

The number of model instances to use within a service area will vary according to how

homogeneous the environment is with respect to signal attenuation. For example, multiple

instances may be necessary to provide reasonable accuracy in an installation where layouts

or construction materials vary substantially from one floor to another.

This question exposes a trade-off between specificity and bias. One one hand, the system

could compute a different model instance for each access point based on the measurements

it reports relative to its neighbors. The value for α, for example, would be specific for

that access point and take into account attenuation caused by its immediate environment,

but would also have a higher bias given the smaller number of samples. On the other

hand, aggregating all RSSI measurements into a single model instance minimizes the impact

of measurement errors, but may reduce the quality of signal strength prediction in some

sections of a heterogeneous building.

An approach to this problem that seems promising is to calculate model instances in

an iterative manner. First, a different value is calculated for each access point using all the

measurements in which it acts as receiver or transmitter. The result is a set of instances

(αi, σi), ∀i ∈ AP . Then, the values produced by APs in the same floor are compared. If

the difference between the highest and the lowest values of α is smaller than a pre-defined

maximum value αmaxDiff , the environment is considered homogeneous enough to use a

single model instance. (Our measurements suggest that using alphamaxDiff = 1.0 is a good

starting point.) If that is not the case, APs can be partitioned into groups according to

their physical locations and α values such that the requirement above is satisfied. Further

research is needed to evaluate different partitioning schemes and their impact on localization

accuracy. As we show in Section 3.6, our testbed is not heterogeneous enough (and probably

not large enough) to justify the use of multiple model instances.

The main advantage of this approach is that it allows the system to minimize the

number of model instances used (and therefore reduce measurement bias) while also allowing

heterogeneous sections to be detected. As in our testbed, a single model can be used with

confidence if per-AP values do not differ considerably.

Page 56: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

36 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

12 3

456 7

8

9 10

11 12

Figure 3.2: Our 45×24m service area in the Gates Building 4A Wing with the placementof access points.

3.6 Evaluation

In this section we present the results for the calibration process in our network testbed.

In Section 3.6.1 we describe in detail our deployment scenario and the hardware used,

while Section 3.6.2 describes the two data sets used to evaluate the calibration process. In

Section 3.6.3 we present the model parameters calculated autonomously by the APs and

compare them to values produced by a site-survey we conducted within the same SA. Some

of the measurements presented in this section will also be used in chapters 4 and 5 to

evaluate our localization system and authentication mechanism.

3.6.1 Network Testbed

We have deployed and evaluated our system in a standard office environment. As service

area, we used the A-Wing in the 4th floor of the Computer Science Building at Stanford

University. As shown in Figure 3.2, The SA has approximately 45×24 meters (147×78 ft),

with a mix of offices (most of them measuring 3×6 m), large labs (at least 8×4.5 m), and

long corridors.

Page 57: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.6. EVALUATION 37

The network infrastructure consists of 12 IEEE 802.11b/g access points connected to a

dedicated server that executes the role of the WA. The access points, their locations also

shown in Figure 3.2, are mounted at the ceiling (height of 2.5 m), with an approximate

density of one AP per 90 m2 or 955 ft2. They are off-the-shelf Linksys WRT54G units

(hardware versions 3.0 and 4.0) running OpenWrt WhiteRussian rc3 [17], a Linux distribu-

tion. We developed an application that runs at the APs, monitoring transmissions over all

wireless channels used in the building and reporting signal strength measurements back to

the server.

3.6.2 Data Sets

The first data set consists of calibration sample frames transmitted by the access points (we

call it the calibration data set). We followed the procedure described in Section 3.4 and

used our access points to establish the model that best approximates signal attenuation

in our service area. At each calibration round, one AP was used as a transmitter while

the others acted as sensors and reported an RSSI estimate for each received frame. As

calibration traffic we used ping packets sent at a rate of 10 packets per second. As not

all access points are in range of each other, a total of 128 tuples (distance, RSSI) were

generated, with distances between 6 and 40 meters. Our APs transmit at 18 dBm using

standard dipole antennas (2.2 dBi of gain).

A second data set was created through a site survey: we manually sampled a total

of 135 locations within our service area, as shown in Figure 3.3 (we call this the survey

data set). These measurements were not used to configure any of our services, being used

only for evaluation. At each location a laptop provided with a Cisco 340 PCMCIA card

(transmission power of 15 dBm) transmitted ping packets at rates between 10 and 20 packets

per second for approximately one minute, as our access points had to hop through the three

non-overlapping 802.11 channels at 2.4 GHz. The client annotated each packet transmitted

with an ID for its current location, while each access point in range tagged it with the RSSI

level detected during reception and forwarded it to the localization server, which logged

all measurement traffic. At all locations, the laptop used for measurements had the same

orientation: it was held by the user in front of his body and at waist level, with the user

facing North as indicated in Figure 3.3.

There are two limitations with our data sets. First, all of our measurements were col-

lected within a single floor. As a result, we are not able to evaluate signal attenuation

Page 58: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

38 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

N

Figure 3.3: All the 135 locations sampled to create the survey data set.

between floors and the corresponding impact on our services. For example, we are un-

able to compare different approaches for client localization in multi-story buildings and

the effectiveness of attacks mounted from floors adjacent to a service area, as we discuss

in Chapter 4. Second, our measurements do not allow us to evaluate changes in signal

attenuation over time. We are therefore unable to measure how the accuracy of our ser-

vices changes according to dynamic changes in the environment, such as an increase in the

number of people within a SA or a change in their moving patterns.

3.6.3 Calibration Results

We first look at the model parameters produced autonomously by the access points. The

results agree with previously published values in that attenuation is much stronger than

predicted by the free-space model (α = 2.0). Using all 128 samples as input to linear

regression, the best fit for Equation 3.1 was found to be α = 3.65, σ = 6.59 dB, as shown in

Figure 3.4. (We assume free-space attenuation for the first meter, using Pr0 = −19.8 dBm

during regression.)

One interesting result evident in Figure 3.4 is that received signal strength cannot be

assumed to be symmetric. I.e., for two identical stationary devices (two APs) using the

same output power, the RSSI levels produced in each direction may differ considerably.

Page 59: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.6. EVALUATION 39

-100

-90

-80

-70

-60

-50

-40

-30

-20

50 40 30 20 10 5 1

Sign

al s

treng

th (d

Bm)

Distance (m)

α=3.65, σ=6.59 dB

Figure 3.4: Measurements in the calibration data set and the best fit found for the log-distance model.

Multiple access point pairs in our measurements recorded different filtered signal strength

values for each direction, some differences as high as 16 dBm. It is unclear how exactly

these differences were generated. It is likely a combination of hardware dissimilarities and

changes of path loss over time, given that the measurements in both directions were not

executed simultaneously. For example, additional attenuation affecting only one direction

could be caused by people moving around or doors being closed.

Figure 3.5 shows that the model parameters found during calibration provide close

approximations to the values produced by our site survey. The figure shows the best fit for

the log-distance model using the filtered RSSI values from the survey data set. It uses all

the access points within range for each of the 135 locations sampled (a total of 1471 points)

and assumes Pr0 = −25 dBm, as our PCMCIA card transmits at 15 dBm. Compared to the

calibration data set, the rate of attenuation (α) is slightly higher (4.05 instead of 3.65),

while the standard deviation is actually lower (5.64 dB instead of 6.59 dB).

We find these results encouraging for at least two reasons. First, similar values were

found despite the hardware disparity between APs (used as transmitters during calibration)

and the PCMCIA card used to create the survey data set. We simply accounted for the

differences in transmission power and antenna gain. Second, transmitters and receivers are

coplanar in the calibration set (all APs are mounted at the ceiling), which was not the case

for the survey data set, where transmitters were carried approximately at waist level. We

accounted for the difference by using distances in tridimensional space in both cases.

Page 60: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

40 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

-100

-90

-80

-70

-60

-50

-40

-30

-20

50 40 30 20 10 5 4 3 2 1

Sign

al s

treng

th (d

Bm)

Distance (m)

α=4.05, σ=5.64 dB

Figure 3.5: Measurements in the survey data set and the best fit found for the log-distancemodel.

Our measurements also agree with previously published results in that deviations from

the mean can be closely approximated by a log-normal distribution (normal distribution

in dBm) [91]. In our survey data set, respectively 35.3%, 65.7%, 95.5%, and 100% of RSSI

measurements are within 0.5, 1, 2, and 3 standard deviations from the value predicted by

the path loss model. The respective percentages for a normal distribution are 38.3%, 68%,

95%, and 99.7%.

The effectiveness of filtering becomes clear when we use the average and median RSSI

levels (instead of the 75th percentiles) in order to calculate model parameters. For our

survey dataset, for example, using respectively the average and median signal strength

levels at each location yields path loss models with standard deviations of 6.73 and 5.99

dB, higher than the 5.64 value found with the 75th percentile (Figure 3.5). The lower

standard deviation produced with filtering enabled yields better signal strength prediction

and improves the accuracy of our services.

In the next chapters we show that the small difference between model parameters pro-

duced by both data sets has little impact on the accuracy of our services.

3.6.4 Measuring Heterogeneity

Our service area is not heterogeneous enough to justify the use of multiple path loss model

instances. Figure 3.6 shows the value for α calculated for each AP, following the approach

Page 61: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.7. DISCUSSION 41

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

s

s

s

s

s

s

3.42

3.373.62

3.58

3.81

4.03

3.923.25

3.403.51

3.97

3.75

Figure 3.6: Path loss exponent values (αi) found for each AP.

described in Section 3.5. As shown in the figure, no two access points generate path loss

exponent values with a difference larger than 0.8. As expected, α values are higher for access

points located inside offices than for those at corridors, which have some other APs almost

in line-of-sight. Figure 3.7 shows the values found when access points are grouped into two

groups of six. The difference between the two values is only 0.09. This corresponds to a

difference of only 1.3 dB in terms of signal strength prediction for a mobile device located

30 meters from an access point.

3.7 Discussion

There are many alternatives regarding the calibration process that may improve the results

achieved by our services in other installations. In this section we discuss some of the trade-

offs involved, but leave the complete evaluation of these alternatives as future work.

Page 62: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

42 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

s

s

s

s

s

s

3.75 3.66

Figure 3.7: Path loss exponent (α) values found for each group of 6 APs.

3.7.1 Alternate Path Loss Models

The choice of path loss model is a function of a trade-off between configuration costs and

accuracy. While in this dissertation we focus on the use of the log-distance model, mainly

due to its simplicity, other path loss models can also be used in conjunction with our

services. Researchers have shown that standard deviation values can be decreased by using

more detailed models that take into account construction materials, disposition of walls,

and other environmental properties relevant to signal propagation that are not accounted

for by Equation 3.1. This accuracy improvement, however, comes at the cost of increased

management costs.

Several researchers have demonstrated that signal strength prediction improves if the

attenuation caused by some obstacles, such as external walls and soft partitions, is modeled

explicitly [86, 69, 105, 91]. In this path loss model, which we call the partition model, the

expected signal strength level d meters from the transmitter is given by:

Page 63: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

3.7. DISCUSSION 43

Pr(d) = Pr0 − 10α log(d)−N∑

i=0

kiFi + Xσ (3.2)

where Fi is the attenuation factor (in dB) associated with the ith of N types of obstacles

modeled and ki is the number of such obstacles between transmitter and receiver. Motley et

al. proposed an instance of Equation 3.2 that accounted for the attenuation caused by floors

in multi-story buildings, i.e., they explicitly modeled a single class of obstacles (floors), for

which an average attenuation factor (F ) was found empirically [86]. The same authors later

extended their model to account for both floors and walls [69]. In [105], Seidel et al. present

a study of attenuation at 914 MHz and compare the performance of three models: the log-

distance model, an instance of the partition model that accounts only for floor attenuation,

and a second instance that explicitly models the attenuation caused by soft partitions and

concrete walls for measurements within a single floor. Using the third model the authors

were able to further reduce standard deviation to 4.1 dB.

While it has the advantage of reducing standard deviation and improving prediction

accuracy, the main disadvantage of the partition model is that it increases the costs of

system calibration. First, it requires detailed blueprints for the service area, used to establish

the type and number of obstacles between transmitters and receivers. Second, attenuation

factors have to be found empirically for each installation, which requires operator assistance

and increases overall costs.

Other researchers have experimented with a path loss model that assumes free-space

propagation with an exponential loss factor that increases with distance [91]. In this case,

received power is given by:

Pr(d) = Pr0 − 20 log(d)− γd + Xσ (3.3)

where γ is found empirically and expressed in dBm/meter. This model was first proposed by

Devasirvatham et al., who used it to model path loss within two office buildings at 850 MHz

and 4 GHz [41]. Medbo et al. compared the results of using both equations 3.1 and 3.3 to

model attenuation at 5.2 GHz within an office building and a school building [82]. Their

results are inconclusive regarding the power of these two models, as the best fit for the

Page 64: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

44 CHAPTER 3. AUTOMATIC SYSTEM CALIBRATION

school was found using the log-distance model while the best fit for the office building was

found to be an instance of Equation 3.3.

3.8 Summary and Conclusion

This chapter described the mechanism used by our system to establish a path loss model

instance that approximates signal strength attenuation with distance inside a service area.

As discussed, the rate at which signal gets attenuated within an environment strongly de-

pends on construction materials, building layout, and the disposition of furniture and other

obstacles. For this reason, the model parameters that best fit a specific environment have

to be found empirically. First, we showed how our system can determine these parameters

autonomously, using measurements performed by the access points already deployed and

without operator assistance. Then we showed that the parameters resulting from such auto-

matic calibration are comparable to the ones produced by a finer-grained manual sampling

within the same building. In the next chapters we show that such automatic setup has little

impact on accuracy and quality of service within the SA. As the system does not require

operator assistance for calibration, reconfiguration costs are kept to a minimum and our

location-based services can improve security in a cost-effective manner.

Page 65: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 4

Robust Localization

In this chapter we present the design and evaluation of a localization system that uses signal

strength measurements collected by access points to locate wireless devices within the service

area. We show that it is robust against attacks and that it allows the implementation of

location-based access control policies. We also show that it scales to large numbers of access

points with minimal configuration overhead.

4.1 Motivation

A properly-designed localization system can be used to improve both accountability and

access control in a wireless LAN. To improve accountability, a localization system needs to

be accurate. If the network can track all active clients within a service area to within 2 or 3

meters from their real locations, it has enough information to effectively react to any kind of

client misbehavior. To allow the implementation of location-based access control, however,

a RSSI-based system needs to be robust against attacks directed to it. It needs to assume

that malicious devices will try to access the network from locations beyond the boundaries

of the service area and be prepared to face clients that use dissimilar transmission power

levels and resort to amplifiers and directional antennas to obfuscate their real locations.

We address a variant of the standard localization problem: given a set of signal strength

measurements (a signal pattern), an algorithm should check if it successfully matches a

location inside a service area of interest. The SA defines the geographical limits for local-

ization and consequently the solution search space. As the algorithm is expected to reject

patterns created by transmitters located outside the SA, localization needs to be performed

45

Page 66: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

46 CHAPTER 4. ROBUST LOCALIZATION

on the network side. The output of the algorithm is a location inside the SA (two- or

three-dimensional position) tagged with a label, one of either accepted or rejected.

We present the design and evaluation of an RSSI-based localization system that can be

used for security applications while also allowing networks to scale to large numbers of access

points. We have tested our system in our network testbed, having performed measurements

both inside and outside the building for evaluation. We show that it provides:

Autonomous configuration. All the information the system needs regarding signal at-

tenuation within a service area is found during system calibration. This makes the system

self-configurable: an operator inputs the dimensions of the environment and the location

of the access points but is not required to perform site surveys. This also allows our sys-

tem to take advantage of access points that are incrementally deployed without incurring

additional configuration costs.

Adequate accuracy and low false-negative rates. Clients physically located inside the

SA and provided with hardware compatible to our reference client are located accurately

and rejected with low probability. For instance, we show that in our testbed, with 12 access

points covering a 45×24m area, clients are located with a median error of 1.88 meters.

Moreover, even with an aggressive configuration, the rate of false negatives in our testbed

is inferior to 3%.

Low false-positive rates. Malicious devices with omni-directional antennas located out-

side the SA (our building) are able to mount undetected attacks only when provided with

the necessary gain and positioned within 20 meters from external walls. As the system re-

quires additional power from transmitters outside the SA, intruders using portable devices

(e.g. PCMCIA cards) can only mount successful attacks close to the building (<10 meters).

For large distances (>30-40 m), the RSSI patterns produced by external transmitters differ

significantly from what is seen within the SA, so attacks are detected with high probability

even if intruders are provided with unbounded transmission power. We also show that it

is hard for intruders to find the exact transmission power level to use, increasing chances

of attack detection and further reducing the practical attack range to around 20 meters.

Finally, we show that strong guarantees against attackers with directional antennas can be

also be achieved, although at the expense of additional APs located outside the SA.

The remainder of this chapter is organized as follows. Section 4.2 describes our attack

model. Section 4.3 provides an overview of our system, while Sections 4.4-4.7 describe it

Page 67: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.2. ATTACK MODEL 47

in more detail. We present the evaluation of our system in our testbed in Section 4.8 and

present its limitations in Section 4.9. Finally, our conclusions are presented in Section 4.10.

4.2 Attack Model

We assume that unwanted users are kept outside the service area. In enterprises, this

is achieved through standard physical security measures. In cafeterias and other public

hotspots, all clients within range can be treated as legitimate clients, allowing our system

to be used despite the weaker physical security level. In both scenarios, attackers are limited

to the area around the service area, from where they try to fool the localization system.

We assume that attackers can employ a wide range off-the-shelf wireless equipment.

The level at which an attacker is able to extend service beyond the boundaries of a SA is

a function of his hardware resources. We show that the larger the distance between him

and the service area, the higher the demands on output power. We consider a wide range

of attackers, from the ones that are limited to standard PCMCIA cards to others that are

provided with amplifiers and directional antennas.

We assume that the wireless infrastructure (including access points and server) has not

been compromised by attackers. First, we assume that legitimate access points already

deployed have not been tempered with and that they report RSSI levels based on sound

measurements. Second, we assume that no rogue access points feed measurements to the

localization server. Both of these goals can be achieved through proper network partitioning

and standard physical security measures. For example, access points can be mounted at

the ceiling or other locations with limited access. Consequently, all signal strength mea-

surements reported can be trusted by the localization server.

4.3 Overview

An overview of our localization system is presented in Figure 4.1. As shown, the state

needed by the system to estimate signal attenuation within the SA is calculated during

system calibration. The system also uses as inputs the definition of the service area and

the location of all access points.

Page 68: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

48 CHAPTER 4. ROBUST LOCALIZATION

Figure 4.1: Localization system overview.

At runtime, the location of each client is established in a three-stage process:

1. Filtering. Signal strength oscillates even for stationary devices due to multipath and

other phenomena. (In our measurements oscillations were as high as 30 dB.) Similarly

to what is performed during calibration, the filtering stage presented in Section 4.5

extracts more reliable RSSI statistics to be used during position estimation.

2. Position estimation. In the second stage, the system finds the location inside the

service area and the transmission power level that best match the pattern presented

by a transmitter (described in Section 4.6). The position returned is the one with the

smallest error value, a function of the difference between the measured RSSI levels

and the values predicted by the path loss model.

3. Verification. In order to be accepted, the solution found in stage 2 has to satisfy a

set of conditions, presented in Section 4.7. For instance, a location estimate is rejected

if its error value is too high, if not supported by a minimum number of access points,

or if RSSI values are too low. These conditions are used to improve accuracy, enhance

the system’s ability to differentiate between indoor and outdoor transmitters, and

also to impose extra resource demands on devices located outside the service area,

therefore increasing the costs of compromise attempts.

Page 69: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.4. CLIENT REQUIREMENTS 49

As a result, a position estimate is calculated periodically for each device and labeled with

either accepted or rejected. We say that a client is successfully localized if he produces

a location estimate labeled with accepted.

4.4 Client Requirements

The objective of our algorithm is to locate accurately and accept all clients that satisfy

the list of requirements shown below. I.e., a client that follows these guidelines provides

the system with enough information about its position and should not fail localization. In

the implementation of location-based access control, these constitute the requirements for

being granted network service.

1. Physically located within the service area;

2. Provisioned with omni-directional antennas;

3. Capable of transmitting above a pre-determined power level.

The first requirement is derived directly from our objective to improve security by

leveraging physical security measures implemented around the SA. A device will be served

only if an acceptable location is found within the service area.

The other two are hardware requirements specified according to our current reference

client: an 802.11 PCMCIA card. The objective of these requirements is to increase the

number of access points within a client’s range, improving localization accuracy and the

performance of the verification phase. As shown in Section 4.7, they improve the algorithm’s

ability to differentiate between RSSI patterns generated inside and outside the service area,

decreasing the rates of false positives and false negatives.

While off-the-shelf transmitters (including 802.11 PCMCIA cards) are not perfectly

omnidirectional, they still create patterns centered about their locations with power trans-

mitted in all directions. This allows our system to disregard the orientation of clients and

calculate expected signal strength based solely on their distances to access points. As we

show in Section 4.8, any directivity effects induced by PCMCIA cards can be successfully

modeled together with other noise in the measurements.

Page 70: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

50 CHAPTER 4. ROBUST LOCALIZATION

Term Meaning

(xi, yi) coordinates of ith access point.(x∗

T , y∗

T , P r∗0) real transmitter position.

(xT , yT , P r0) estimated transmitter position.PLij path loss (in dBm) between access points i and j.Prmin

0, P rmax

0minimum and maximum values used during search.

Pri filtered signal strength (in dBm) relative to ith access point.T signal strength threshold (in dBm).L confidence level.Q minimum access point quorum.α, σ path loss coefficient and model standard deviation.

Table 4.1: Notation used to describe the localization system.

4.5 Filtering

Filtering, the first processing stage, is responsible for generating reliable signal strength

statistics for each pair (client, AP) given the measurements reported in the recent past

(order of seconds). Each frame transmitted by a client and successfully received by an

access point within range is labeled with the RSSI level determined during frame reception.

For a given client, the input to filtering consists of a set of RSSI measurements relative

to each AP. Using the notation shown in Table 4.1, the output is the set of filtered signal

strength values {Pr1, P r2, ..., P rn}, with a value for each access point. (We consider a single

client for simplicity, avoiding the use of multiple indexes or superscripts.)

Our current definition of the filtering stage simply returns a high percentile of the

RSSI distribution for each pair (client, AP). All the results presented in this chapter were

collected using the 75th percentile. I.e., for the ith AP, the filtered RSSI value Pri is the

75th percentile of the distribution that arises from the samples Pr1i , P r2

i , ..., P rNi reported

for the client.

The main objective of the filtering stage is to minimize the effects of small-scale fading

on localization. Small-scale fading, which is not directly modeled by Equation 3.1, creates

RSSI oscillation over time even for stationary devices. Filtering helps lower the deviation

associated with Equation 3.1, improving RSSI prediction and localization accuracy.

Similarly to the behavior detected during calibration, when both transmitters and re-

ceivers were mounted at the ceiling, signal strength fluctuations can be as strong as 30 dB.

For example, Figure 4.2 presents examples of RSSI variation relative to 75th percentile (dot-

ted line). Each graph was created with the samples collected for a single location relative

Page 71: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.5. FILTERING 51

10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dBm

)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dBm

)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dBm

)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dBm

)

Sample

Figure 4.2: RSSI oscillation for a stationary device.

Page 72: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

52 CHAPTER 4. ROBUST LOCALIZATION

to a single access point. The top figure depicts the common case in our measurements: over

95% of the RSSI samples in the graph are within 5 dB from the reference level. The second

figure shows a similar scenario, but with three large fluctuations (>30 dB). The bottom two

figures present scenario with more severe oscillation. In the third, most RSSI samples are

more than 10 dB from the reference level, while in the last graph there are periods where

the detected RSSI drops more than 30 dB. As shown, by using the 75th percentile of the

RSSI distribution, our algorithm becomes more robust against such oscillations, from the

mild to the severe ones.

Filtering also removes from the position estimation stage the RSSI values reported by

access points that have failed to collect enough samples about the client. This is usually

generated by clients at the border of a cell, producing low signal strength values and high

packet loss rates.

4.6 Position Estimation

The system uses the values produced by the filtering stage to estimate, for each wireless

client, a position (xT , yT ) and a power level at the reference distance (Pr0). The input

consists of a set of tuples of the form (xi, yi, P ri), i.e. each access point’s location and

filtered RSSI for the client. Throughout this chapter we will refer to the tuple (xT , yT , P r0)

simply as the client’s location, even though we also estimate its power level at 1 meter

(Pr0). Our system actually returns tridimensional positions, but as we evaluate it in a

single floor, we omit the height for simplicity (z = 1.0 m always, approximately waist level).

Localization in multi-floored buildings is discussed in Section 4.8.10.

For a given RSSI input, each position inside the service area is associated with an

error value, a measure of how the reported RSSI values deviate from the path loss model

found during calibration. The estimated location of a wireless transmitter returned by the

system is the value (xT , yT , P r0) found to provide the smallest error value. The search

space S is defined as follows: the coordinates (xT , yT ) are constrained by the geographical

boundaries of the service area, while the transmission power returned (Pr0) lies within a

pre-determined interval [Prmin0 , P rmax

0 ], set according to the reference client. Therefore,

the algorithm returns the solution s = (xT , yT , P r0) ∈ S s.t. error(s) ≤ error(s′), ∀s′ ∈

S, (xT , yT ) ∈ SA, Pr0 ∈ [Prmin0 , P rmax

0 ].

Page 73: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.6. POSITION ESTIMATION 53

The solution s can be found by standard minimization methods. Our current implemen-

tation performs an iterative conjugate gradient minimization based on the Polak-Ribiere

algorithm, commonly available in scientific libraries. Another possibility would be to divide

each dimension in the search space into discrete intervals and perform an exhaustive search.

For example, the SA can be partitioned into 0.5m×0.5m areas and the Pr0 interval divided

accordingly, the solution s being the combination with the smallest error value. Our ap-

proach – using the iterative gradient method – provides better localization accuracy and

lower computational overhead.

Error Function

We use an error function that compares predicted RSSI levels with the ones reported by

the APs. The error value of a tentative solution s′ = (x′

T , y′T , P r′0) is given by:

error(s′) =∑

i

(Pri − Pr(d′i))2 (4.1)

=∑

i

(Pri − [Pr′0 − 10α log(d′i)])2

where d′i is the Euclidean distance between (x′

T , y′T ) and the ith access point and Pr(d′i) is

the expected signal strength given by the path loss model. The error is therefore the sum of

the squares of the differences between estimated and filtered signal strength levels relative

to all access points.

Algorithm 1 describes how to calculate the error associated with a candidate solution s′

and its degrees of freedom (which is described in detail in Section 4.7.2). As shown, the only

APs that do no contribute error terms are those that were predicted to be out of range and

that indeed did not report RSSI measurements. Each access point has a sensitivity level

(denoted by sens), a minimum RSSI level for the radio to experience low frame loss for a

given modulation. An AP is considered within range of s′ if the predicted RSSI is higher

than its sensitivity. As the system assumes clients use omni-directional antennas, if an

access point within range fails to report RSSI measurements, a reading (xi, yi, P ri = sens)

is automatically generated. For example, if the predicted signal strength at one AP (with

sensitivity of -90 dBm) relative to the current solution s′ is -70 dBm and no value is reported,

a (90− 70)2 = 400 term is added to the total error value.

Page 74: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

54 CHAPTER 4. ROBUST LOCALIZATION

Algorithm 1 Algorithm that calculates the error (error(s′)) and number of degrees offreedom (ν(s′)) for a candidate solution s′.

1: error(s′)← 02: ν(s′)← 03: for all i ∈ AP do4: if (Pr(d′i) ≥ sens || defined(Pri)) then5: if (defined(Pri)) then6: diff i ← abs(Pri − Pr(d′i))7: else8: diff i ← abs(sens− Pr(d′i))9: end if

10: error(s′)← error(s′) + (diffi)2

11: if (diffi < kσ) then12: ν(s′)← ν(s′) + 113: end if14: end if15: end for

It is important to differentiate between two errors associated with our localization sys-

tem. The first is what we refer to as localization error, the distance in meters or feet between

a device’s real location and the position estimated by our system. The second is the error

value associated with a solution as given by Equation 4.1, a function of the difference in

dBm between predicted and measured signal strength levels. It is possible for a solution

to produce a small localization error and still be rejected by the system during the verifi-

cation phase due to a high error value. (We have actually seen cases such as this in our

measurements.) We use the terms localization error and error value to avoid confusion.

4.7 Verification

During verification, the system decides whether or not to accept the location estimate found

during the second stage. The mechanism just described always finds the “best” solution

s ∈ S, but provides no confidence regarding the value found. The input to verification

consists of filtered RSSI levels and the solution s found in the position estimation phase.

The assumption behind our verification algorithm is that the pattern generated by a

client inside the service area can be distinguished from the pattern created by an external

device. While it may be error-prone trying to distinguish a client inside a building from

Page 75: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.7. VERIFICATION 55

another right outside the external wall, the difference between the two patterns increases

as the distance between them increases. The patterns produced by a client within the SA

and an intruder 30 meters from the external wall are considerably different.

This happens because signal attenuates faster in close proximity to the transmitter. Take

for instance the path loss model given by Equation 3.1. The expected signal attenuation

(in decibels) 10 meters from the transmitter is comparable to the attenuation caused by

the next 90 meters. Therefore, clients within close range to access points (<10m) produce

patterns with a clear “peak”, followed by sharp signal strength degradation (>30 dB).

Patterns generated by devices located outside the SA are flatter because of the increased

distance to the access points. The conditions imposed by our verification phase together

with the increased number of APs allow these two patterns to be distinguished successfully

with high probability.

In our current specification, a position estimate is accepted if it satisfies the three con-

ditions discussed next.

4.7.1 Signal Threshold (T )

Condition 1: Every transmitter must be heard by at least one access

point above a signal level threshold T . I.e., the algorithm proceeds only

if ∃i|Pri ≥ T .

The first objective of this condition is to impose additional resource demands (ampli-

fication) on attackers. A client that is inside the service area is in close range to multiple

access points, thus in a better position to generate high signal strength values. A malicious

transmitter outside the service area needs to boost its transmission power in order to cope

with the higher attenuation caused by the extra separation and external walls, trees, and

other obstacles in its path. Therefore, the objective is to set T as high as possible while

allowing the targeted clients inside the SA to be accepted.

Second, the higher the threshold value, the easier it is for the system to differentiate

between transmitters inside and outside the service area. Figure 4.3 shows a 50m×50m

service area and two signal patterns (more distinguishable in Figure 4.3(b)). The first

pattern – the surface with a clear peak – represents the expected signal strength for a

client located in the middle of the SA, at (25, 25), assuming a log-distance model with

α = 3.0. The other pattern shows the expected RSSI for an attacker located outside the

Page 76: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

56 CHAPTER 4. ROBUST LOCALIZATION

SA at (80, 25), 30 meters from the external wall. The larger distance to the APs makes

the attacker’s pattern resemble a plateau, without the sharp drop detected for the patterns

created inside the SA.

Setting a low threshold increases the likelihood of false positives for two main reasons.

First, it decreases amplification demands on intruders. In Figure 4.3(a), the threshold is set

too low, and the attacker is able to satisfy the threshold condition by using a transmission

power 10 dB higher than the one used by the client. Second, the figure shows that the pattern

created by an external transmitter is not easily distinguishable from the ones created inside

the building, as most APs report similar RSSI values for both devices. Only the APs in close

range to the legitimate client report RSSI measurements that are considerably different for

the two devices. However, in this situation the error value associated with the solution

might not be too high as to prevent acceptance if many access points are used. In this case,

the attacker would be able to fool the system with a manageable amount of amplification.

When the threshold is set higher, the amplification demands on attackers are higher

and the two patterns can be more easily distinguished. In Figure 4.3(b), T is set 20 dBm

higher than in Figure 4.3(a), so the external device needs a total of 30 dB of amplification, a

considerable amount. Moreover, most access points now report RSSI values for the attacker

that are much higher than expected from a device within the SA, resulting in a position

estimate with higher error value and therefore with a higher chance of rejection. The higher

the number of access points, the higher the system can set T , thus generating location

estimates with higher degrees of confidence.

Obviously, the real signal patterns faced by the system are much noisier than shown in

Figure 4.3, which plots only the expected RSSI levels (Pr(d)). As shown in Section 4.7.3,

patterns are rejected through a statistical test, which takes into consideration noise in RSSI

samples and the error associated with the path loss model.

The threshold T is set to the highest possible value according to the path loss model

found during calibration and the distribution of access points. For instance, if no location

inside the SA is more than dmax meters from an access point, the threshold can be set to:

T = floor(Pr0 − 10α log(dmax))− η (4.2)

i.e., the expected signal strength at distance dmax decreased by an additional η dB for safety.

Page 77: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.7. VERIFICATION 57

0 5 10 15 20 25 30 35 40 45 50X coordinate (m) 0

5 10

15 20

25 30

35 40

45 50

Y coordinate (m)

-70-65-60-55-50-45-40-35-30-25-20

RSSI (dBm)

(a) attacker gain: 10 dB.

0 5 10 15 20 25 30 35 40 45 50X coordinate (m) 0

5 10

15 20

25 30

35 40

45 50

Y coordinate (m)

-70-65-60-55-50-45-40-35-30-25-20

RSSI (dBm)

(b) attacker gain: 30 dB.

Figure 4.3: Pattern difference between client at (25,25) and attacker at (80,25) using α =3.0. The client’s pattern presents a clear peak, as it is located inside the service area. Theattacker’s pattern resembles a plateau, a result of the increased distance to the SA.

Page 78: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

58 CHAPTER 4. ROBUST LOCALIZATION

If all clients are assumed to be able to transmit at the maximum value used during position

estimation (Prmax0 ), this value can be used in the computation above.

In environments where the planned range for access points differ considerably, a different

threshold value can be used for each AP. In this case, the threshold Ti for a given AP is

found by replacing dmax in Equation 4.2 by Ri, the targeted range for the same AP.

Extensive measurements in our environment, presented in Section 4.8, demonstrate that

path loss in close range to access points tends to be lower than predicted by the model,

allowing the use of small values for η (0 ≤ η ≤ 5 dB). This trend can also be seen in other

measurements presented in the literature, including the office buildings modeled by Seidel

et al. [105]. This happens because there are fewer obstacles (e.g. walls, doors) in close

range, while the path loss model parameters are calculated using measurements across the

whole floor, with transmitter-receiver separations of up to 40 meters.

4.7.2 Minimum Quorum (Q)

Each location estimate is associated with a number of degrees of freedom, denoted by ν.

The minimum quorum condition simply specifies a lower limit for ν:

Condition 2: A location estimate s must be supported by at least Q access

points: s is rejected if ν(s) < Q.

The minimum quorum condition further improves our system’s ability to reject signal

patterns generated by devices outside the service area. As seen in Figure 4.3, the threshold

condition forces an attacker outside the SA to boost his output power, which creates RSSI

values inside the building that are higher than expected. The more APs participate in

localization, the higher the error values for patterns created by an intruder, increasing the

confidence with which they are rejected by the system. It is much easier for clients inside

the service area to satisfy the quorum requirement because they are closer to the APs and

are expected to use omni-directional antennas.

As shown in Algorithm 1, only access points that report signal strength values within an

acceptable range from the level predicted by the model cause the number of degrees of free-

dom to be incremented. As shown, ν is incremented given an access point APi if diffi < kσ,

where σ is the standard deviation found during calibration and k is a configuration parame-

ter (our current implementation uses k = 1.8). As suggested by Equation 3.1 and confirmed

Page 79: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.7. VERIFICATION 59

by our experiments, the difference between predicted and measured signal strength can be

approximated by zero-mean Gaussian variables. Therefore, using k = 1.8 means that, for

clients inside the SA, over 92% of such differences lie within accepted bounds.

This rule for calculating ν helps penalize patterns that strongly disagree with the model,

which is common for transmitters located outside the SA or using directional antennas. As

we describe in the next section, solutions are rejected if their error values are higher than

a threshold that is itself a function of ν. The smaller the value of ν associated with a

candidate solution, the lower the allowed maximum error and the higher the chances of

rejection. Note that the solution error is always incremented, even when the value of ν is

not updated.

Specific values for Q are also found autonomously by the system using the path loss

model, the locations and sensitivity levels of the access points, and the minimum power

level expected from clients (as of Section 4.4). The minimum number of APs within range

across all locations within the service area can be used as an upper bound for Q. (One

may decrease this number slightly in order to decrease the probability of false negatives.)

In heterogeneous environments, a different value of Q can be used for each location within

the service area.

4.7.3 Confidence Test

The system rejects solutions with high error values by modeling the distribution of the

error function (Equation 4.1) and performing a statistical test. Let E denote the cumula-

tive distribution function of our error function, and let Ep be the critical value such that

Prob(e > Ep) = 1− p, for a random error sample e. A solution s can be rejected with con-

fidence level L if error(s) > EL. For example, we can reject a solution with 95% confidence

if error(s) > E.95.

The error function defined in Section 4.6 can be approximated using the chi-square

distribution. It is known that a variable following this distribution, denoted by χ2, arises as

the sum of the squares of independent standard normal variables [66]. If X1, X2, ..., Xν are

independent standard Gaussian variables,∑ν

i=1 X2i follows a chi-square distribution with ν

degrees of freedom (d.f.), denoted by χ2ν . As deviations from the model can be modeled as

normal variables and our error function is the sum of the squares of such deviations, critical

values from the chi-square distribution can be used as upper bounds in the confidence test.

Page 80: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

60 CHAPTER 4. ROBUST LOCALIZATION

Using χ2ν(L) to denote the critical value of the chi-square distribution for a confidence

level L and ν degrees of freedom, the confidence test can be written as follows:

Condition 3 (confidence test): A location estimate cannot have too high

an error value. A solution s with ν degrees of freedom is rejected iferror(s)

σ2 > χ2ν(L).

Note that the error of the estimated solution is divided by the variance (σ2), as the

chi-square distribution assumes standard Gaussian variables (σ = 1).

4.7.4 Configuration Tuple

Our algorithm is defined by the tuple (T, Q, L), the exact values being found autonomously

by the system but according to how aggressive a network administrator wants to be. There

is a clear trade-off between false positives and false negatives, i.e. between security and

management costs. A more aggressive configuration (e.g. higher values of T and Q) incurs

higher costs for an attacker outside the service area, decreasing false-positive rates and

improving security. However, more aggressive settings are also doomed to cause higher

rates of false negatives, i.e. users inside the SA that fail localization. A more conservative

configuration decreases the costs associated with false negatives but provides lower security

improvements.

4.8 Evaluation

4.8.1 Configuration

We evaluated our system in our IEEE 802.11 network testbed, described in detail in Sec-

tion 3.6.1. We use the values found during calibration for the configuration parameters that

approximate signal strength attenuation within our SA: α = 3.65 and σ = 6.59 dB. Unless

noted otherwise, these values are always used to establish the location of a transmitter.

We use two configuration tuples to evaluate the performance of our system, one aggres-

sive and one more conservative. Given that all locations in our testbed are within 9 meters

from an access point, the model found during calibration, and the transmission power level

used by our PCMCIA card (15 dBm), Equation 4.2 yields thresholds of -60 and -65 dBm

when using η = 0 and η = 5, respectively. As for the confidence level, we use 80% and 90%

Page 81: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 61

10 20 30 40 50 60 70 80 90

100

0 2 4 6 8 10

30 25 20 15 10 5 0

Perc

entile

Localization error (m)

Localization error (ft)

calibration model, 12 APssite survey model, 12 APs

simulation, 12 APs

Figure 4.4: Localization accuracy using all 12 access points. The first two curves show theerror distribution resulting from the survey data set using the calibration and the surveymodels. The third curve presents the error distribution found through simulation.

respectively for the aggressive and conservative settings. For both configurations we set the

minimum quorum requirement to 8 access points. Therefore, the aggressive and conservative

configurations are respectively (T = −60, Q = 8, L = 0.8) and (T = −65, Q = 8, L = 0.9).

As these are verification parameters, the accuracy of the system (the distance between

real and estimated locations) is the same for both configurations. The different parameters

only impact the rates of false positives and false negatives, i.e. whether or not a position

estimate is accepted.

4.8.2 Localization Accuracy

Our first accuracy estimate was found by running the samples collected for each of the

135 locations in the test data set through our algorithm, using the model found during

calibration (α = 3.65) and all 12 access points. As shown by the thicker solid line in

Figure 4.4, the results are encouraging: the median localization error across all locations is

1.88 meters (6.2 ft) with a 90th percentile of 3.81 m. (The error is defined as the euclidean

distance between real and estimated positions.) Localization error is less than 3 meters

(respectively 5 meters) for over 78% (96%) of the distribution, with no location with an

error higher than 7.5 meters.

The second curve shown in Figure 4.4 demonstrates that the accuracy of our system

would not improve substantially if we were to use the path loss model found for the survey

Page 82: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

62 CHAPTER 4. ROBUST LOCALIZATION

data set instead of the values found autonomously during calibration. With the survey

model and still using all 12 access points, the median and the 90th percentile of the er-

ror distribution are respectively 2.03 and 3.70 meters, similar to the performance of the

autonomous configuration. We attribute the negligible difference to the fact that our algo-

rithm estimates both physical coordinates and transmission power. So, the fact that the

model used for localization (α = 3.65) predicts slightly higher RSSI levels compared to the

survey data set (α = 4.05) gets compensated by the system, which channels some of the

error to the estimated power and thus reduces the impact on localization accuracy.

We confirmed through simulation the performance of our system on the test data set.

We simulated an environment with the exact same dimensions and placement of APs as our

service area, again using all 12 access points. For each location on a grid with a 2-meter

stride we generated 500 signal strength realizations and used that as input to the system.

Each realization is an RSSI tuple according to Equation 3.1: for a given location, relative

to each access point, we add to the predicted RSSI a random variation (in dB) drawn from

a Gaussian distribution with zero mean and standard deviation of σ dB. The samples are

generated according to the survey model while localization still uses the calibration model.

While simulation should not replace real deployment in the evaluation of a localization

system, our results suggest that it produces reasonable accuracy estimates, allowing one

to gauge performance with different AP densities and placement strategies. Aggregating

all realizations, simulating our SA yields a median localization error of 1.95 meters, with a

90th percentile of 4.4 m, as shown by the third curve in Figure 4.4. The graph shows that,

for most of the error distribution, simulation provides a close lower bound on accuracy.

However, the curves also show that simulation does not approximate well the tail of the

distribution: while the maximum localization error generated by our data set was inferior

to 8 meters, simulation manages to generate realizations with errors of over 20 meters.

We attribute this disagreement to the fact that simulation assumes Gaussian samples to

be independently distributed, generating realizations that may be unlikely to happen in

practice. In real deployments, RSSI levels seem to present more correlation than assumed

by Equation 3.1.

Our measurements demonstrate that localization error tends to be higher at the bound-

aries of the service area, where fewer access points participate in localization. Figure 4.5

shows the error at each sampled location using the calibration model and all 12 APs. Note

that 4 of the 5 locations with error higher than 5 meters are close to the external wall.

Page 83: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 63

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

error in [0, 2) merror in [2, 5) merror in [5, 8) m

false negatives, aggressive conf.

Figure 4.5: This figure shows the localization error for each location in the survey data setand the locations that produce false negatives with the aggressive configuration.

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

Figure 4.6: For each location in the survey data set, this figure shows the real locations(arrow tails) and the corresponding positions estimated by the system (arrow heads).

Page 84: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

64 CHAPTER 4. ROBUST LOCALIZATION

10 20 30 40 50 60 70 80 90

100

0 2 4 6 8 10

30 25 20 15 10 5 0Pe

rcen

tile

Localization error (m)

Localization error (ft)

calibration model, 12 APscalibration model, 10 APscalibration model, 8 APscalibration model, 6 APs

Figure 4.7: Localization error as a function of the number of APs using the survey data setand the calibration model.

Interestingly, the remaining location is the one with the highest error (7.48 m): a small

cable room, filled with wires, computers, switches, routers, and other metallic structures

that most likely perturbed signal propagation. This was the only location with an error

higher than 6 meters. Also, note that error tends to increase inside offices as the transmitter

moves away from the center of the building. Of the 30 offices in which two locations were

sampled, in 21 of them the error is higher closer to the external wall.

Most of time, the location estimated by the system is within the same room or within

an adjacent room relative to the real location. Figure 4.6 shows the position estimated by

the system for each location in the survey data set (calibration model, 12 APs). From 100

locations sampled inside rooms (offices and labs), for 64 of them the estimated location

is within the correct room, and for another 25 of them it is in an adjacent room. For 7

locations, the estimated position lies in a corridor, while for the remaining 4 locations the

estimated position lies in a nonadjacent room.

As expected, localization accuracy improves when more access points are deployed within

a service area. Figure 4.7 shows the localization error distributions resulting from the survey

data set when we use 12, 10, 8, and 6 APs. With 10 APs (all but numbers 9 and 12), the

median localization error and the 90th percentile increase respectively to 2.05 and 4.13

meters. With 8 APs (numbers 1-8), these values are respectively 2.44 and 4.84 meters.

Finally, using only 6 access points (APs 1, 2, 4, 6, 7, 8), the values increase further to 2.83

and 5.65 meters. We believe this is a graceful degradation in accuracy: going from 12 to

Page 85: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 65

10 20 30 40 50 60 70 80 90

100

0 2 4 6 8 10

30 25 20 15 10 5 0

Perc

entile

Localization error (m)

Localization error (ft)

simulation, 12 APs, σ=5 dBsimulation, 12 APs, σ=5.64 dB

simulation, 12 APs, σ=7 dBsimulation, 12 APs, σ=10 dB

Figure 4.8: Localization error as a function of the standard deviation associated with thepath loss model.

6 APs, there is an increase in the median error and 90th percentile smaller than 1 and 2

meters, respectively.

Finally, localization accuracy depends strongly on how well the path loss model calcu-

lated for a service area matches signal strength attenuation in the environment. The higher

the standard deviation found, the less accurate the model is, and consequently the higher

the localization errors. Figure 4.8 shows the error distributions found through simulation

when the standard deviation is varied between 5 and 10 dB. We again generate RSSI samples

according to the survey model (α = 4.05), use the calibration model for localization with

all 12 APs, and simulate locations every 2 meters within our SA, with 500 RSSI realizations

per location. When σ = 5.64 dB, the value found for our survey data set, the median error

and the 90th percentile are respectively 1.95 and 4.4 meters. When the standard deviation

is reduced to 5 dB, these numbers are reduced to respectively 1.75 and 3.90 meters. When

we increase the value of σ to 7 dB, performance decreases: the median error and the 90th

percentile increase to 2.38 and 5.48 meters, respectively. With σ = 10 dB, these numbers

increase further, to 3.31 and 8.11 meters. For higher values of σ, there is a weaker corre-

lation between signal strength and the distance between transmitters and receivers, which

negatively affects localization accuracy.

Page 86: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

66 CHAPTER 4. ROBUST LOCALIZATION

4.8.3 False Negatives

Using the aggressive configuration, (T = −60, Q = 8, L = 0.8), only three locations in

our survey data set produced false negatives (labeled with rejected), a rate of under 3%.

These locations are shown circled in Figure 4.5. The leftmost location failed the threshold

condition, while the other two (in corridors) failed the confidence test. As we expected, no lo-

cation failed the quorum condition because the PCMCIA card transmits omni-directionally,

always reaching the minimum number of APs. The fact that our algorithm also estimates

the transmission power used by a device helps reduce the rate of false negatives due to the

confidence test. If most RSSI samples are higher (respectively lower) than predicted by the

model, the system reacts by returning a higher (lower) power level, minimizing the solution

error and therefore the chance of rejection.

There were no false negatives for the conservative configuration, (T = −65, Q = 8, L =

0.9). The location that failed the threshold condition in the aggressive configuration is now

accepted. In fact, it produced a small localization error, only 1.80 meters. Similarly, the lo-

cations that failed the confidence test are also accepted with the conservative configuration

because the maximum error value allowed is now higher (only the last 10%, the tail of the

distribution is rejected). These numbers show that a network administrator can success-

fully reduce the probability of false negatives, although he also increases the probability of

attacks, as we describe later in this chapter.

The main challenge regarding the estimation of false-negative rates through simulation

lies with the threshold condition. Take for instance a client located 9 meters from the

closest access point (this is the maximum distance to an AP in our testbed). For this

distance, the path loss model yields a predicted RSSI around -60 dBm, and this is exactly

how the threshold value is calculated. However, a simulation step adds to this value a

random sample from a zero-mean Gaussian distribution, which means that the higher RSSI

for the client will be below -60 dBm during approximately half of the simulation rounds.

Consequently, approximately half of the signal strength realizations will fail the threshold

condition, producing false-negative rates that are overly pessimistic. And that is very

different from what happens in practice. Looking at Figure 3.5, the majority of points with

distances smaller than 9 meters produce filtered RSSI values above −60 dBm. For separations

higher than 10 meters, the model seems more accurate at predicting a base RSSI level.

Turning off the threshold condition during verification, simulation produces low false-

negative rates across the whole service area, which agrees with our survey data set. With

Page 87: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 67

the aggressive configuration, no location generated false negatives in more than 5% of the

signal strength realizations. We again simulated every location on a 2-meter grid with 500

realizations per location, generated RSSI samples according to the survey model, and ran

the localization algorithm using the calibrated model.

4.8.4 Handling False Negatives

Network administrators can address false negatives caused by the threshold condition by

simply installing additional access points. These cases happen at locations inside the service

area where signal strength attenuation with respect to the closest access points is higher

than predicted by the path loss model instance. For example, the single location in our

measurements that failed the threshold condition did not fail the confidence test and the

quorum condition. This is an example of a false negative that could be eliminated by adding

another access point.

False negatives caused by the quorum condition and the confidence test cannot be elimi-

nated as easily because they are the result of errors and deviations associated with multiple

access points. However, some of these false negatives may not need to be addressed. This

will depend on the location at which the false negative is generated and whether users are

expected to visit them on a regular basis. For example, a false negative at a location inside

an office or a conference room has a higher impact than one caused in a corridor. For this

reason, the other two false negatives in our testbed – both located in a corridor – may not

be of concern.

4.8.5 Performance

Performance measurements show that our localization server has modest hardware require-

ments. We timed localization overhead during our simulations on a laptop running Linux

with kernel version 2.6.11 and equipped with a 1.86 GHz Intel Pentium M processor and

1GB of RAM. Given an RSSI tuple as input, the system takes an average of 1.4 milliseconds

to establish a location within our service area. This would allow each of 200 clients to be

pinpointed every 5 seconds while demanding less than 5% of CPU utilization. While this

overhead would increase for larger service areas and higher numbers of APs, a centralized

server should still be able to handle a sizable network with modern processors.

Page 88: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

68 CHAPTER 4. ROBUST LOCALIZATION

4.8.6 Building Penetration Loss

In order to quantify the amplification needed by attackers located outside the service area

and their probability of success at fooling the localization system, we need a path loss

model that accounts for the attenuation suffered by a signal as it travels outside and into

the building. With such a model we can calculate the probability of false positives as a

function of the distance between the attacker and the SA.

While not as well-studied as the indoor wireless channel, several papers suggest that a

model similar to Equation 3.1 can be used to predict signal penetration into buildings. In

this case, the signal strength inside the SA relative to an external transmitter is given by:

Pr(d) = Pr0 − 10αout log(d)−WAF + Xσ. (4.3)

The first difference is the wall attenuation factor (WAF), which accounts for penetration

loss caused by the external walls. Estimates for WAF vary according to frequency and

construction materials; Rappaport reports average loss due to concrete walls ranging from

8 to 15dB [91]. The second is a different path loss exponent: we use αout to avoid confusion

with the value used inside the SA. Measurements available in the literature suggest that

values for αout lie within [2, α], i.e., higher than free space and lower than models found

inside the respective buildings. For instance, Durgin et al. found values for αout and WAF

respectively within the intervals (2.7, 3.6) and (7, 21) dB when measuring propagation into

three homes at 5.85 GHz, with distances varying between 30 and 210 meters [46].

We performed measurements outside our building to find the proper parameters for

Equation 4.3. As transmitter we used a 802.11 access point located 9 meters from the

building’s external wall. We sampled a total of 40 locations over 4 straight lines going out

of the building at a 90◦ angle and spaced by approximately 2 meters. The measurements

were performed in front of large windows (6ft×7 ft each), with separations varying between

2 and 22 meters (11 to 31 meters to the access point).

Our findings agree with previously published results and indicate that the modified log-

distance model given by Equation 4.3 closely approximates signal strength levels outside the

building. In each of the 40 locations, between 30 and 75 RSSI samples were collected, with

the average signal strength values shown in Figure 4.9. The line shows the model instance

found through linear regression: WAF = 4.8 dB and αout = 3.32, with a standard deviation

Page 89: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 69

-100

-90

-80

-70

-60

-50

-40

-30

-20

50 40 30 20 10

Sign

al s

treng

th (d

Bm)

Distance to access point (m)

wallα=3.32, WAF=4.8 dB

Figure 4.9: Measurements outside the building.

of 3.1 dB. Despite the lower attenuation rate compared to the measurements inside the

building (3.32 vs. 4.05), signal still degrades much faster than predicted by the free-space

model (α = 2.0). As with our indoor measurements, the deviations from the mean can be

closely approximated by Gaussian random variables. Overall, 70% of the RSSI samples are

within 1 standard deviation from the mean, 95% within 2 deviations, and 100% within 3

standard deviations.

While other path loss models have been proposed to model propagation into buildings

(mostly to reduce σ), our system relies on the fact that large-scale path loss is a function

of the logarithm of the distance, which is common to all models. First, this means that

attackers need more amplification as they increase their distance to the service area. Second,

and most importantly, it means that RSSI patterns tend to be flatter after 30 or 40 meters

from the SA, i.e. without the sharp decay seen for clients in close range to APs. The bigger

this difference, the larger the error value of the estimated position inside the SA and the

higher the chances of failing the confidence test.

4.8.7 Minimum Amplification Demands

The objective of an intruder located outside the building is to generate an RSSI pattern

that is accepted by the system without failing successive successive times, which could

trigger alarms and reveal his efforts. He has two main ways of improving his chances.

His first alternative is to get closer to the service area, making his RSSI pattern more

Page 90: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

70 CHAPTER 4. ROBUST LOCALIZATION

similar to those produced within the SA. In this case the chances of attack detection are

higher, but he is able to use portable devices with the same capabilities as the reference

client. His second alternative is to use more sophisticated equipment (such as amplifiers

and directional antennas) to allow him to increase his distance to the SA. These attempts

can still be detected, as these devices are harder to conceal than common PCMCIA cards.

In this section we quantify the amount of amplification needed outside the SA to satisfy

the threshold condition. This is the first requirement for a successful attack, as failure to

do so means automatic rejection during the verification phase. For the estimates presented

in this section we assume that targeted clients are able to transmit at 20 dBm (100 mW),

level commonly available in PCMCIA cards. For our network setup, this means that the

threshold T can be set as high as -55 dBm.

The additional amplification needed by an attacker relative to the reference client in-

creases with distance and rapidly achieves considerable levels. For instance, assume an

attacker located outside the SA in the direction of access point 11 (Figure 3.2), which is 2.7

meters from the building’s external wall. If we assume that propagation into the building

follows the model (αout = 3.3, WAF = 5) found in our outdoor measurements and that

T = −55 dBm, Equation 4.3 states that the attacker needs a minimum of 11, 20, and 24

dB of amplification relative to the reference client when located respectively 15, 30, and

40 meters from the wall. Figure 4.10 shows the amplification needed at multiple locations

around our building. A location labeled with 15 means that an attacker located at that

location needs to transmit at a level 15 dB higher than the reference client, i.e. at 35 dBm.

These numbers demonstrate that attackers with low amplification levels (e.g. using

PCMCIA cards) have to be located in close proximity to the external walls (<10 m) to

have any chance of acceptance. The PCMCIA card with highest power available in the

market transmits at 24.8 dBm (300 mW), 4.8 dB of amplification compared to our reference

client. An intruder that opts for a portable transmitter has a limited range around the

building, making physical security measures more effective.

Moreover, these estimates show that amplification demands are quite high for an attacker

located more than 20 meters from the building. At that distance, attackers need at least 15-

20 dB of amplification to satisfy the threshold condition. As this kind of gain is possible only

through amplifiers and external antennas, attackers risk exposure and are more vulnerable

to cameras and other physical security measures. Note as well that such high output

Page 91: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 71

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

•26•

•26•

•26•

•26•

•26•

•27•

•28•

•29•

•30•

•23•

•23•

•23•

•23•

•24•

•25•

•26•

•27•

•29•

•20•

•21•

•20•

•21•

•22•

•23•

•24•

•26•

•28•

•17•

•17•

•17•

•17•

•19•

•21•

•23•

•25•

•26•

•12•

•12•

•12•

•13•

•15•

•18•

•21•

•23•

•25•

•5•

•6•

•5•

•7•

•12•

•16•

•19•

•22•

•24•

•0•

•8•

•13•

•17•

•21•

•23•

•0•

•4•

•11•

•16•

•20•

•23•

•0•

•5•

•12•

•16•

•20•

•23•

•0•

•6•

•12•

•17•

•20•

•23•

•0•

•2•

•11•

•16•

•20•

•23•

•0•

•7•

•13•

•17•

•20•

•23•

Figure 4.10: Predicted minimum amplification level needed to satisfy the threshold condi-tion around the SA.

power levels are higher than allowed by the FCC in the United States: at 2.4 GHz, omni-

directional transmitters cannot transmit at levels higher than 30 dBm, or 10 dB above our

reference client.

4.8.8 False Positives – Omnidirectional Antennas

In this section we assume that attackers have unbounded amplification capabilities, being

always able to increase their output power as to satisfy the threshold condition. We assume

they employ omni-directional antennas and amplifiers, with directional antennas being eval-

uated in Section 4.8.9. We show that even with unbounded power, undetected attacks can

be mounted only close to the service area, within 20-30 meters.

Our analysis is based on F +, the percentage of simulation rounds in which the corre-

sponding signal strength realization was accepted by the system. For each location, sim-

ulation proceeds as follows. During a simulation round, a random signal strength value is

generated for each access point within range according to Equation 4.3 using αout = 3.3,

WAF = 5 dB, and σ = 5 dB, and inputted to the algorithm. We ran 5000 different rounds

(realizations) for each location and calculated F + as the percentage of rounds with esti-

mated locations labeled with accepted. The simulated intruder uses an antenna with a

beamwidth of θ degrees: omni-directional antennas are simulated using θ = 360◦. Finally,

we use both the aggressive and conservative configurations, as described in Section 4.8.1.

Page 92: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

72 CHAPTER 4. ROBUST LOCALIZATION

Unless noted otherwise, the power used by the intruder at a given location is the mini-

mum necessary to make the expected signal strength at the closest access point within range

equal to the threshold T . I.e., the minimum to satisfy the threshold condition. We denote

by GUN the additional (unnecessary) gain in dB used by the intruder, the same value being

used for all locations in each simulated scenario. When GUN = 0 dB, the intruder uses the

minimum power level.

An intruder is likely to over-amplify his signal (GUN > 0) due to several issues. First,

most transmitters are provided with a limited set of power levels, which may force them

to overshoot by a couple of dB (e.g. the Cisco 350 has 6 levels between 0 and 20 dBm [4]).

Second, these are approximate figures: cards usually have an error of around 2 dBm, as

sometimes reported in product brochures (e.g. SMC2536W-AG [6]). Finally, and most

importantly, the intruder may not be able to precisely gauge the path loss between him

and the closest access point, for instance if the AP is used exclusively as a sensor (no

transmissions). In this case, using additional power is the only way to guarantee that the

threshold condition is satisfied. If APs are not used only as sensors, the intruder could

measure the RSSI from the AP and take the corresponding path loss as an estimate for

the loss in the reverse direction. However, our calibration measurements suggest that this

procedure is error-prone, given that even for two stationary devices the difference in path

loss between the two directions can be as high as 16 dB.

As the intruder gets farther from the service area, values of F + decrease rapidly. For

example, Figure 4.11(a) shows the simulation results for the aggressive configuration when

using GUN = 5 dB. Note that at close distances (< 10 meters), F + values are as high as

99, i.e. 99% of the simulation rounds generated false positives. This was expected, as the

pattern generated at these locations is similar to the pattern seen at the border of the SA.

However, when more than 30 meters from the building, less than 10% of the simulation

rounds yielded false positives. At these distances, the patterns created by the attacker

are flatter, being rejected with high probability. Such low rates generate multiple alarms,

allowing attack detection.

Our results also demonstrate that unnecessary amplification is harmful: the higher

the output power used by the attacker, the smaller are his chances of acceptance. When

amplification is too high, the pattern produced differs considerably from what is expected

from standard clients inside the building. For example, Figure 4.11(b) shows that the

probability of false positives decreases substantially when the attacker uses GUN = 10

Page 93: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 73

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

2•

2•

2•

3•

4•

2•

2•

1•

1•

8•

8•

7•

9•

6•

4•

4•

4•

1•

20•

8•

16•

11•

7•

7•

7•

3•

1•

32•

26•

28•

33•

18•

9•

4•

3•

3•

67•

64•

65•

58•

45•

21•

8•

5•

3•

88•

91•

91•

86•

57•

25•

11•

4•

3•

94•

79•

41•

19•

5•

4•

98•

89•

51•

20•

7•

2•

92•

82•

30•

16•

5•

2•

96•

73•

30•

7•

4•

1•

99•

86•

48•

17•

5•

2•

95•

74•

29•

15•

9•

3•

(a) θ = 360◦, aggressive configuration,GUN = 5 dB

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

0•

5•

3•

3•

2•

1•

0•

0•

0•

0•

61•

29•

52•

36•

2•

0•

0•

0•

0•

89•

13•

1•

0•

0•

0•

98•

42•

2•

0•

0•

0•

96•

14•

0•

0•

0•

0•

61•

7•

0•

0•

0•

0•

99•

35•

1•

0•

0•

0•

89•

11•

0•

0•

0•

0•

(b) θ = 360◦, aggressive configuration,GUN = 10 dB

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

43•

42•

43•

44•

46•

41•

38•

34•

31•

54•

54•

54•

55•

51•

47•

43•

43•

32•

62•

62•

63•

60•

57•

53•

50•

40•

31•

68•

73•

71•

66•

65•

58•

49•

40•

41•

68•

74•

73•

70•

67•

64•

55•

48•

40•

57•

77•

66•

65•

73•

67•

59•

47•

42•

69•

74•

69•

61•

47•

44•

98•

66•

66•

60•

51•

41•

92•

72•

72•

61•

48•

38•

83•

77•

71•

56•

47•

38•

99•

66•

67•

60•

48•

39•

82•

77•

69•

58•

49•

41•

(c) θ = 360◦, aggressive configuration,GUN = 0 dB

Figure 4.11: False-positive rates around the SA as a function of GUN using the aggressiveconfiguration.

Page 94: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

74 CHAPTER 4. ROBUST LOCALIZATION

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

61•

59•

60•

62•

63•

59•

55•

51•

47•

74•

72•

72•

72•

69•

65•

62•

61•

49•

82•

77•

81•

78•

74•

71•

69•

58•

48•

87•

89•

88•

87•

82•

76•

67•

57•

59•

93•

94•

94•

92•

89•

82•

73•

65•

57•

93•

97•

96•

95•

92•

85•

76•

64•

59•

96•

95•

89•

80•

64•

62•

99•

95•

90•

80•

68•

57•

99•

96•

87•

77•

64•

53•

98•

96•

86•

71•

63•

54•

99•

94•

88•

77•

64•

55•

99•

96•

86•

75•

66•

56•

Figure 4.12: False-positive rates for GUN = 5 dB using the conservative configuration.

dB, i.e. 5 dB higher than in Figure 4.11(a). As shown, the probability of false positives

is negligible when more than 15 meters from the SA. This happens because the system

expects measured RSSI levels to be within k standard deviations from what is predicted by

the path loss model (Section 4.7.2). As the system is looking for positions inside the SA,

unnecessarily high power causes some APs to report RSSI levels more than kσ dB from the

predicted value, which generates solutions with fewer degrees of freedom and lower error

thresholds. As Figure 4.11(c) shows, if the intruder were able to find the minimum power

level required, his chances would improve substantially.

Our simulation results also demonstrate the usual trade-off between security and man-

agement costs, represented by the relationship between false negatives and false positives.

When using a more conservative configuration as to reduce the number of clients rejected

within the service area, one automatically increases the probability of successful attacks

outside the SA. Figure 4.12 shows that F + values increase considerably when simulation

is performed with the conservative configuration (compare to Figure 4.11(a)). Even with

GUN = 5 dB, false-positive rates are high even when the intruder is located more than 30

meters from the building.

Our system can be seen as an intrusion detection system, and like any other, each in-

stallation has to choose an acceptable rate of false negatives while configuring the system.

Even our “aggressive” configuration is not too aggressive, as it produces few false nega-

tives. Setting even higher values for the threshold or minimum quorum, however, would

Page 95: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 75

likely create enough rejected spots to force the network administrator to reconsider his de-

cision. Another important factor to consider is where false negatives occur. For instance,

an administrator could decide to use a higher threshold value in a setting where offices and

meeting rooms are provided with good coverage at the expense of false negatives at other,

less frequently used areas of the service area.

We believe that in our setting, undetected attacks are likely only within 15-20 meters

from the building. This follows from the fact that in our testbed we can safely use the

aggressive configuration, making Figure 4.11(a) the most likely scenario for attackers with

unbounded power capabilities and omni-directional antennas.

4.8.9 False Positives – Directional Antennas

In this section we evaluate our system against an attacker that employs directional antennas,

devices that provide him with two main advantages. First, directional antennas have an

associated gain, which may allow him to satisfy the threshold condition without the need

for an amplifier. Second, as these antennas do not distribute power uniformly across all

directions – that is where the gain comes from – they generate signal strength patterns that

are considerably different from the one expected from am omni-directional transmitter (like

our reference client). We will show that this has a negative impact on the rates of false

positives. The main disadvantage of these antennas is their size: with high-gain (> 18 dBi)

antennas being commonly larger than 20 inches in diameter and heavier than 4 pounds,

they make attacks considerably harder to implement and easier to detect [9, 15].

For our simulation we use the directional antenna model proposed by Ramanathan [90].

We adopted this model to simplify our analysis, given that each real directional antenna

distributes power tridimensionally in a different way, producing a distinct antenna pattern.

For example, the 802.11-compatible HG2409Y, HG2418D, and HG2424G antennas produced

by HyperLink Technologies create considerably different patterns, with gains ranging from

9 to 24 dBi [9, 11, 15]. Like any real antenna, the antenna pattern proposed by Ramanathan

is characterized by a main lobe, the direction of maximum gain, and side lobes, less-favored

directions that provide lower gains (less power is sent in these directions than would be in a

perfectly omni-directional antenna). The main differences to a real antenna pattern is that

in Ramanathan’s model there are no nulls (directions with negligible radiation) and that

power is distributed uniformly outside of the main lobe, i.e. it has a single side lobe with

uniform gain. We simulated 4 directional antennas proposed by Ramanathan [90], with

Page 96: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

76 CHAPTER 4. ROBUST LOCALIZATION

Antenna Beamwidth (θ) Main lobe gain Side lobe gain

(1) 60◦ 10 dBi -7.4 dBi

(2) 40◦ 14 dBi -7.6 dBi

(3) 20◦ 20 dBi -6.5 dBi

(4) 10◦ 26 dBi -4.0 dBi

Table 4.2: Directional antenna patterns used during simulation.

beamwidth values ranging between 10◦ to 60◦ and maximum gain between 10 and 26 dBi

(shown in Table 4.2). Like real antennas, higher gains are achieved by making antennas

more directional (lower values of θ).

The simulation procedure is similar to the one described for omni-directional antennas.

The main difference is that for each location, multiple orientations were simulated, each with

5000 simulation rounds. For each location and beamwidth value, we tested all orientations

with increments of 10◦ and we report the combination with the highest value for F +, i.e.

the best combination for the attacker.

Figure 4.13 shows that false-positive rates increase when an attacker uses a directional

antenna. The figure shows the values for F + for the 14-dBi antenna against the aggressive

configuration and with GUN = 5 dB. With the same placement of access points, an attacker

with the 14-dBi antenna can fool the system with high probability even when located 30

meters from the building. Whereas in Figure 4.11(a) (omni-directional antenna) low values

of F+ are seen across all locations more than 30 meters from the service area, in Figure 4.13

many locations at that range had over 80% of the simulation rounds accepted.

These higher false-positive rates are possible because an attacker with a directional

antenna is able to induce considerable signal strength degradation inside the service area

within a short distance, a behavior similar to the one expected from standard clients within

the building. Take for instance the location in Figure 4.13 labeled with “86” and with its

main lobe represented by two line segments. With the orientation shown, the attacker is

able to cover half of the access points with the main lobe, with the other 6 being covered by

the side lobe. With the 14-dBi antenna, there is a difference of over 21 dB between the gains

of the main and side lobes. Consequently, the RSSI levels detected by the 6 APs covered

by the main lobe are much higher than the values reported by the other access points, a

pattern that is similar to the one created by a standard device located on the West side of

the building. Consequently, for most of the simulation rounds the system is able to find a

Page 97: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 77

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

22•

66•

30•

93•

36•

92•

76•

91•

53•

93•

47•

33•

92•

93•

92•

91•

66•

83•

94•

76•

39•

91•

92•

90•

76•

91•

66•

94•

75•

92•

92•

92•

91•

91•

74•

69•

94•

92•

90•

91•

92•

90•

77•

82•

69•

91•

94•

88•

88•

81•

76•

80•

79•

85•

89•

85•

76•

82•

84•

84•

98•

89•

83•

82•

84•

86•

95•

82•

84•

86•

88•

88•

78•

78•

83•

91•

90•

90•

92•

90•

85•

92•

92•

91•

98•

93•

84•

91•

91•

80•

Figure 4.13: False-positive rates for directional antenna with θ = 40◦ and 14 dBi, againstthe aggressive configuration and with GUN = 5 dB.

solution in that area with an acceptable error value. Figure 4.14 shows that this approach

is also successful with the other directional antennas simulated.

While such attacks are possible, they are considerably hard to implement successfully

without raising suspicion. First, the attacker needs to amplify his signal to meet the thresh-

old condition, the same problem faced in the omni-directional scenario. Additionally, he has

to point the antenna in the right direction, which he may be unable to find if the APs are

configured solely as sensors. If the attacker covers more access points with the main lobe,

he will increase the number of APs reporting high RSSI levels and consequently increase

the error associated with estimated location, which decreases his chances of success. If in

the process of finding the right orientation the attacker is rejected a couple of times, the

system has considerable evidence that an attack is taking place.

These numbers do demonstrate, however, that additional mechanisms or resources are

needed to provide the same level of security against attackers with directional antennas and

the required amplification capabilities. In this dissertation we present two approaches that

allow an installation to improve security against directional antennas with a manageable

increase in overall deployment costs.

The first approach consists of deploying additional access points around the service area

in a demilitarized zone (DMZ). These additional sensors are deployed with the objective

of identifying transmissions originating at locations beyond the service area. They could

Page 98: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

78 CHAPTER 4. ROBUST LOCALIZATION

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

46•

67•

52•

93•

56•

90•

77•

89•

76•

92•

64•

55•

92•

92•

91•

90•

81•

93•

93•

75•

65•

92•

93•

90•

81•

87•

78•

93•

76•

92•

93•

94•

91•

89•

81•

70•

94•

93•

90•

91•

91•

90•

83•

94•

80•

92•

93•

91•

91•

86•

86•

94•

83•

95•

93•

86•

92•

94•

95•

96•

99•

87•

91•

95•

96•

96•

98•

90•

96•

96•

96•

96•

94•

96•

97•

96•

95•

94•

95•

92•

93•

93•

94•

95•

98•

89•

91•

91•

92•

86•

(a) θ = 60◦, 10 dBi, aggressive configura-tion, GUN = 5 dB

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

8•

65•

9•

88•

30•

88•

76•

88•

40•

92•

20•

11•

88•

88•

89•

89•

36•

71•

92•

70•

11•

86•

90•

87•

74•

88•

35•

91•

67•

87•

89•

89•

89•

89•

72•

69•

91•

91•

87•

88•

89•

89•

76•

64•

69•

92•

92•

94•

89•

80•

76•

74•

65•

62•

89•

79•

76•

67•

65•

63•

97•

93•

77•

68•

65•

62•

80•

81•

78•

77•

61•

58•

65•

77•

82•

58•

57•

55•

83•

89•

83•

62•

74•

54•

97•

94•

59•

58•

56•

55•

8•

65•

9•

88•

30•

88•

76•

88•

40•

92•

20•

11•

88•

88•

89•

89•

36•

71•

92•

70•

11•

86•

90•

87•

74•

88•

35•

91•

67•

87•

89•

89•

89•

89•

72•

69•

91•

91•

87•

88•

89•

89•

76•

64•

69•

92•

92•

94•

89•

80•

76•

74•

65•

62•

89•

79•

76•

67•

65•

63•

97•

93•

77•

68•

65•

62•

80•

81•

78•

77•

61•

58•

65•

77•

82•

58•

57•

55•

83•

89•

83•

62•

74•

54•

97•

94•

59•

58•

56•

55•

(b) θ = 20◦, 20 dBi, aggressive configura-tion, GUN = 5 dB

0

10

20

30

40

50

60

-40 -30 -20 -10 0 10 20 30 40

88•

2•

0•

2•

80•

25•

81•

71•

80•

6•

2•

77•

2•

81•

81•

69•

81•

30•

45•

47•

76•

78•

83•

69•

82•

72•

68•

88•

86•

78•

72•

70•

84•

74•

83•

16•

88•

76•

77•

89•

85•

70•

73•

71•

42•

87•

90•

94•

92•

89•

73•

23•

68•

44•

88•

86•

46•

65•

66•

69•

94•

90•

67•

71•

56•

42•

52•

84•

66•

55•

48•

49•

74•

59•

58•

77•

57•

39•

87•

85•

78•

73•

68•

76•

93•

49•

88•

90•

70•

36•

(c) θ = 10◦, 26 dBi, aggressive configura-tion, GUN = 5 dB

Figure 4.14: False-positive rates for the other simulated directional antennas.

Page 99: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.8. EVALUATION 79

be even installed close to external walls and with directional antennas pointing away from

the SA in order not to affect localization within the building. As signal gets substantially

attenuated as it travels through walls and external obstacles, in the case of an external

attack, RSSI levels detected by sensors in the DMZ should be much higher than the ones

reported by sensors placed within the service area. With enough external sensors, a simple

additional condition added to the verification phase would be sufficient to detect these

attacks. In the case of IEEE 802.11 networks, the falling prices of access points allow such

security improvement to be realized with low extra costs.

The second alternative is to prevent attackers from using amplifiers to obtain the gain

they need to when located outside the service area. For example, Figure 4.14(a) shows that

an attacker may successfully fool the localization system with a 10-dBi antenna coupled

with an amplifier. In the next chapter we present in detail a mechanism that reduces the

effectiveness of amplifiers by exploring characteristics of wireless receivers. Consequently,

attackers outside the SA have to rely mostly on their antennas to provide the amount of

gain they need. Security gets further improved because high-gain antennas are fairly large

devices, making attack attempts not only harder to implement by also easier to detect.

4.8.10 Localization in Multi-Story Buildings

Despite our use of a single-floor building for evaluation, our system can be used in instal-

lations with multiple floors. This scenario affects the localization phase only, having no

significant effect on the conditions imposed by the verification phase.

Even though our algorithm already performs a tridimensional search, we believe our

system would achieve better accuracy in multi-floored buildings if search were performed

in a per-floor basis. Propagation through floors causes considerable attenuation (10-15

dB [91]), so the system should not have a problem detecting the floor at which a mobile

device is located given the RSSI patterns produced in each one. The system can search all

floors starting with the one containing the access point that reported the highest RSSI level

and return the location found with the smallest error across all floors.

One alternative would be to perform a full tridimensional search, simultaneously using

all access points, across all floors. One problem with this approach is that our system would

have to take into account signal attenuation across floors, directly modeling the loss caused

by each one. For example, it could use the partition model proposed by Seidel et al. [105],

discussed in Section 3.7. However, there is empirical evidence in the literature that suggests

Page 100: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

80 CHAPTER 4. ROBUST LOCALIZATION

an increase in standard deviation (loss of prediction accuracy) when one increases the area

covered by a single model instance. Using a single model for a multi-floored building could

suffer from this very problem, as heterogeneity between floors would not be taken into

account because a single value for α would be used for the whole building.

4.9 Limitations

Our system will provide lower accuracy and weaker security guarantees in environments

that produce path loss model instances with high standard deviation values. For instance,

our simulation results demonstrated the impact of standard deviation values on accuracy:

when σ increases from 5.64 to 10 dB, the median error and the 90th percentile of the error

distribution in our testbed increase from 1.95 and 4.4 meters to respectively 3.31 and 8.11

meters. Higher standard deviation values also cause higher rates of false positives. We

showed in Section 4.8.8 that with the conservative configuration, false positive rates are

high even when the attacker is located more than 30 meters from the SA. A similar increase

in false positives would result from a path loss model with a higher value of σ, as the

maximum error allowed for a solution would be higher for a given confidence level.

It is unclear, however, the physical properties needed by a SA to produce such inaccu-

rate path loss model instances. For example, the literature presents strong support for the

log-distance model, as high standard deviation values are usually a result of modeling atten-

uation across large areas or in multi-floored buildings with a single model instance [91, 105].

Moreover, our system uses several mechanisms to improve signal strength prediction. First,

we showed in Chapter 3 that proper filtering reduces standard deviation values compared

to the use of average RSSI levels, which is used in many earlier works. Second, our sys-

tem can use multiple model instances exactly to account for distinct properties of different

floors or even of different sections of the same floor. As discussed in Section 7.3, a thorough

evaluation of signal attenuation modeling in different service areas is left as future work.

Even though our mechanism increases amplification demands at all locations outside a

service area, successful attacks with modest hardware requirements are still possible near

the boundaries of the SA. For example, our results demonstrate that an attacker located

within 15 meters from the SA may not succeed using a standard PCMCIA card, but may

generate a valid location using a portable setup including an amplifier and an external

antenna. To maximize the security guarantees provided by our mechanism, installations

Page 101: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

4.10. SUMMARY AND CONCLUSION 81

need to protect between 20 and 30 meters around their service areas – for example deploying

fenced demilitarized zones or security cameras. If that is not the case, networks may be

vulnerable to attacks from parking lots and other areas within close range of the deployed

access points. Whether this extra level of protection is necessary or not will depend on the

attack model adopted by each installation, which includes the range of devices they want

to protect against. We believe this is not a characteristic of our system per see, but of any

mechanism that exploits the relationship between signal attenuation and distance because

of the inherent variations and errors associated with signal strength measurements.

A similar scenario occurs when service areas with different administrative domains oc-

cupy adjacent floors in a multi-story building. For instance, an attacker on the second floor

of a building may be able to access the wireless network of an enterprise located on the first

floor if provided with enough amplification to account for the floor attenuation. We cannot

quantify the exact amount of amplification needed using our measurements, but it will vary

from one installation to another and is likely to be within 10 and 20 dB [91].

4.10 Summary and Conclusion

In this chapter we presented the design and evaluation of a localization system based on

signal strength measurements and showed how it can be used to improve security in wireless

LANs in a cost-effective manner.

We showed that the system improves accountability, as it is able to accurately monitor

the position of all devices located within the service area. Using measurements collected

at 135 locations in an IEEE 802.11 installation with 12 access points, we demonstrated

that clients inside the building are located with a median error of 1.88 meters and a 90th

percentile of 3.81 m. As the system estimates not only location but also the transmission

power used by devices, it is prepared to handle clients using dissimilar wireless cards or

power levels.

We also demonstrated that our system can be used to implement location-based access

control, improving security by leveraging physical security measures and imposing consid-

erable hardware resources on devices located outside the SA. We showed that clients inside

the SA are rejected with low probability: even with an aggressive configuration, only 3

locations out of the 135 sampled were rejected. With a conservative configuration, there

were no false negatives. Moreover, we used measurements performed outside our building

Page 102: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

82 CHAPTER 4. ROBUST LOCALIZATION

to show that hardware demands for attackers rapidly reach impractical levels. First, we

showed that power-limited devices (e.g. PCMCIA cards) have to be located within 10 me-

ters from the SA to have any chances of acceptance, making physical security measures

more effective. Second, we showed that after 30-40 meters from our building, attackers

need over 20 dB of amplification. At these distances, devices with omni-directional anten-

nas are rejected with high probability – even if provided with unbounded amplification –

because the patterns produced differ considerably from what is predicted by the path loss

model. We showed that it is hard for attackers to find the exact power level to use and that

unnecessary amplification is harmful, which further reduces the practical range of attacks.

Third, we demonstrated that false-positive rates increase when attackers use high-gain di-

rectional antennas and described alternatives to improve the performance of the system in

these scenarios.

Finally, we showed that our system is able to configure itself with minimal operator

assistance, therefore improving security without a corresponding increase in management

costs. All the results presented in this section were obtained using the path loss model found

autonomously by the system during calibration. Overall, our system takes advantage of the

increasing number of access points to provide a service that is both robust against attacks

and scalable, making it suitable for security applications even in environments where APs

are incrementally deployed.

Page 103: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 5

Range-Based Authentication

In this chapter we present a protocol that checks whether a wireless receiver is within a

specified range from an access point. Compared to our localization system, we show that

this mechanism makes it even harder for attackers to access the network when located

outside the service area.

5.1 Motivation

One inherent characteristic of using a localization system for access control purposes is

that clients seeking authentication act as transmitters, for which amplification is an easier

problem. Our results in the previous chapter showed that an attacker needs more than 15

dB and 20 dB of amplification to authenticate successfully when located more than 20 and

30 meters from our building, respectively. When acting as a transmitter, an attacker that

far from the service area can obtain the necessary gain to generate a false positive through

a combination of a compact directional antenna and an amplifier. This setup allows him

to better disguise an attack, decreasing the effectiveness of surveillance cameras and other

physical security measures.

In this chapter we present a mechanism that increases the hardware demands for an

attacker and improves the chances of attack detection by forcing clients to act as receivers.

As amplifiers are not as useful in this scenario, an attacker has to gather most of the

amplification needed to mount an attack by using antennas with gain. The problem with

this approach is that high-gain antennas – those providing over 15 dBi of gain – are large

devices, much harder to conceal than standard PCMCIA cards and some low-gain antennas.

83

Page 104: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

84 CHAPTER 5. RANGE-BASED AUTHENTICATION

For example, 802.11-compatible 2.4 GHz antennas providing between 18 and 24 dBi of gain

usually measure between 15 and 40 inches (largest dimension) and weigh between 3 and 8

pounds [9, 10, 14, 15]. Consequently, attackers are physically exposed and such attempts

can be more easily detected.

We describe the design and evaluation of a range-based authentication protocol that

imposes no modification to off-the-shelf wireless equipment and relies solely on well-accepted

properties of the wireless channel. Each access point within the service area is configured

with a maximum range, a value chosen so that each location in the SA is covered by at least

one AP. During an authentication handshake, an AP transmits a stream of unpredictable

random numbers. A client authenticates itself by sending back a cryptographic proof that

it correctly received the random sequence, which in turn proves it to be within the targeted

range for that access point. We show that our protocol can control the range of each

AP through transmission power control and CRC omission, while using a standard Diffie-

Hellman key exchange to generate session keys to protect wireless traffic.

We present measurements in our network testbed that demonstrate the effectiveness of

range-based authentication. Using indoor measurements, we show that clients within the

targeted coverage area and provisioned with off-the-shelf hardware experience high-quality

channels and are able to complete the handshake successfully, with a low probability of two

consecutive failures. Outside the building, attackers need extra antenna gain to cope with

the higher signal attenuation and the corresponding increase in bit error rates. We show

that such demands increase rapidly with distance and that for an intruder to authenticate

successfully from a safe location (> 30 meters from the SA) he or she needs at least 20 dBi

of antenna gain. Finally, we show that management overhead is minimal because there is

no additional costs for supporting new users and because the system leverages the results of

system calibration. As a result, our protocol considerably increases the hardware demands

for successful attacks and improves the effectiveness of physical security measures without

increasing management costs.

This chapter is organized as follows. In sections 5.2 and 5.3 we present our attack

model and an overview of our protocol. Section 5.4 presents the properties regarding signal

propagation that our protocol relies on, while sections 5.5-5.11 present the protocol in detail.

In Section 5.12 we demonstrate the effectiveness of range-based authentication and show

that it is built upon sound properties. In Section 5.13 we present the limitations of our

mechanism, while Section 5.14 concludes this chapter.

Page 105: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.2. ATTACK MODEL 85

Figure 5.1: Example of a range configuration that covers most of our service area with 8access points.

5.2 Attack Model

The attack model used to evaluate our range-based authentication protocol is similar to

the one used in the previous chapter for our localization system. First, we assume that

unwanted users are not allowed inside the service area. Second, we assume that attackers

are not limited to using devices similar in resources to our reference client. We again

evaluate the performance of our protocol against a wide range of attackers, including those

provided with high-gain directional antennas.

5.3 Overview

Given the set of access points to be used for authentication purposes, the system finds the

range to be used by each one. Each access point APi is associated with a maximum range

Ri so that all APs used for authentication cover the whole service area, with a possibly

different range value being used for each access point. For example, Figure 5.1 shows one

configuration that covers our service area using 8 of the 12 IEEE 802.11 access points

deployed. A client authenticates successfully if it can prove that it is located at a distance

di ≤ Ri from any access point APi ∈ SA.

A client seeking authentication needs to successfully complete an authentication round.

During a round, the WA (or server) selects one access point to act as transmitter and

broadcasts several messages containing a sequence of random numbers (nonces), which are

Page 106: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

86 CHAPTER 5. RANGE-BASED AUTHENTICATION

created fresh and are unpredictable to clients. To be granted access to the network, a client

only needs to prove to the server that it correctly received all the nonces by sending a secure

hash of the data.

Each round is executed over a single access point, aiming to cover exactly the range of

that AP. A transmission power control algorithm, described in Section 5.7, is used to map

the desired range to the minimum amount of output power needed by the access point. All

the state needed to approximate signal attenuation inside the service area is established

during system calibration. As the distance between client and AP increases, the quality of

the wireless channel (represented by the signal-to-noise ratio, or SNR) decreases due to the

increased signal attenuation caused by the environment. Clients within the targeted range

experience high SNR levels and low bit error rates, successfully receiving all the nonces and

completing the handshake. The lower the transmission power, the lower the SNR outside

the building, and therefore the lower the chances of unauthorized access.

Three other techniques are employed to limit authentication range. First, nonce mes-

sages are transmitted by access points without checksums or CRCs, therefore providing no

additional information about the payload and preventing attacks based on local exhaustive

search. Second, nonce messages are not retransmitted in order to prevent an undesired

increase in authentication range. Finally, a server can optionally use other access points to

transmit bogus packets during a handshake in order to decrease the chances of authentica-

tion for clients located outside the service area. This mechanism, called selective jamming,

is described in Section 5.9.

Merged with nonce and proof messages is a standard Diffie-Hellman (DH) key exchange

that provides key material that is used to establish a secure session for each client. Several

session keys are generated: one is used by the client to securely transmit its nonce reception

proof back to the server, while other two keys are used to protect (authenticate and encrypt)

the packets sent during that session in order to prevent eavesdropping or traffic injection

by unauthorized devices. These keys are established by our protocol, but are then passed

to a lower-level mechanism that is actually responsible for protecting wireless traffic (such

as TKIP and CCMP as defined by the current IEEE 802.11 security standard [7]). For

completeness, secure and well-accepted mechanisms to encrypt and authenticate traffic are

discussed briefly in Section 5.11.

A client does not need to complete another authentication round until an active session

is about to expire. For example, if an installation uses hour-long sessions, a client could

Page 107: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.4. PRINCIPLE OF OPERATION 87

start its reauthentication process 5 minutes before the expiration of its session in order to

prevent periods of disconnection.

5.4 Principle of Operation

Our proposed protocol relies solely on the following two properties of the wireless channel:

P1: Signal strength decreases with distance.

Average signal strength (in Watts) decreases as a power-law function of the distance, the

exact rates depending strongly on the characteristics of each environment. The experiments

presented in Chapter 3 showed that in practice, signal attenuates much faster that predicted

by the free-space model, that predicts degradation as a function of the square of the distance

between transmitter and receiver.

P2: Communication quality is a function of perceived SNR, with performance degrading

sharply in the vicinity of a threshold SNR level.

For a given modulation, performance degrades substantially over a narrow range of SNR,

and one can usually identify a threshold level below which the channel becomes unreliable.

Therefore, a channel providing a negligible bit error rate (BER) by operating close to this

threshold level can become unusable with a drop in signal strength of 5-10 dB. This rapid

performance degradation is the main reason for having multi-rate wireless systems and has

been demonstrated through simulation in the literature [25, 43, 44] and confirmed by our

measurements. For instance, when employing a 802.11a link at 54 Mbps, we show that

packet corruption stays below 1.5% in measurements with 30 dB or more of SNR, while

increasing to over 90% when facing SNR levels below 20 dB. Note that these performance

numbers already include the benefits of the error correction techniques defined in the IEEE

802.11a standard [2].

While threshold values will vary from one data rate to the other, the same behavior

is expected for all data rates. The 802.11a standard, for example, provides 8 different

transmission “modes”, employing 4 different modulation algorithms (BPSK, QPSK, 16-

QAM, and 64-QAM) and coding schemes to provide data rates between 6 and 54 Mbps [2].

Higher data rates are achieved with more complex modulations, which code more bits per

Page 108: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

88 CHAPTER 5. RANGE-BASED AUTHENTICATION

Term Meaning

I number of iterations.Ni random nonce sent during ith iteration.S size of each nonce (bytes).ID round identifier.T minimum delay between rounds.∆t maximum challenge response time.H(M) one-way hash of message M .Ek(M) Encryption of message M with key k.(a||b) denotes concatenation of a and b.MACC client’s MAC address.MACAP AP’s MAC address.α, p, x, y Diffie-Hellman parameters.αx short for αx mod p (Diffie-Hellman).

Table 5.1: Notation used to describe a range-based authentication handshake.

OFDM symbol and demand higher SNR levels. For instance, simulation results presented

by Awoniyi et al. show that similar error rates are achieved by transmitting at 6 Mbps with

a SNR of 10 dB and at 54 Mbps with a much higher SNR of 30 dB [25].

5.5 Authentication Handshake

For the description that follows, we employ the notation shown in Table 5.1. The protocol

handshake makes use of three well-known building blocks: a secure one-way hash function

H expected to provide preimage resistance ([83], page 235), a block cipher E, used by clients

and access points to encrypt reception proofs, and a Diffie-Hellman key exchange, used to

establish fresh session keys with forward secrecy [83].

Access points can use either broadcast or unicast frames to transmit nonce messages

during an authentication round, each method having its own advantages and disadvantages

depending on the underlying network used. We assume nonces are broadcasted when we

describe the authentication handshake and discuss the impact of using unicast frames in

Section 5.6.

Access Point Selection

The client initiates a protocol round by sending a broadcast request message, which contains

no vital information and is used for the sole purpose of notifying the server about its intent.

(The protocol handshake is shown in Figure 5.2.)

Page 109: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.5. AUTHENTICATION HANDSHAKE 89

Client AP/WA

“request”-

ID, I, 1, N1�

ID, I, 2, N2�

...ID, I, I, NI , α

y�

MACC , ID, αx, Ek(H(N1||...||NI ||MACC ||αx||αy))

-

MACAP , ID, Ek(H(N1||...||NI ||MACAP ||αy||αx))

Figure 5.2: Detailed description of an authentication handshake.

The best AP from the stand point of a given client is the one that provides it with the

highest signal strength level. The WA has two main ways to discover the best pairings.

The first alternative is to look at link-level associations. For example, most 802.11 clients

already choose the AP they are able to detect with the highest RSSI. The second choice

is for the WA to estimate the RSSI level at a client relative to each access point based on

measurements performed on the reverse direction. For a packet transmitted by the client,

the access point reporting the highest RSSI is most likely the one providing the best quality

in the reverse channel assuming all APs use the same power level.

If the WA is using broadcast packets to send nonce messages, it can control the rate

at which authentication rounds occur. For example, it can enforce a minimum delay of

T seconds between rounds, either globally or on a per-AP basis. Multiple devices within

range of the access point can authenticate during the same round, so well-behaved clients

are not strongly affected by this procedure. On the other hand, attackers are prevented

from increasing the frequency of rounds as to increase their chances of authentication when

located beyond the targeted range.

With an access point selected, the server schedules the next round and chooses the

number of iterations (I) and the total amount of random data to send. This data is divided

among the I iterations, with S random bytes sent during each one. A round identifier (ID)

is created, being used to identify the messages pertaining to the same handshake.

Page 110: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

90 CHAPTER 5. RANGE-BASED AUTHENTICATION

Nonce Messages

At the scheduled time, the server proceeds with the handshake by performing the first

iteration (second message in Figure 5.2). It sends a message containing the round identifier

ID, the total number of iterations I, as well as the current iteration number and the first

random nonce (N1). When sending this frame, the AP skips the computation of link-layer

checksums or CRCs, in order not to reveal extra information about the payload. The server

continues with the remaining iterations, changing only the iteration counter and the nonce

at each step. Even though an authentication round may have been triggered by a single

client’s request, all clients that are able to correctly receive the broadcasted messages can

proceed with the handshake.

The server prevents link-layer retransmissions when sending nonce messages in order

not to improve the authentication chances for devices beyond the targeted range. In 802.11

networks, this is automatically achieved when nonce messages are sent through broadcast

packets, given that these are neither acknowledged nor retransmitted ([1], page 83).

The access point also has to minimize the probability of frame collisions while transmit-

ting nonce messages. Many collisions could render authentication impractical even for client

in close range due to the hidden-station problem. In a 802.11 network, the access point can

reduce the chance of collisions using a contention-free period, part of the Point Coordination

Function (PCF). Note that the RTS/CTS mechanism cannot be used to reserve the channel

for broadcast frames ([1], p.83).

When sending the nonce message pertaining to the last iteration, the WA sends its

Diffie-Hellman public key (αy mod p). A fresh random secret y is chosen for this round

and discarded after it takes place. This same exponent is used by the server with all the

clients authenticating during the current round. This concept of reusing DH exponents

was introduced by the JFK protocol [21]; it increases performance while still generating

independent session keys, a result of distinct αx values used by different clients.

After receiving the first message, clients wait for all the nonces to be transmitted.

Note that a client that joins the network (or that channel) in the middle of a round can

immediately detect the number of iterations lost by examining the iteration counter. It may

then wait for the next round, explicitly demonstrate its intent to authenticate by sending

its own request message, or simply get back to normal operation (in the case of a client

with a session that is still active). Detecting loss of iterations is important for a client that

scans multiple channels looking for connectivity or in the case where authentication and

Page 111: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.5. AUTHENTICATION HANDSHAKE 91

session data are transmitted over different physical channels. In both cases, clients are able

to reduce their scanning delay.

Authentication and Session Establishment

Clients turn off CRC computation when receiving nonce frames (a simple driver modifica-

tion), and have to decide whether or not to complete the handshake after all nonces are

received. As the AP does not compute checksums, a client can never be sure of whether

all nonces were received correctly. However, a client can guess – with a high probability

of success – by looking at the SNR levels detected when receiving the nonce frames. As

shown in Section 5.12, if the SNR level perceived by the client is above a value SNR? (de-

termined experimentally for each data rate), bit error rates are negligible. In this scenario,

a client has high assurance that all bits were received correctly, and can thus proceed with

the handshake. Accordingly, well-behaved clients abort rounds with messages received with

low SNR levels.

If it decides to complete the handshake, the client chooses a fresh random number x and

computes the corresponding Diffie-Hellman shared secret (αxy mod p). It then computes

a proof that it received the random data by hashing the concatenation of all transmitted

nonces, its MAC address, and both DH public keys. The resulting hash is encrypted using

the block cipher with transient key k generated from the DH shared secret. The encrypted

proof is then sent to the server in a unicast message, along with MACC , ID, and αx.

The proof generated by the client is encrypted in order not to reveal additional infor-

mation to other clients regarding the random numbers. Let M denote the concatenation of

all the nonces. A client in close range receives M without bit errors, being able to complete

the handshake. An adversary outside the SA may be able to receive partial information.

For example, it may gather a value M ′ which differs from M in b bits. If the hash over

M ||MACC ||αx||αy were to to be transmitted unencrypted, an attacker could perform a lo-

cal search starting from M ′||MACC ||αx||αy and stop when a hash value match was found.

In the scenario where clients are allowed to share a single round, an attacker could use

this hash value to forge a response, simply replacing the MAC address and the DH public

key with his own values. Note that given that the hash function is preimage resistant, an

attacker is not able to efficiently compute M given the transmitted hash value.

When an incorrect proof is received, the WA generates an alarm. When too many

alarms are detected for the same authentication round or during a small period of time, the

Page 112: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

92 CHAPTER 5. RANGE-BASED AUTHENTICATION

system may decide, for example, to contact the network administrator. The operator could

even receive an estimated location for the incident given that the WA is provisioned with

a localization server (at least in our architecture). Note that well-behaved clients monitor

their received signal strength during a round and are not expected to generated a high

number of alarms.

Multiple clients may respond to an authentication round, and the server processes each

message separately. First, the server verifies whether ID identifies the current round and

whether the client has responded within the allowed time interval (∆t). The server then

computes the transient key k, decrypts the proof sent by the client and compares it to the

value it computes itself. If the value received is correct, the server sends the client a message

acknowledging a successful round. The WA also uses this last message to send the client

its own proof of the knowledge of the nonces, the duration of the secure session, and other

configuration information (IP address, default gateway, etc).

After the round is complete, each client shares with the WA a set of independent session

keys, used to (temporarily) secure the communications between them. Section 5.11 details

how session keys and the transient key k can be generated from the DH shared secret and

how a secure channel may be implemented.

5.6 Using Unicast Nonce Messages

If nonce messages are transmitted as unicast frames, a different round is executed for each

device seeking authentication. In this case, a 802.11 access point can reduce the probability

of frame collisions by using the RTS/CTS mechanism, part of the Distributed Coordination

Function (DCF). This has two advantages. First, the RTS/CTS mechanisms provides better

protection against collisions caused by hidden nodes than a contention-free period. In dense

802.11 deployments, this reason alone may be sufficient to justify the use of unicast nonce

messages, specially if not enough channels are available to provide proper isolation between

cells. Second, all 802.11-compatible devices have to implement all DCF functions, while the

PCF mechanism is optional [1].

When using unicast frames in a 802.11 deployment, access points have to directly prevent

link-layer retransmissions. For example, this can be achieved by setting the maximum

number of retransmissions to zero ([1], page 78). The access point can change this value

for the duration of the authentication round and revert to the original value after all nonce

Page 113: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.7. TRANSMISSION POWER CONTROL 93

messages have been transmitted.

One disadvantage of using unicast nonce messages is that the server cannot control

the frequency of authentication requests as easily as in the broadcast case. As soon as

the server is willing to start a new round (T seconds after the previous one), an attacker

can jump ahead of well-behaved clients and request authentication, having the next round

directed at him. By doing that continuously, other clients could starve and not be properly

authenticated. Therefore, this mechanism should be turned off when unicast messages are

used unless the network is able to detect when many authentication requests are being

generated by the same device, even if it changes its MAC address over time. We describe

one such mechanism in Chapter 6.

5.7 Transmission Power Control

The objective of power control is to use the minimum transmission power level that provides

clients within the targeted range with a SNR level high enough to successfully complete the

handshake. For a round executed through APi, the power control algorithm needs two

inputs: SNR? and the range Ri. SNR? represents the minimum SNR level that provides

clients with a high probability of receiving all random nonces without bit errors, with a

different value for each data rate. From the definition of the service area and the placement

of access points, the system defines the range for each AP as to maximize coverage.

The signal-to-noise ratio experienced by a wireless receiver is the difference in power

between the intended signal and the noise in the communication channel. The expected

SNR d meters from the transmitter can be predicted through the following equation:

SNR(d) = Pr(d)−N

SNR(d) = Pt + Gr − Ploss(d)−N (5.1)

where SNR is expressed in dB, Pt represents the power used by the AP (in dBm), Gr the

receiver antenna gain (in dBi), Ploss(d) the path loss d meters from the AP, and N the sum

of both noise and interference (also in dBm) [91]. In Equation 5.1, we assume access points

(the transmitters) have antennas with zero gain.

Page 114: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

94 CHAPTER 5. RANGE-BASED AUTHENTICATION

From Equation 5.1, we can estimate the power needed to provide clients within R meters

with a minimum signal-to-noise ratio of SNR? dB:

Pt = SNR? −Gr + Ploss(R) + N + η (5.2)

where η is an increment (in dB) used as a safety margin and derived from how aggressive

the network security policy is. In close proximity, signal attenuation tends to be lower

than predicted by path loss models, so using η = 0 dB should work for most installations

(supported by our measurements). Given that our current reference client is a standard

PCMCIA card, we can use Gr = 0 dBi in Equation 5.2.

The path loss estimate for the targeted range is found using the model computed during

calibration, while the noise level (N) can be measured by access points during operation,

as wireless cards usually provide a noise estimate for each packet received. The minimum

noise perceived by a receiver is a function of the bandwidth used (20 MHz for a 802.11a

channel), the environment temperature, and the noise figure – the exact equation can be

found in [91]. For instance, taking ambient temperature to be 290 Kelvin (approx. 63 ◦F),

the minimum noise evaluates to N = −96 dBm, which will be used in this work as the noise

level when no interferer is in range.

Off-the-shelf IEEE 802.11 access points provide a set of discrete values for transmission

power, preventing the WA from using the exact value found using Eqn. 5.2. In this case,

the WA uses the lower power level which still satisfies the SNR requirement. For instance,

one 802.11b-compatible access point provides 7 distinct power levels: 2, 5, 8, 11, 15, 17, and

20 dBm [12]. For example, suppose clients within 15 meters (R = 15m) are to be provided

with an SNR above 30 dB (SNR? = 30 dB for the 802.11a 54 Mbps mode). If α = 3.0 and

N = −96 dBm, an AP would need to use a transmission power of at least 16 dBm, so 17 dBm

would be used with the given AP.

5.8 Handshake Parameters

During an authentication round, the server should send enough random data to make im-

practical for outsiders to receive all packets correctly (due to bit errors) while allowing

clients in close range to authenticate successfully with high probability. There is a trade-

off between the amount of random data and authentication delay, given the increase in

Page 115: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.8. HANDSHAKE PARAMETERS 95

the number of iterations. We found a good compromise using 40 Kbytes of random data

transmitted over 20 iterations (I = 20, S = 2000 bytes), as we show in Section 5.12.

The server also chooses one of the available modes to transmit the nonce messages. In

the IEEE 802.11a standard, for example, a transmission mode defines the combination of

modulation and coding scheme to be used, with proper information placed in the PLCP

header for decoding purposes [2]. The receiver has no choice but to demodulate the nonce

message according to the mode selected by the server. Note that the selection of modulation

exposes a trade-off between performance and power, as modulations providing higher data

rates require higher SNR levels for a target bit-error rate, consequently increasing transmis-

sion power demands. For our evaluation we adopt the 54 Mbps mode, which can be used

with off-the-shelf access points to cover the short ranges (< 10 meters) of our deployment.

The server imposes a maximum delay of ∆t seconds for a client to complete a handshake

after the last nonce message is transmitted. The chosen value should allow clients to perform

a Diffie-Hellman exponentiation, calculate the transient key k and the corresponding proof,

and respond to the challenge. A value between 1 and 5 seconds should suffice for most

installations, allowing enough clients to respond while still limiting the time for attackers

to deal with bit errors. For instance, assuming clients take 300 milliseconds to generate the

response message (supported by measurements in Section 5.12), 2000-byte response frames,

6 Mbps data rate for both data and ACK frames, and no collisions, theoretically 1 second

is enough time for 200 clients to authenticate (already accounting for inter-frame spacing

and propagation delay). Packet collisions and concurrent traffic would lower this estimate,

while clients that are able to use faster data rates would increase this number.

Finally, the system can control the frequency of authentication rounds by controlling

the value of T (minimum delay between rounds). This lower bound makes attackers unable

to increase the rate with which new rounds occur, which would increase the probability of

system compromise within a given amount of time. The system can use values of T in the

order of tens of seconds (e.g. 30 seconds) without severely affecting well-behaved clients.

Clients joining the network will wait an average of T/2 for a round to start, but active

clients can reauthenticate before their current sessions expire. This mechanism is akin to

how system evolution is controlled in the LOCKSS system [81].

Page 116: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

96 CHAPTER 5. RANGE-BASED AUTHENTICATION

5.9 Selective Jamming

Selective jamming is an optional mechanism that can be used by the network to further

improve security guarantees compared to using a standalone handshake. The objective of

this mechanism is to make it harder for devices beyond the intended authentication range

to receive all nonce messages successfully. If directed selectively towards devices outside the

service area, we show that this jamming mechanism improves security substantially.

When selective jamming is enabled, the WA schedules bogus transmissions to take place

over other access points – called jammers – while an authentication handshake is taking

place. Jammers transmit simultaneously with the access point performing the authentica-

tion handshake. They start their transmissions immediately before the handshake starts

– the WA can send them a command either wirelessly or over the wired infrastructure –

and continue until all the nonce messages have been sent. In terms of packet contents,

our measures (presented in Section 5.12.8) demonstrate that 802.11 frames with random

payloads achieve the desired result.

With proper placement of jammers, this mechanism works because devices located out-

side the service area detect these bogus transmissions with signal strength levels higher than

those seen for nonce messages. This capture effect, also called the near-far problem, is inher-

ent of multiple-access wireless systems: a stronger transmitter captures the receiver, making

unfeasible the detection of weaker signals [91]. Even when such a secondary transmission

does not capture the receiver, it still increases the noise level, thus decreasing SNR and com-

munication quality. Cellular systems, for example, avoid similar problems by performing

transmission power control, proper channel allocation, and by using sectorized antennas.

During an authentication handshake, the receiver used by an attacker may be captured by

a stronger, bogus transmission performed by a jammer, reducing authentication chances.

The main challenge regarding this mechanism is that devices located within range of

the access point performing the authentication handshake must not be affected by the jam-

mers. Such collateral damage could render authentication impossible, as our measurements

demonstrate. To achieve such isolation, jammers have to be properly placed and may have

to use directional antennas. For example, in the case of a service area defined by the

boundaries of an office building, jammers could be placed outside, farther from the clients

targeted by the network and closer to external areas. In this case, jammers provided with

directional antennas could even be placed close to the external walls, with their main lobes

Page 117: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.10. MINIMIZING INTERFERENCE 97

pointed away from the SA. For example, small 8-dBi directional antennas with horizontal

beamwidths larger than 70◦ could be used in these scenarios [16].

5.10 Minimizing Interference

As in any other wireless deployment, it is important to minimize interference in the net-

work. With range-based authentication, it is specially important for the WA to minimize

interference while nonce messages are being transmitted as part of an authentication round

given the low power levels used and the lack of frame retransmission. This is performed in

two steps.

First, the WA is responsible for assigning channels to all active access points – those

serving active clients as well as those handling authentication traffic – in order to minimize

co-channel interference. In networks with enough channels, standard channel allocation

techniques seem sufficient to prevent harmful interference. For instance, 802.11 networks

operating at both 2.4 GHz and 5.4 GHz bands have at least 11 non-overlapping channels,

enough to provide an office building with dense coverage without severe interference levels

given that each AP covers around 40-50 meters. Additionally, the WA could reserve one

channel solely for authentication purposes, therefore isolating authentication traffic from

active data sessions. This would allow for negligible interference, as the WA controls au-

thentication rounds across all the access points.

When fewer channels are available, minimizing interference is a harder task. If the

underlying network provides the WA with a reliable channel reservation mechanism, the

WA can temporarily prevent communication in all cells operating at the same channel than

the AP performing the handshake. It is unclear whether this can be achieved in 802.11

networks given the mechanisms provided by the standard. If this is not possible, one option

would be to decrease the density of access points, therefore increasing the authentication

range used by each AP and decreasing the security guarantees provided by our mechanism.

The second step is to minimize the interference between APs and clients contending for

the same channel during the transmission of nonce messages. As already discussed, in IEEE

802.11 networks this can be achieved using contention-free periods (when using broadcast

frames) or the RTS/CTS mechanism (when using unicast frames).

Page 118: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

98 CHAPTER 5. RANGE-BASED AUTHENTICATION

5.11 Secure Session Implementation

Three building blocks are used during the protocol handshake: a cryptographic hash func-

tion, a block cipher, and a Diffie-Hellman key exchange. One could currently achieve ade-

quate security by using SHA-1 as hash function, AES as block cipher (with 128-bit keys),

and a 1536-bit group for the DH exchange [72, 78], upgrading these sizes as it becomes

necessary. For our measurements, described in detail in Section 5.12.7, we use one of the

DH groups defined for the IKE protocol [72]. To generate the session keys from the DH

secret – also a standard operation – we currently use one of the pseudo-random functions

defined by IKEv2 [68].

5.12 Evaluation

In this section we present measurements that demonstrate the effectiveness of our mecha-

nism. We first show that bit error rates increase as SNR levels decrease, property that allows

our protocol to control the range of each access point. We then demonstrate that clients

within the intended range authenticate successfully with high probability while attackers

outside the SA need additional antenna gain to complete an authentication handshake.

5.12.1 Channel Quality vs. SNR

We show that signal quality is a function of SNR using measurements performed with

off-the-shelf IEEE 802.11a hardware running at 54 Mbps. We show that channel quality,

represented by the occurrence of bit errors, degrades rapidly as the SNR decreases. Specifi-

cally, we show that for a given 802.11 mode, when SNR values are above a threshold SNR?,

clients consistently experience negligible bit error rates. Similarly, our results demonstrate

that whenever SNR goes 10 dB below SNR?, receivers consistently experience unbearable

BER levels, making communication almost impractical. This narrow SNR gap helps our

protocol define boundaries for wireless coverage.

For the measurements presented we used two laptop computers equipped with 802.11a

cards with Atheros chipsets AR5000 and AR5002X, the first used as transmitter and the

second as receiver. Across all measurement rounds, the receiver was placed in 2 different

locations (inside an office and a conference room), while the location of the transmitter was

varied for each of the 73 rounds. All locations were inside the Gates 4A wing, with both

Page 119: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 99

0

100

200

300

400

500

10 15 20 25 30 35 40 45 50 55

Fram

es re

ceive

d

Average SNR (dB)

Figure 5.3: Frames received during each round as a function of average SNR.

transmitter and receiver kept stationary during the experiments.

Each of the 73 measurement rounds consisted of 500 2000-byte raw 802.11 frames con-

taining random payloads and transmitted with an inter-frame delay of 100 milliseconds. For

each round, the payload was created by seeding the MT19937 pseudo-random number gen-

erator (as implemented by the GSL library) with a different value. To avoid synchronization

issues, the same payload was used for all frames transmitted during the same round. All

rounds were executed over the same channel, with the default transmission power, using

the 54 Mbps mode, and with the receiver in promiscuous mode and ignoring CRC checks.

Using a modified Linux device driver, we logged for every received frame the data rate

used, the sequence number, the detected SNR level, as well as the frame payload. We then

applied a consistency check, removing from the dataset all frames labeled with wrong data

rates (a total of 619 frames). We decided to discard them because we were not sure the

card used the right mode during decoding, which would affect our error statistics.

The probability that a frame is received – even if we disregard bit errors – is a function of

the perceived SNR level: the higher the SNR, the better the chances of reception. Figure 5.3

shows the number of frames received (even the ones with bit errors) during each round, as a

function of the average SNR during the round. Note that for rounds with high average SNR

levels (> 25 dB), virtually all frames were received. However, all rounds with average SNR

levels under 17 dB produced less than 150 frames out of the 500 frames transmitted, i.e.

over 70% of frames were not even received. Two rounds with low average SNR produced

no frames and are not even shown in the figure.

Page 120: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

100 CHAPTER 5. RANGE-BASED AUTHENTICATION

0

20

40

60

80

100

10 15 20 25 30 35 40 45 50 55

Corru

pted

fram

es (%

)

SNR (dB)

Figure 5.4: Percentage of corrupted frames as a function of SNR level.

Figure 5.4 shows that a 10 dB drop in SNR transforms a perfect channel into one with

almost 100% of packet corruption. The figure plots the percentage of corrupted frames –

we labeled all frames with at least 1 bit errors as corrupted – as a function of the measured

SNR level. Instead of calculating per-round SNR averages, for this graph we aggregated

all frames received with the same SNR, across all 73 rounds. As we expected, the receiver

experiences negligible frame corruption when SNR≥30 dB. As the SNR decreases below this

threshold, frame corruption increases rapidly, with corruption rates close to 100% when

SNR<20 dB. While these two threshold values (30 and 20 dB) are specific to the 54 Mbps

mode, this behavior is characteristic of all other data rates [25, 44].

Finally, Figure 5.5 shows that the number of bit errors per frame increases rapidly when

the SNR decreases from around 30 to 15 dB. The figure presents the number of bit errors per

frame as a function of SNR. Each point represents a frame, with the corresponding number

of bit errors given by the left y-axis. The right y-axis shows the total number of frames in

the dataset for each SNR level (represented by the dotted curve). While high SNR levels

create consistently reliable channels, up to 5000 bit errors per frame are seen in the range

15-20 dB. Due to these error rates, in this range a receiver will have negligible chances of

successfully completing a handshake, as seen in the next section.

Put together, these measurements demonstrate our first result:

R1: For the IEEE 802.11a 54 Mbps mode, SNR?=30 dB, with performance degrading sub-

stantially 10 dB below this level.

Page 121: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 101

0

1000

2000

3000

4000

5000

6000

10 15 20 25 30 35 40 45 50 55 0 200 400 600 800 1000 1200 1400 1600 1800 2000

Bit e

rrors

per

fram

e

Num

ber o

f fra

mes

SNR (dB)

Figure 5.5: Bit errors per frame (left y-axis) and total number of frames (right y-axis)relative to measured SNR levels.

5.12.2 Authentication at Close Range

In this section we evaluate the chances of successful authentication for a client within range

of an access point. In this case, a failed handshake can be seen as a false negative.

Theory

Using the 54 Mbps mode during authentication, what is the probability a receiver would

complete a handshake with I iterations for different values of SNR? Let perr denote the

probability of receiving a single error frame. Using the results presented in Figure 5.4,

perr equals 0.0142, 0.0576, and 0.1247 with SNR levels of 30, 28, and 25dB, respectively.

Assuming uniformly distributed frame losses, the probability of successfully completing an

authentication round can be estimated by:

pauth = (1− perr)I . (5.3)

With 20 iterations and according to Equation 5.3, a client completes the handshake with

probabilities 0.75, 0.31, and 0.07 when the SNR equals 30, 28, and 25 dB, respectively.

At close range, clients face a small probability of successive authentication failures. For

I = 20 and using the values just found for pauth, a client provided with SNR = 30 dB

consecutively fails two and three authentication rounds with probabilities 0.062 and 0.015,

Page 122: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

102 CHAPTER 5. RANGE-BASED AUTHENTICATION

12

3

4

56

78

9 10 11 1214

151617

18 19

30dB

25dB

13

20 21

Figure 5.6: Locations sampled during authentication experiments.

respectively. At SNR = 28 dB, these numbers increase to 0.48 and 0.34, which shows that

despite a decrease in performance, clients close to the maximum range may still be able to

authenticate when facing mild RSSI oscillations.

These results demonstrate that for the 54 Mbps mode, the WA can be configured to use

I = 20 and SNR? = 30 dB, i.e. configure the APs to use enough power as to provide clients

with an average SNR of 30dB at the desired range.

Practice

We performed additional measurements to show that with the transmission power control

of Section 5.7, clients within the targeted range do achieve SNR levels above SNR? and

authenticate successfully.

As shown in Figure 5.6, we placed the transmitter (shown as a triangle) inside an office

and moved the receiver across 21 other locations, always with the same orientation (facing

the upper wall in the figure). At each location, 1000 2000-byte frames were transmitted at

54 Mbps in order to emulate 50 consecutive handshakes (I = 20, S = 2000 bytes). Given

the path loss model found for our building during calibration (α = 3.65) and the power

Page 123: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 103

# SNR Rounds # SNR Rounds

1 ? 50.4 dB 42 (84%) 12 ? 30.6 dB 49 (98%)

2 ? 48.4 dB 37 (74%) 13 27.1 dB 16 (32%)

3 ? 39.4 dB 44 (88%) 14 ? 37.9 dB 45 (90%)

4 ? 39.6 dB 38 (76%) 15 39.3 dB 47 (94%)

5 ? 48.2 dB 44 (88%) 16 29.0 dB 47 (94%)

6 ? 43.0 dB 42 (84%) 17 26.7 dB 18 (36%)

7 ? 38.8 dB 45 (90%) 18 26.8 dB 18 (36%)

8 ? 41.7 dB 42 (84%) 19 17.9 dB 0 ( 0%)

9 ? 42.3 dB 47 (94%) 20 21.3 dB 0 ( 0%)

10 ? 34.6 dB 37 (74%) 21 16.4 dB 0 ( 0%)

11 ? 30.9 dB 37 (74%)

Table 5.2: Authentication statistics for each location sampled.

used by our transmitter (15 dBm), Equation 5.2 yields a range of 8.5 meters (R = 8.5 m) for

the 54 Mbps mode (SNR?=30 dB). The same calculation predicts that clients within 11.7

meters from the AP are provided with SNR levels above 25 dB.

The results of our measurements (shown in Table 5.2), agree with our theoretical analy-

sis. The table presents, for each location shown in Figure 5.6, the average SNR level and the

percentage of rounds completed successfully. (All locations within range are marked with

a star). First, the results confirm that all clients located within the authentication range

experience SNR levels above 30 dB. In fact, 9 of the 13 locations within range perceived

average SNR levels above 38 dB, an 8 dB safety margin which would allow for further signal

oscillation. Second, all locations in range were able to complete at least 74% (37 out of

50) of the authentication handshakes, which agrees with the value found in our theoretical

analysis (pauth = 0.75).

We find these results promising for a couple of reasons. First, our transmitter used

a standard PCMCIA card with an internal antenna, which produces a more directional

pattern then the external antennas found in off-the-shelf access points. Second, in over-

provisioned LANs clients should be in range of multiple APs, so even a sudden drop in SNR

relative to one AP would not prevent a client from authenticating successfully.

R2: Using the transmission power control algorithm of Section 5.7, clients in close range

authenticate successfully, with a low probability of two consecutive failures.

Page 124: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

104 CHAPTER 5. RANGE-BASED AUTHENTICATION

5.12.3 Handling False Negatives

A network operator has several choices to improve quality of service in locations within

the service area that generate high rates of false negatives. For example, locations close to

the boundaries of the SA tend to be within range of fewer access points and are therefore

expected to generate more false negatives than locations covered by more APs. In some

situations – for example a user unable to authenticate when working at his office – forcing

the user to get closer to the access point to improve his SNR is not a satisfactory alternative.

The first option for the network administrator is to manually increase the transmission

power for the closest access point. Depending on where the AP is located and the immediate

surroundings, attenuation may indeed be higher than predicted by the path loss model

(which is calculated throughout the whole SA). An increase in power will always increase

coverage beyond the SA’s boundaries, but whether that decreases overall security depends

on the range of the given access point and how that value compares to the ranges used by

the other APs. (We assume an attacker will always use the AP providing him with the

highest SNR level.)

To avoid increasing the range of one AP significantly – we showed that the higher the

range value, the lower the amount of amplification needed by an attacker outside the building

– an administrator can install an additional access point close to (or at) the problematic

location. In the office scenario, an AP could be installed inside the office, with an even

shorter range (< 5 meters) and therefore minimal transmission power. The use of such a

short link considerably reduces the probability of false negatives without necessarily making

it easier for attackers to access the network.

Another alternative is for the administrator to change the wireless device used by the

user. Independently of the hardware used to set the reference client, there is always the

chance that a user is provided with a device with inferior quality. For example, some

PCMCIA cards are known to have badly designed antennas which severely affect their

performance.

5.12.4 Attacker Strategy

We now evaluate the resources needed by an attacker to successfully complete an authenti-

cation round when located outside the service area, i.e., his chances of bypassing the system

and generating a false positive.

Page 125: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 105

Increasing antenna gain is the most cost-effective way for an attacker to improve SNR

outside the building. Any receiver is associated with a noise figure of F dB, a function

of the noise created in circuitry in the receiver stages [32, 91]. Amplifiers at the receiver

always amplify both signal and noise, so the output SNR is always F dB lower than the level

detected at the antenna. While amplifiers can be used to reduce the noise figure associated

with the overall system, current receivers already provide noise figures of 6-8 dB, leaving

little room for improvement.

Antennas are passive devices, so an increase in gain is possible by making them more

directional, which is achieved using smaller angles of radiation (or beamwidth) and larger

apertures (related to physical area) [32]. For specific antenna designs, one can find ap-

proximations for beamwidth and gain as a function of the antenna physical dimensions.

For instance, at 2.4 GHz a parabolic dish antenna with diameter of 1 meter (40 inches)

can provide up to 26 dBi of gain with an 8.7◦ beamwidth [32]. As real examples, the

802.11-compatible HyperLink HG2424G parabolic antenna provides 24 dBi of gain with a

8◦ beamwidth while measuring 40 inches and weighing 8 lbs [15]. The 19-dBi HyperLink

HG2419G has a 12◦ horizontal beamwidth while measuring over 23 inches and weighing

over 5 lbs [10].

An attacker outside the building needs to increase his perceived SNR in order to au-

thenticate successfully without generating a suspicious number of alarms. Nonce messages

do not contain checksums, so an attacker (as any other receiver) has to rely on the detected

SNR level when deciding whether to complete a handshake. For example, if provided with

a SNR of 20 dB an attacker could use an antenna with 10 dBi of gain to achieve 30 dB and

properly receive nonce messages sent at 54 Mbps.

As high-gain antennas are both larger and more expensive, the best strategy for an

attacker is to find the smallest antenna (lower gain) he can get away with. This would

allow him to bypass security without being easily spotted or generating a risky number of

alarms, as an alarm is raised for each incorrect response. Let SNRAtt denote the SNR level

targeted by the intruder in his effort to complete a handshake executed using the 54 Mbps

mode. We know that if he minimizes his gain, then SNRAtt ≤ SNR? = 30 dB.

The higher the SNR level, the lower the number of alarms generated by the attacker. Let

A denote the number of alarms generated and pauth denote the probability of successfully

completing an authentication round (as of Section 5.12.2). Assuming an attacker stops

after a successful round, the number of alarms follows a geometric distribution [99], with n

Page 126: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

106 CHAPTER 5. RANGE-BASED AUTHENTICATION

alarms happening with probability

pauth × (1− pauth)n, (5.4)

and the expected number of alarms given by

E[A] = (1/pauth)− 1. (5.5)

With 20 rounds (I = 20), E[A] equals 0.33, 2.27, and 13.35 for respectively 30 dB, 28 dB,

and 25dB of SNR. Given that an attacker is unlikely to want to generate 13 successive alarms,

we can conservatively assume that SNRAtt > 25 dB. Consequently, for an authentication

round executed using the 54 Mbps mode, an intelligent attacker would strive to achieve

25 < SNRAtt ≤ 30.

5.12.5 Attack Resource Demands

Given our building and assuming the placement of access points shown in Figure 5.1, how

much gain would an attacker need outside the building? The area shown measures approx-

imately 48m×24m and the 8 access points provide a density of roughly one AP per 144 m2

(1550 s.f.). As shown in the figure, in this configuration 4 access points use a 8.5-meter

range (R = 8.5 m) while the other 4 would use R = 6 meters in order to cover the floor.

Given the path loss model found inside our building (α = 3.65), our power control algorithm

yields the values 10 dBm (R = 6 m) and 15 dBm (R = 8.5 m). The results shown in this

section assume the use of the 802.11a 54 Mbps mode, with SNR? = 30 dB.

Figures 5.7 and 5.8 plot the expected SNR values outside our building given the signal

attenuation rate found in our outdoor measurements (αout = 3.32), the access point place-

ment shown in Figure 5.1, and the power levels just calculated (10 and 15 dBm). Figure 5.7

shows the maximum SNR available for each location taking all 8 access points into account

and assuming no antenna gain. Figure 5.8 presents the same data from a different perspec-

tive, with SNR outside the SA shown as a function of the distance between attacker and

external wall (dA). Two curves are shown, presenting the SNR levels relative to the access

points using authentication ranges of 8.5 and 6 meters. It is interesting to note that, despite

being closer to the wall, the AP configured with a 6-meter range provides lower SNR levels

Page 127: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 107

40 20 0-20-40

40

20

0

-20

-40

SA

ss s

sss s

s

SNR (dB) 20 15 10 5

Figure 5.7: Expected SNR outside the building. The rectangle represents our service area,while access points are shown as triangles. The axes show coordinates in meters, while thecurves show the SNR at each location.

outside the building, given the lower power used and the logarithmic relationship between

SNR and distance.

An attacker provided with at most 10 dBi of antenna gain – which can be realized

without resorting to large directional antennas – has to be physically located at most 15

meters (50 feet) from the service area in order to have any chances of authenticating success-

fully. Figure 5.8 shows that after 15 meters from the service area, the predicted SNR level

(without amplification) is inferior to 15 dB. From that location, an attacker with 10 dBi of

antenna gain is able to increase the predicted SNR to 25 dB. To increase the total SNR to

30 dB and avoid an unusual number of alarms, the attacker has to be less than 10 meters

from the wall, where the unamplified SNR level is closed to 20 dB. Getting that close to the

SA may pose high risks of exposure, especially if any physical security measures such as

cameras or fences are deployed. Even in a cafeteria, getting that close to the infrastructure

would probably put the intruder within sight, increasing the chances of attack detection.

What if an attacker employs high-gain, directional antennas? The extra gain provides

him with approximately 20 meters of additional separation from the SA. After that, the

amount of amplification needed is impractical. With 20 dBi of gain, the perceived SNR

Page 128: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

108 CHAPTER 5. RANGE-BASED AUTHENTICATION

50

40

30

20 15 10 5

60 50 40 30 20 10 0

SNR

(dB)

attacker distance (m)

outside building

wall

R=8.5mR=6m

Figure 5.8: Predicted SNR for an attacker outside the building as a function of his distanceto the external wall (dA).

needs to be above 5 dB for a total SNR of 25 dB. Outside our building, the average SNR is

above 5 dB approximately within 35 meters from the external wall. To achieve a total SNR

of 30 dB with the same amount of gain, an attacker needs to be less than 25 meters from

the wall.

These results demonstrate that independently of the approach preferred by an attacker,

our protocol considerably increases wireless security compared to other solutions that incur

low management overhead. An attacker that opts for a device that is easier to conceal is

forced to be physically close to the service area and therefore more exposed to physical

security measures. If he attempts to authenticate from a “safer” location – farther from the

infrastructure – he is required to use high-gain antennas. As these devices are large (20-40

inches), heavy (5-12 lbs), and quite directional (beamwidth < 12◦), such attempts are not

only much harder to implement but also much easier to detect through standard physical

security measures (e.g. cameras).

R3: Attackers with low amplification have to be located physically close to the service area

(< 15 m), while impractical amounts of antenna gain are needed when more than

30-35 meters from the SA.

5.12.6 Effective Coverage Reduction

By looking at the results from the previous section from a different angle, it becomes clear

that our mechanism significantly reduces unwanted network coverage. For example, assume

Page 129: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 109

an 802.11b access point inside our building located 10 meters from the external wall and

with an output power of 15 dBm (the same power level used by 4 of the APs in our SA).

Let us assume that signal strength attenuation through the building follows the same path

loss model (αout = 3.32 and WAF = 5 dB) and that the AP is left “open”, i.e. servicing

any client and using any data rate. For the 1 Mbps data rate, most 802.11b cards have

a sensitivity level of approximately -94 dBm. Given the model and the transmission power

used by the AP, the predicted RSSI goes below -94 dBm only when a client is located over 80

meters from the AP (> 70 meters from the building). I.e., even an attacker with no antenna

gain can successfully use an open access point from such large distances. With range-based

authentication, the practical network range is severely reduced, with large antennas already

needed after 30-35 meters from the building.

5.12.7 Session Establishment Overhead

The time elapsed between the first nonce message and the last message in the handshake

is a function of the following terms:

• ∆trans: transmission overhead, incurred by all the frames transmitted during the

handshake;

• ∆DHsnd: time needed to generate DH private and public keys (choose random x,

perform αx mod p);

• ∆DHrcv: time needed to generate the DH shared secret (from αx mod p and y, perform

αxy mod p);

• ∆k: time used for key generation (computation of transient key k and session keys

from the shared secret);

• ∆proof : time spent on proof computation (hashing plus encryption).

We used four Linux machines with distinct processors to estimate the overhead incurred

by each of these terms. Details about the hardware used and the results of our measurements

are presented in Table 5.3. The two machines provided with slower processors (C1, C2) were

used to estimate lower bounds for client performance. The two faster machines (S1, S2) were

used to estimate the performance of the server. All cryptographic operations were measured

using OpenSSL v.0.9.7 under Linux.

Page 130: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

110 CHAPTER 5. RANGE-BASED AUTHENTICATION

Machine ∆DHsnd ∆DHrcv ∆k ∆proof

C1: Pentium III 733 MHz 19.6 (19.6) ms 24.6 (25.0) ms 75 (76) µs 653 (665) µs

C2: Pentium III 933 MHz 17.3 (20.0) ms 22.0 (25.0) ms 74 (76) µs 540 (624) µs

S1: Pentium 4 1.7 GHz 16.0 (16.0) ms 20.1 (20.4) ms 39 (44) µs 261 (276) µs

S2: Pentium 4 3.2 GHz 8.0 (8.1) ms 10.0 (10.1) ms 19 (19) µs 128 (138) µs

Table 5.3: Performance measurements for the main operations in a handshake using 4distinct machines.

Transmission overhead (∆trans) is in the order of tens of milliseconds. Each 802.11

transmission has to wait up to 50 µs to minimize the probability of collisions and include a

preamble (16 µs) and a signal field (4 µs), the latter always transmitted at 6 Mbps [2]. A

2350-byte frame sent at 24 Mbps takes approximately 855 µs to transmit, already counted

the fixed 70 µs of overhead. (APs and clients should rarely need to use data rates below

24 Mbps, given the short range between them.) With 20 iterations, the total overhead

would stay below 20 ms. This is a reasonable estimate for the scenario where access points

use broadcast packets for nonce messages, as they reserve the channel before transmission.

In the unicast case in a 802.11 network, additional overhead would be incurred by the

RTS/CTS mechanism.

As shown in Table 5.3, Diffie-Hellman operations (∆DHsnd and ∆DHrcv) are orders

of magnitude more expensive than other computations included in the handshake. We

evaluated each operation 200 times, with the median and 90th percentiles shown in the

table (90th percentiles shown in parentheses). While it takes the slowest client (C1) less

than 700 microseconds to hash 40 Kbytes of nonces and DH public exponents, almost 20

milliseconds are spent on a single DH exponentiation. Even at the fastest server, calculating

the DH public key and shared secret consume respectively 8 and 10 milliseconds.

We generated 128-bit session keys using the 2048-bit Diffie-Hellman group used by

IKE [72] and 256-bit exponents (minimum recommended size [72]). From the DH shared

secret, we estimated ∆k by generating 480 bits of key material using the PRF prf+ (also

defined by IKE [68]) with HMAC-SHA1 as the underlying function. At the fastest client

and server, ∆k takes an average of 74 and 19 microseconds, respectively. From these 480

bits, we get k (128 bits) and the encryption and authentication keys to be used during

the established session (128 bits each). Finally, we used SHA-1 and AES in ECB mode to

calculate the nonce reception proof. Again at the fastest client and server, ∆proof takes

Page 131: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 111

an average of 540 and 128 microseconds, respectively.

Under low loads, clients rarely take more than 150 milliseconds to finish an authen-

tication handshake. From the client’s perspective, we can estimate the average duration

of a handshake by adding ∆trans to the DH-related overheads at both client and server.

Following this rationale, it would take the slowest client (C1) an average of 100 milliseconds

to complete the handshake with the slowest server (S1). This value decreases to less than

80 ms when pairing the fastest client with the fastest server (C2 − S2). These figures show

that 150 milliseconds can be safely used as safe estimate for authentication delay.

Our results suggest that a server can process tens of requests per second in software.

The WA authorizes a client after a successful verification of the nonce proof, the cost of

this operation being dominated by ∆DHrcv. Based on our measurements, S1 (respectively

S2) would be able to process a maximum of 62 (125) such requests per second. These

numbers seem more than necessary for most environments. While these values may seem

low, these servers provide enough performance for three main reasons. First, most instal-

lations would probably not have 20 new clients within a confined area (remember the SNR

requirements) requesting authentication simultaneously. By randomizing the duration of

established sessions, the WA can also distribute over time the costs associated with session

renewals, thus preventing active users from creating flash crowds. Second, a client has to

respond within ∆t seconds after the last nonce message. All other requests are dropped

by the server. Finally, another round does not take place before T seconds elapse. Thus,

accepted requests can be buffered and the correspondent handshakes completed before the

next authentication round starts.

R4: A handshake is expected to be completed by most clients with an average delay below

150 milliseconds. Servers should be able to handle upwards of 50 requests per second

in software.

5.12.8 Selective Jamming

We now present measurements that demonstrate the effectiveness of the selective jamming

mechanism. First, we show how communication quality degrades when multiple transmitters

are in the range of a receiver (the near-far problem). To be consistent with our deployment

scenario, for these measurements we use three 802.11 devices. Then, we show the effect of

jammers if they were to be installed outside the building in our testbed.

Page 132: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

112 CHAPTER 5. RANGE-BASED AUTHENTICATION

For these measurements we want to reproduce the scenario in which a receiver is within

range of two transmitters which cannot hear each other. These conditions are similar to

the ones perceived by an attacker outside the service area that can detect simultaneous

transmissions performed by an access point and a jammer. We used three laptops, all pro-

visioned with Atheros-based 802.11a cards. One laptop acts as the receiver, while the other

two act as transmitters, one transmitting data frames at 54 Mbps (the intended transmit-

ter) and the other at 6 Mbps (the jammer). The intended transmitter sends sequences of

500 2000-byte frames with a fixed payload – one every 100 milliseconds – while the jammer

transmits continuously.

The first measurement had the objective of testing our logging capabilities. We placed

all three laptops in close range to each other and verified that our modified device driver

and our application could indeed log all frames transmitted by both cards. A total of 16,076

frames were logged by the receiver, 500 of them sent by the transmitter and the remaining

transmitted by the jammer (logged with proper sequence numbers). Only 3 frames out of

all transmitted had bit errors, 2 of which were sent by the intended transmitter at 54 Mbps.

In order to make both transmitters act simultaneously to simulate a jamming scenario,

we had to force them to bypass the CSMA/CA algorithm implemented by the 802.11 stan-

dard. Not doing so would decrease the jamming effects, as the cards would back-off con-

stantly to avoid collisions. Unable to configure this behavior through the device driver, we

physically placed the three laptops in a way that the two transmitters could barely hear

each other (the hidden-station scenario). The receiver was placed at the intersection of two

corridors, each housing one transmitter. The transmitter and the jammer could be heard

by the receiver with approximately 33 dB and 36 dB of SNR, respectively.

With this configuration and in the absence of the jammer, the receiver has a high-

quality communication channel with the intended transmitter. As expected by the high

SNR (average of 33 dB), in this scenario only 2 out of the 500 frames transmitted were

received in error (0.4% frame loss).

However, when the transmitter and the jammer are active simultaneously, the error rates

perceived by the receiver are two orders of magnitude higher. We performed 5 measurement

runs in the hidden-station scenario, with the results illustrated in Figure 5.9. Each of

the 5 rows in the figure presents the statistics for the 500 frames sent by the intended

transmitter during that measurement run. A full vertical tick indicates that the frame with

that sequence number was received correctly, with no bit errors. A half-tick represents an

Page 133: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.12. EVALUATION 113

0 100 200 300 400 500Sequence number

Ê Ë

Ì

Figure 5.9: Jamming experiments. Each row in the figure represents a measurement round.A full tick represents a frame received successfully, while a half-tick represents a frame withbit errors. Frames not captured by the receiver are not shown.

error frame, i.e. a frame actually received but containing flipped bits in its payload. The

absence of ticks represents frames not captured by the receiver. For the first run (bottom

of the figure), 351 frames were received, 76.4% of them in error. For the other runs, the

numbers were respectively 329/79.3%, 340/75.9%, 285/74.7%, and 383/54.8%. Note that

these percentage values do not include frames not captured by the receiver, so frame loss

rates are even higher.

These results show that jamming substantially degrades communication quality, in-

creasing a negligible frame loss rate to at least 54%. They show that with two simultaneous

transmissions, either the receiver is not able to detect the beginning of the intended trans-

mission (in which case the frame is not received) or it receives corrupted frames given

the extra noise caused by the jammer. With all laptops stationary and kept at the exact

same locations, frame error rates increased from 0.4% (the scenario without the jammer)

to between 54% and 79% with the introduction of the jammer.

Despite the low average communication quality, we can identify several long runs of

undamaged frames, three of which are labeled in the figure. These long runs were caused

by the fact that our jammer was a normal 802.11a device, still susceptible to back-offs or

other interruptions, fact we could verify by analyzing our log files. While the intended

transmitter waits 100 ms between frame transmissions, the jammer transmits continuously.

As a result, when both devices are transmitting simultaneously, the log file alternates one

frame from the transmitter and several from the jammer. This behavior, however, was not

seen in the three sequences marked in Figure 5.9. For example, sequence 1 consists of 18

correct frames, which were intermingled with only one frame sent by the jammer (verified

Page 134: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

114 CHAPTER 5. RANGE-BASED AUTHENTICATION

50

40

30

20 15 10 5

60 50 40 30 20 10 0

SNR

(dB)

attacker distance (m)

outside building

wall

AP, 15 dBm, R=8.5mjammer, 15 dBm

Figure 5.10: Predicted SNR for access point and jammer outside the building (jammerplaced at the external wall).

by sequence numbers). The same trend was seen for the other two sequences: sequence two

(25 frames) has two long frame sequences without jammer frames (11 and 13 frames) while

the frames in sequence 3 (11 frames) were divided into two bursts also without interference.

Such long runs would not occur were our jammer devices completely bypassing the carrier

sense mechanism.

Given their effectiveness, jammers can be placed outside the service area in order to

reduce the chances of attack. Figure 5.10 shows the expected SNR outside the building as a

function of the distance between the attacker and the external wall, assuming αout = 3.32.

The solid line shows the SNR for an access point (inside the building) located 8.5 meters

from the wall and using a transmission power of 15 dBm. The dotted line shows the SNR for

a jammer located outside the building, mounted at the external wall, and also transmitting

at 15 dBm.

As shown in the figure, outside the building the SNR relative to the jammer is con-

siderably higher than the value provided by the access point. Consequently, an attacker

outside the SA is likely to have his receiver “locked” to the jammer, which severely reduces

his chances of detecting all nonce messages successfully. Moreover, the scenario depicted in

Figure 5.10 is likely optimistic for the attacker, for two main reasons. First, as the jammer

is placed outside, its signals are not as strongly attenuated as the signals sent by an access

point inside the building. Therefore, the attenuation rate (α) relative to the jammer is likely

to be lower than the value used in the figure, which would make the predicted SNR levels

Page 135: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.13. LIMITATIONS 115

for the jammer even higher. Second, jammers use directional antennas in order to avoid

interfering with clients inside the SA. Given that even antennas with beamwidth values

larger than 60◦ provide some gain (> 8 dBi is typical), SNR values for the jammer with be

that much higher in the directions pointed by the main lobe of the jammer’s antenna.

To avoid the interference caused by the jammers, an attacker needs to use a more

directional antenna (higher gain, smaller beamwidth) to capture the AP’s transmissions

and block the jammer. Once again, he becomes more visible by doing this and improves

the chances of attack detection. The more jammers are deployed, the lower the probability

of the attacker finding a suitable location and orientation to implement a successful attack.

R5: Selective jamming substantially degrades the quality of an otherwise perfect channel

and can be used to decrease the chances of authentication outside the service area.

5.13 Limitations

Similarly to the scenario described for our localization system, attackers located in close

proximity to a service area may be able to authenticate successfully with attainable amounts

of amplification. Range-based authentication does make attacks harder to mount and easier

to detect, as it forces most of the amplification required to come from directional antennas.

However, networks may be vulnerable to attacks if an intruder equipped with a 10 dBi

external antenna is allowed to position himself within 10-15 meters from the SA without

raising suspicion. Possible attack locations again include nearby parking lots and adjacent

floors in multi-story buildings.

Our mechanism may also be vulnerable to collusion attacks in which a device is placed

either within or in close proximity to the service area in order to help another device located

farther apart to complete an authentication round successfully. For example, a visitor

escorted into the SA could leave behind a hidden PDA to act as authentication proxy.

When the visitor is located outside the service area – therefore outside the range of all APs

– he can command the PDA to capture nonce messages and forward them to him using a

secret channel (e.g. a non-802.11 frequency). The visitor could then use this information

to complete the round while the proxy would have not performed any transmission in the

monitored frequencies, therefore not exposing itself to intrusion detection systems.

Whether or not this attack can be implemented in a given installation is a function of

the level of physical security deployed, such attack being possible even in wired networks.

Page 136: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

116 CHAPTER 5. RANGE-BASED AUTHENTICATION

In fact, if an attacker is able to walk into the service area, there are probably more effective

attacks he can mount. In the wired setting, the PDA could be connected to a public

Ethernet port in a conference room to act as a rogue access point, again using a hidden

frequency to bridge traffic to and from its master. One difference between the wireless and

wired scenarios is that in the former the proxy can be placed at any location within range

of at least one AP, while in a wired network a successful attack depends on the availability

of a physical port. Additionally, in the wired case, the proxy would be actively forwarding

packets into the network, therefore providing more information about its physical location.

5.14 Summary and Conclusion

In this chapter we have described range-based authentication, a mechanism that forces

clients seeking authentication to act as receivers. We showed that this approach considerably

increases the costs for a device located outside the service area to mount a successful attack,

therefore reducing the probability of unauthorized access to a wireless LAN. Our protocol

explores inherent properties of wireless channels to control the range of each access point

inside a SA and reduce unwanted coverage.

Using measurements in our network testbed, we demonstrated that our protocol intro-

duces minimal management overhead and that clients with off-the-shelf hardware physically

located in the service area authenticate successfully with high probability. We showed that

our transmission power control algorithm uses the results of system calibration to find the

minimum power level needed to cover each access point’s range, with little or no feedback

from network operators. We also showed that clients within range of an AP have a low prob-

ability (< 0.07) of failing two consecutive handshakes. As clients can establish new secure

sessions before their current ones expire, they can be provided with continuous connectivity

even in the face of sporadic authentication failures.

We also showed that attackers located outside the service area are more physically ex-

posed: to successfully complete an authentication round, they have to be either located

close to the external wall or be provided with large directional antennas. With the mea-

surements performed outside our building, we showed that an attacker provided with less

than 10 dBi of antenna gain has to be physically located within 10-15 meters (30-50 ft) from

our building. We also showed that in order to authenticate successfully when located more

than 30-35 meters (100-115 ft) from the building, an attacker is expected to need more

Page 137: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

5.14. SUMMARY AND CONCLUSION 117

than 20 dBi of gain, a considerable amount. For example, 802.11b-compatible antennas

providing such gain levels usually measure over 20 inches. In both scenarios, our protocol

makes physical security measures more effective.

Page 138: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

118 CHAPTER 5. RANGE-BASED AUTHENTICATION

Page 139: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 6

Detecting Identity-Based Attacks

In this chapter we present the design and evaluation of a mechanism that creates reliable

device identifiers – called signalprints – using signal strength measurements. We show that

this mechanisms allows a wireless network to detect as class of denial-of-service attacks

based on identity (MAC address) spoofing.

6.1 Motivation

Even if a malicious device is not allowed to use the network, it can still deny service to

legitimate clients. With location-based security, a device located outside the SA may not

be located accurately or authenticate successfully, being therefore rejected by the network.

However, legitimate clients within its range are vulnerable to denial-of-service (DoS) attacks.

Wireless LANs are yet another scenario for DoS attacks, though with the added complication

that the wireless medium makes it easier for the injection of attack traffic.

Several DoS attacks in wireless LANs are possible because these networks lack reliable

client identifiers before upper-layer authentication mechanisms are evoked and user creden-

tials are securely established. After a client authenticates successfully and session keys are

used to encrypt and authenticate packets sent over wireless links, the network can securely

verify if the source MAC address in a packet is correct. Without this mechanism, however,

wireless installations have to rely solely on MAC addresses for client identification: two

devices in a network using the same address are treated as a single client, even if they

generate conflicting or inconsistent requests.

119

Page 140: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

120 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

As MAC addresses can be easily changed through device drivers, simple yet effective

identity-based attacks can be implemented with off-the-shelf equipment against multiple

link-layer services. IEEE 802.11 networks, for instance, have been shown to be vulnerable

to a class of attacks we refer to as masquerading attacks, in which a malicious device

targets a specific client by spoofing its MAC address or the address of its current access

point. Bellardo and Savage have demonstrated that a 10-second deauthentication attack can

immediately knock a client off the network and possibly incur minute-long outages given the

interaction between 802.11 and TCP [29]. With such tools, a malicious user could render

a WiFi hotspot unusable by targeting all active clients or simply maximize the throughput

achieved by his own laptop by periodically deauthenticating devices using the same access

point as him. These attacks can be currently implemented even if networks deploy recent

security standards such as IEEE 802.11i [7].

Another class of identity-based attacks target resource depletion: an attacker can gen-

erate high rates of requests with random MAC values in order to consume shared resources.

For example, authentication protocols such as TLS (popular with 802.11i/802.1X) demand

milliseconds of processing time, making servers vulnerable to attacks that consume in the

order of 200 Kbps of attack bandwidth [38]. As another example, the attack could target

a DHCP server in a publicly available part of the network and consume all IP addresses

reserved for visitors. A PDA device left behind inside a corporation could act as a “wire-

less grenade”, going off at a programmed time and flooding the authentication server with

random requests, possibly affecting clients well beyond its communication range.

In this chapter we show that reliable client identifiers, which we call signalprints, can

be created using signal strength information reported by access points and used to de-

tect misbehaving devices [51]. As a packet of interest (e.g. a deauthentication request)

is transmitted over the wireless link, it is sensed by access points within range, which re-

port signal strength measurements (a.k.a RSSI levels) to a centralized server. The request

is then “tagged” with a signalprint, a tuple constructed by aggregating all measurements

reported. Transmitters at different locations produce distinct signalprints because signal

decays with distance, allowing the system to robustly distinguish clients located geograph-

ically apart. We present measurements performed within an office building with an IEEE

802.11 network that demonstrate that signalprints can be used to detect masquerading and

resource-depletion attacks with high probability.

Page 141: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.2. ATTACK MODEL 121

In Section 6.2 we present our attack model. Section 6.3 describes how signalprints are

created and the properties that allows them to be used as location-based client identifiers. In

Section 6.4 we describe how signalprints are matched, while Section 6.5 shows how matching

rules can be created to detect identity-based DoS attacks. We evaluate our mechanism in

Section 6.6 and present its limitations in Section 6.7.

6.2 Attack Model

We assume that malicious clients are provided with standard wireless transmitters. First,

we assume they employ omni-directional antennas, much like most portable wireless devices.

The use of directional antennas is discussed in Section 6.6.5. Second, we assume they are

able to modify the contents of each outgoing packet. This allows them, among other things,

to change source and destination MAC addresses, a capability needed to implement the

attacks we are interested in. For example, Bellardo and Savage have described a mechanism

that can be used to accomplish this [29]. Finally, we assume that they are provided with

multiple transmission power levels and that they can also change that setting on a per-

packet basis. In this dissertation we restrict ourselves to 802.11 networks, but the ideas

presented can be equally applied to other wireless LAN technologies.

In terms of their physical location, we assume attackers can move freely around the area

covered by the wireless network. Note that in practice, this is only possible in environments

with little or no physical security, such as in cafeterias and other hotspots. The probability of

mounting successful attacks would be lower in environments with tighter security measures,

such as in enterprise installations.

We focus on the two classes of attacks already mentioned: masquerading and resource

depletion attacks.

6.3 Signalprints

6.3.1 Signalprint Representation

Conceptually, a signalprint is the signal strength characterization of a packet transmis-

sion [51]. Each signalprint is represented as a vector of signal strength measurements, with

one entry for each access point acting as sensor. Values in signalprints always appear in

the same order, i.e., position i always contains the signal strength level (in dBm) reported

Page 142: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

122 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

by the ith AP. We use the notation S[i] to refer to the ith entry in a signalprint. If an

access point does not report an RSSI level for a given packet, a default value equal to its

sensitivity is used. (The sensitivity of a receiver with respect to a given data rate is defined

as the minimum signal strength level needed to achieve a target packet error rate.)

The size of a signalprint is the number of non-default elements it contains, i.e., the

number of entries created from actual RSSI measurements. For instance, Figure 6.3(a)

shows two signalprints, S1 and S2, both with 7 entries (the number of APs in the network)

but with sizes 5 and 6, respectively. (In this case, default values of -95 dBm were used.)

Signalprint S1 was created using RSSI levels reported by APs 1, 3, 4, 5, and 7, while S2

has values from APs 1, 2, 4, 5, 6, and 7. As an alternative notation, S1 can also be written

as S1 : (−50, ,−80,−73,−88, ,−60), where default values are omitted.

6.3.2 Signalprint Generation

Figure 6.1 illustrates how signalprints are created for wireless transmissions. A client

(Client1) is shown transmitting an authentication request through its current access point

(solid line). Before forwarding the packet to the WA, the AP tags it with the RSSI level

measured during reception. (Signal strength estimates are commonly made available by

IEEE 802.11 device drivers for each packet received.) The other two APs shown in the fig-

ure are also configured as sensors and tuned to the same channel. As Client1 is also within

their ranges, they send similar reports to the WA with their own RSSI measurements. As

shown at the top of the figure, the WA aggregates all reports and creates the following

signalprint for Client1: SC1 : (−73,−51,−67). A signalprint for a second client, Client2,

is also shown at the WA. The signalprints produced by both clients are quite different – for

example the clients could be located in different offices within a building.

The WA can identify identity-based attacks by comparing signalprints produced by mul-

tiple packets. For example, if Client1 submits a high rate of requests trying to clog the

authentication server, the WA can detect it given that many of Client1’s transmissions

produce similar signalprints. Likewise, the WA can detect if Client2 mounts a DoS at-

tack against Client1 by sending 802.11 deauthentication requests with Client1’s MAC

addresses, as the signalprints produced by the two devices are different.

We assume that a subset of the deployed access points report RSSI measurements to the

WA for all transmissions they can detect. In the case of a WIDS that relies on a separate

wireless infrastructure, some APs are already permanently configured as sensors. In a

Page 143: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.3. SIGNALPRINTS 123

Figure 6.1: Overview of the signalprint generation process.

Page 144: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

124 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

CAPWAP network, the WA is responsible for selecting the APs for signalprint processing.

In an over-provisioned installation, the WA can select the access points that are not actively

serving clients.

Signalprint-based attack detection should be implemented as a reactive mechanism

whenever the number of sensors is not sufficient to cover all active channels. For instance,

802.11 deployments have at least 15 non-overlapping channels available across both 2.4 and

5 GHz frequency bands. The objective is to maximize the size of the signalprints produced:

the more measurements are received for a transmission, the more accurate is the information

gathered about the location of the corresponding device. For that to be possible, sensors

need to be listening simultaneously to the proper channel. In large networks, where more

channels are required to serve active clients, dividing the sensors across all channels to be

monitored would produce short, inaccurate signalprints. For this reason, a two-step process

should be implemented in these situations. First, the WA searches for abnormal behavior

using both active and sensor APs, which are scattered across all channels. When abnormal

behavior is detected – such as a surge in the number of 802.1X authentication requests or

a high number of association events related to a single client – the WA sets enough sensors

to the proper channel to create signalprints for the relevant packets.

6.3.3 Signalprint Properties

Three properties concerning signalprints enable their use as reliable client identifiers:

Signalprints are hard to spoof. Signal attenuation is a function of the distance be-

tween clients and access points, with a strong dependence on environmental factors such

as construction materials and obstacles such as furniture items [62, 91]. Consequently,

transmitters have little or no control over signal attenuation within the environment, be-

ing unable to considerably change the signalprints they produce. We show that the use

of differential signalprints makes the system robust against devices that employ multiple

transmission power levels, further decreasing their control over the signalprints generated.

Signalprints are strongly correlated with the physical location of clients, with

similar signalprints found mostly in close proximity. In our measurements, per-

formed within a 45m×24m office environment with a total of 12 802.11 access points, de-

vices need to be as close as 5 meters in order to generate similar signalprints with high

probability, even when only 6 APs are used. This allows the detection of masquerading

Page 145: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.4. MATCHING SIGNALPRINTS 125

attempts when attacker and victim are not in close proximity. If an attacker aims to DoS

a specific client and avoid detection, he is forced to move closer to the infrastructure, thus

risking exposure.

This property has also been demonstrated by WLAN localization systems that employ

an offline training phase where signal strength patterns (essentially signalprints) are created

for a set of selected locations (usually called a signal map, or radio map). These systems

have consistently achieved average localization errors below 3 meters, mapping areas as large

as 19,000 s.f. and with numbers of access points varying between 4 and 20 [26, 76, 98, 120].

Packet bursts transmitted by a stationary device generate similar signalprints

with high probability. Our measurements show that while RSSI levels for a stationary

device do oscillate over time due to multiple factors, over 90% of variations are within 5 dB

from the median RSSI level. This correlation between consecutive samples has also been

reported by other researchers [120]. Consequently, an attacker that mounts a resource deple-

tion attack using random MAC addresses can be easily spotted. While not all signalprints

may match each other, the network would still be able to detect that a single transmitter

is responsible for a high rate of requests.

Signalprints allow a centrally controlled WLAN to reliably single out clients. Instead of

identifying them based on MAC addresses or other data they provide, signalprints allow the

system to recognize them based on what they look like in terms of signal strength levels.

6.4 Matching Signalprints

In this section we demonstrate how matching rules are specified to detect identity-based

attacks. In Section 6.4.1 we describe the use of differential signal strength values during

matching. In sections 6.4.2 and 6.4.3 we describe how values within signalprints are com-

pared using max-matches and min-matches. In Section 6.4.4 we describe how matching

rules are specified in terms of these operations.

6.4.1 Differential Values

Values within a signalprint can be written as absolute values (e.g. RSSI levels in dBm) or as

relative values (e.g. with respect to its higher or lower value). We use the term differential

signal strength to refer to the difference between the value at a given position and the

Page 146: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

126 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

maximum value found in a signalprint. Signalprints are either written with absolute or

differential values: for example, a signalprint S : (−50,−62,−76) written using differential

signal strength becomes S : (0,−12,−26). Figure 6.3(b) shows S1 and S2 written with both

absolute and differential values (the latter shown respectively above and below S1 and S2).

When matching two signalprints, both need to be written in the same manner.

The use of differential values increases the robustness of signalprint operations against

devices (possibly malicious) that vary their transmission power levels between frames. It is a

trick borrowed from differential GPS, where a second, stationary receiver is used to remove

timing errors that occur in both paths, between a satellite and each one of the receivers. In

our case, this error or unknown quantity is the power level used by a transmitter. In theory

– according to the free-space equation and the log-distance model [91] – if a transmitter

increases its output power by δ dBm, a receiver within range is expected to detect an equal

increase in RSSI if they are both stationary. I.e., while RSSI oscillation due to multipath

is still expected, the large-scale path loss between two stationary devices is stable. Using

differential values, a stationary transmitter will generate similar signalprints whether it uses

0, 10, or 20 dBm of output power. With absolute values, however, considerable changes in

transmission power could cause the system to attribute multiple packets from a single client

to distinct devices.

We performed a simple experiment using our testbed to demonstrate this property. A

laptop with an 802.11 PCMCIA card was placed in the corridor in front of access point

number 8 (depicted in Figure 3.2). It transmitted two packet bursts, one with 15 dBm

of output power and the other with 0 dBm. Each burst took less than 10 seconds and

consisted of 10,000 ping packets transmitted at 11 Mbps. Between 1600 and 3000 RSSI

measurements were reported by each AP because the sensors were monitoring all 3 non-

overlapping channels at 2.4 GHz.

As expected, the median RSSI levels produced by both sequences differ by approximately

15 dBm. Figure 6.2 shows the first 1500 measurements reported by three of the access

points. Figure 6.2(a) corresponds to AP 12, located approximately 6.8 meters from the

client. The top curve shows the RSSI levels reported for the 15 dBm transmissions (total

of 1686 samples), while the bottom curve shows the samples for the transmissions with 0

dBm of power (2206 samples). The median RSSI levels are -61 and -76 dBm, a difference of

15 dBm. Figures 6.2(b) and 6.2(c) present the measurements for access points 3 and 7; the

differences between the median RSSI levels are now respectively 17 and 16 dBm.

Page 147: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.4. MATCHING SIGNALPRINTS 127

-90

-80

-70

-60

-50

0 200 400 600 800 1000 1200 1400

Sign

al S

treng

th (d

Bm)

Sample

1686 samples, median = -61 dBm2206 samples, median = -76 dBm

(a) AP 12, 6.8 meters from location sampled.

-90

-80

-70

-60

-50

0 200 400 600 800 1000 1200 1400

Sign

al S

treng

th (d

Bm)

Sample

2010 samples, median = -67 dBm1869 samples, median = -84 dBm

(b) AP 3, 9.8 meters from location sampled.

-90

-80

-70

-60

-50

0 200 400 600 800 1000 1200 1400

Sign

al S

treng

th (d

Bm)

Sample

2135 samples, median = -70 dBm1705 samples, median = -86 dBm

(c) AP 7, 10.7 meters from location sampled.

Figure 6.2: Variation in RSSI for a stationary client that uses two different power levels.Each graph presents measurements with respect to a single AP. The top and bottom curvescorrespond respectively to the samples collected with the client transmitting at 15 and 0dBm.

Page 148: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

128 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

6.4.2 Max-Matches

Matches are found by comparing values at the same position in two different signalprints.

A “max-match” of ε dB is found whenever values differ by at most ε dB. I.e., a 10-dB max-

match is found at position i if abs(S1[i]−S2[i]) ≤ 10 and both S1[i] and S2[i] are non-default

values. The total number of ε-dB max-matches found by comparing signalprints S1 and S2

is denoted by maxMatches(S1, S2, ε).

We decided to remove default values from match computations because they can arise

from two distinct scenarios. On one hand, a client can be simply outside the range of an

access point, in which case its packets are not detected and RSSI measurements are simply

not reported. On the other hand, many events may cause an AP to fail to receive packets

independently of signal quality. For instance, two packets sent on the same channel but on

different cells may overlap in time, in which case both packets might be incorrectly decoded

and dropped by the AP.

In this dissertation matches are always computed using differential signal strength val-

ues. Figure 6.3(b) shows that 3 10-dB max-matches are found when comparing S1 and S2,

i.e. maxMatches(S1, S2, 10) = 3. Signalprints are shown with both original and differential

signal strength values, with matches found at positions 1, 4, and 7. Note that position 5

does not yield a 10-dB max-match when using differential values: the difference equals 21

dB instead of the 8 dB when absolute values are used.

Max-matches are especially useful when looking for signalprints produced by the same

device. High numbers of max-matches with low values of ε (e.g. 5 dB) are likely to occur for

a pair of signalprints sent by the same device because RSSI values produced by a stationary

client tend to oscillate within 5 dB from the median value, as shown in Section 6.6.

6.4.3 Min-Matches

Analogous to a max-match, a “min-match” of ε dB is found whenever values differ by at least

ε dB. A 10-dB min-match is found at position i if abs(S1[i]− S2[i]) ≥ 10 and both S1[i] and

S2[i] are non-default values. The total number of ε-dB min-matches found when comparing

signalprints S1 and S2 is denoted by minMatches(S1, S2, ε). As shown in Figure 6.3(c), a

single 20-dB min-match is found when comparing S1 and S2, at position 4.

Min-matches allow the system to identify, with high probability, when two packets are

sent by distinct devices. While small variations in received signal strength occur even for

Page 149: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.4. MATCHING SIGNALPRINTS 129

(a) Signalprint size.

(b) 10-dB max-matches.

(c) 20-dB min-matches.

Figure 6.3: Signalprint matching examples. Figure 6.3(a) shows two signalprints and theircorresponding sizes. Figures 6.3(b) and 6.3(c) demonstrate how max-matches and min-matches are computed.

Page 150: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

130 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

Figure 6.4: Two matching rules applied to signalprints S1 and S2.

a stationary client, rarely does it change by more than 10 or 15 dB. Consequently, the

system can classify two packets as coming from different devices with high confidence if

large differences are seen in a signalprint.

6.4.4 Matching Rules

We say that a pair of signalprints “match” if they satisfy a specified matching rule, a boolean

expression involving numbers of max-matches and min-matches, and possibly signalprint

properties such as size. Figure 6.4 shows two matching rules applied to signalprints S1 and

S2 (the same from Figure 6.3). The first rule, maxMatches(S1, S2, 5) ≥ 4, requires the

two signalprints to have RSSI values within 5 dB of each other in at least 4 positions. As

S1 and S2 produce 3 such max-matches, the rule is not satisfied. The second rule in the

figure requires at least one position to differ by 10 dB or more, being satisfied by this pair

of signalprints.

When specifying matching rules, it is important to account for both signal strength

oscillation and lack of feedback from access points. Constant RSSI oscillation makes it

unlikely that even signalprints produced by the same stationary device have the exact same

RSSI values in multiple positions. Consequently, we usually write max-match clauses with

values of ε of at least 5 dB. The lack of feedback from some APs prevents matches in all

signalprint positions.

As with intrusion detection systems, matching rules are specified with the objective of

minimizing false positives, i.e., we want a match to be a strong indication that an attack

is taking place. The reason is cost: a match raises an alarm that is likely to be handled

by the network administrator. Rules can be made more precise (fewer false positives) by

increasing the minimum number of matches and changing the value of ε.

Page 151: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.5. ATTACK DETECTION 131

6.5 Attack Detection

Three attack properties are important to our analysis: R denotes the rate in packets per

second (pps) required for a given DoS attack to be effective, S denotes the speed of the

device, while A denotes the number of antennas under the control of the attacker. In this

section we assume that devices are stationary (S = 0) and provided with a single omni-

directional antenna (A = 1). In Section 6.6.4 we address the effects of moving devices, while

in Section 6.6.5 we assume attackers with directional antennas. Finally, we discuss attacks

with multiple antennas in Section 6.7.

6.5.1 Resource Depletion Attacks

In this scenario, an attacker sends high rates of request messages using random MAC values

in order to emulate a high number of clients and consume scarce resources in the network.

For example, an attacker can send enough DHCP requests in a hotspot as to consume

all available IP addresses, flood access points with association requests in the hopes of

exceeding allowed limits, or send high rates of authentication requests to slow down or even

disable a shared authentication server.

As an example, Dean et al. [38] have also shown that effective low-bandwidth DoS

attacks can be mounted against TLS, one of the preferred authentication methods to be

used in 802.11i/802.1X [3, 7]. TLS requires cryptographic operations (e.g. RSA and Diffie-

Hellman) that when executed in software demand tens of milliseconds even on a dedicated

processor. In situations where a dedicated server is not available – some lightweight AP

architectures perform authentication at the WA – the overhead imposed by each request

could be much higher. A server could therefore be overloaded by a device that generates

100 requests per second, which can be injected into the network while demanding far less

than 1Mbps of attack bandwidth.

In this case, the input to the signalprint matching process is a set of packets (e.g. au-

thentication requests) with distinct MAC addresses and their corresponding signalprints.

Effective DoS attacks in this category require high packet rates (R >> 1 pps), so many sig-

nalprints should be available for processing. By comparing pairs of signalprints, the system

can identify subsets generated by the same device.

Matching rules should require multiple max-matches with small values of ε because we

are looking for signalprints that were generated by the same device, therefore with similar

Page 152: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

132 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

RSSI values in multiple positions. Using 6 APs as sensors, the first rule we evaluate in

Section 6.6 for this purpose is maxMatches(S1, S2, 5) ≥ 4. We can decrease the probability

of false positives by increasing the required number of max-matches or decreasing the value

of ε. The second rule we evaluate – maxMatches(S1, S2, 5) ≥ 5 – tends to be satisfied by

signalprints generated at locations that are physically closer to each other.

In order to further decrease the probability of false positives, these rules can be extended

with min-match clauses. For instance, consider two signalprints that satisfy the second

matching rule above by having similar RSSI levels in 5 positions. Now consider the single

position that did not produce a max-match. If one of the signalprints has a default value at

that position, the likelihood of these signalprints being from the same device does not change

much. However, if values are defined in both signalprints and differ by 8 or 10 dB, this like-

lihood decreases substantially because the signalprints look considerably different relative

to the corresponding access point. We evaluate another two matching rules that extend the

rules given in the previous paragraph with a clause that does not allow differences higher

than 8 dB. These new rules are maxMatches(S1, S2, 5) ≥ 4 ∧minMatches(S1, S2, 8) = 0

and maxMatches(S1, S2, 5) ≥ 5 ∧minMatches(S1, S2, 8) = 0.

6.5.2 Masquerading Attacks

In masquerading attacks, an attacker targets a specific client by cloning its MAC address

or the address of its access point. For instance, Bellardo et al. have shown that deau-

thentication and disassociation attacks can be easily mounted in 802.11 networks and are

very effective [29]. Before a client can send packets over the wireless link, it needs to au-

thenticate and associate itself with an AP. In a deauthentication attack, deauthentication

requests are sent by an attacker with the MAC address of the victim. The access point,

after granting the attacker’s request, removes the victim from the authenticated state and

drops all its packets until association is reestablished. Bellardo et al. discuss other equally

effective masquerading attacks that exploit the association service and the power saving

mechanism [29].

In normal situations, 802.11 devices are not expected to generate high rates of authenti-

cation or association messages. However, there are situations in which well-behaved clients

switch between access points with a frequency that is abnormally high. For example, in

their study of a large-scale 802.11 network, Kotz et al. showed that clients sometimes are

overly aggressive when selecting the best access point, which causes them to reassociate

Page 153: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.6. EVALUATION 133

more often than necessary [73]. In these cases, multiple APs are within the client’s range

with comparable RSSI levels, which may cause it to change APs with small variations in

signal strength.

So the WA can detect an unusual traffic pattern, but is an attack really happening? Sig-

nalprints can be used to detect attacks with high probability, providing a level of assurance

that cannot be achieved by only looking at packet contents.

The input now consists of two sets of packets that represent conflicting requests (e.g.

authentication vs. deauthentication messages), all transmitted with the same MAC address.

An attack is detected by comparing pairs of signalprints, one from each set. Given that

continuous attacks are needed to severely affect a victim’s throughput, large input sets are

also expected in this case. For example, to keep a victim off the network, Bellardo et al.

used up to 10 deauthentication frames per second in their experiments [29].

To detect these attacks, matching rules should require min-matches with large values

of ε, because we are looking for considerable differences in RSSI that would indicate two

(or more) distinct transmitters. The first rule we evaluate for this purpose requires at

least 1 10-dB min-match using 6 sensors: minMatches(S1, S2, 10) ≥ 1. In the case of

masquerading attacks, rules can be made more precise by either increasing the number of

min-matches or increasing the value of ε. For this reason, we evaluate another two rules:

minMatches(S1, S2, 10) ≥ 2 and minMatches(S1, S2, 15) ≥ 1.

6.6 Evaluation

In this section we show that signalprints are strongly correlated with the physical locations

within an environment, which allows them to be used as robust, location-dependent client

identifiers.

6.6.1 Measurements

To evaluate our system, we use the survey data set, presented in Section 3.6.2. In Sec-

tion 6.6.2, we use all RSSI measurements reported to quantify the signal strength oscilla-

tion created by stationary clients. Moreover, a signalprint was created for each of the 135

locations sampled using the median RSSI level relative to each access point in range. These

are used in Section 6.6.3 to demonstrate the effectiveness of our proposed matching rules.

Page 154: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

134 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

6.6.2 Signal Strength Oscillation

We first demonstrate that while stationary, a wireless client tends to create similar sig-

nalprints, despite the inherently unpredictable nature of wireless propagation. This is an

important property when we consider the performance of our system against DoS attacks

with high rates of requests. For example, even a small fraction of matching signalprints

would allow the network to detect a malicious device that sends over 100 authentication

requests per second.

Our measurements suggest that most signal strength oscillations are small, within 5

dB from the median RSSI level. Each graph in Figure 6.5 was created by choosing one of

our sampled locations and one of the access points within its range. Each graph shows the

variation in signal strength for successive transmissions: the difference between the detected

RSSI and the median value for the corresponding location-AP pair (the median, or base

level, is shown as 0 dBm). The top three graphs in Figure 6.5 are examples of the behavior

detected for most locations: the majority of RSSI oscillations are within 5 dB from the

median. Aggregating all the measurements in our dataset – all locations with respect to all

access points – we have that over 71%, 90%, and 93% of RSSI oscillations are respectively

within 2, 5, and 10 dB from the median RSSI levels.

However, the tail of the distribution is long, and some strong, mostly destructive oscil-

lations do occur. The bottom two graphs in Figure 6.5 are examples of this case. In one

of them, the RSSI level is somewhat stable, with a couple of strong oscillations (>25 dB).

In the other example, periods with strong RSSI degradation seem to happen with a certain

frequency, with a difference in signal strength between the two levels as high as 30 dB. We

do not have a definitive explanation for these signal strength variations we have observed,

given that the transmitter was kept stationary during the measurements and used a single

transmission power level.

While strong RSSI oscillations do occur in our measurements, the path loss between a

stationary client and each AP is stable most of the time. In theory, multipath propagation

and other phenomena generate small-scale fading, with possibly strong RSSI variations over

time caused by people walking by, doors being closed, and other changes in environment that

affect any of the multiple paths taken by transmissions between two devices. In practice,

however, strong RSSI oscillations do not seem to happen often. Perhaps these results are

due to techniques developed to decrease the effects of small-scale fading in wireless systems,

such as antenna diversity, implemented in most 802.11 devices. Measurements in other

Page 155: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.6. EVALUATION 135

10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dB)

Sample 10 0

-10-20-30-40

0 50 100 150 200 250

Varia

tion

(dB)

Sample

Figure 6.5: RSSI oscillation for a stationary device. Each graph was created by choosingone of the locations sampled and one access point within its range. It shows the variationin signal strength for consecutive frame transmissions relative to the median RSSI (shownas 0 dBm) for that location-AP pair.

Page 156: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

136 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

installations, under different circumstances, would be able to provide more information

regarding this phenomenon.

6.6.3 Signalprints and Physical Proximity

In this section we explore the relationship between signalprints and physical proximity be-

tween transmitters in order to detect identity-based attacks. Despite having 12 access points

deployed in our testbed, all the results presented in this section use two AP configurations:

one with 6 access points (numbers 3, 5, 6, 8, 10, and 11 in Figure 3.2) and the other with

4 APs (numbers 2, 4, 6, and 8). The configuration with 4 access points is used to evaluate

the loss in accuracy when using fewer sensors. In this section, each figure shows the APs

being used for each matching rule as triangles and omits the others.

Detecting Packets From a Single Device

As discussed in Section 6.5.1, rules that identify packets generated by the same device are

useful to detect high-rate DoS attacks. By requiring multiple max-matches with small ε

values, we show that matching signalprints are found mostly in close proximity.

Locations that produce signalprints with similar values in multiple positions tend to be

physically close. Using the 6-AP configuration, Figure 6.6(a) shows all location pairs that

satisfy the matching rule maxMatches(S1, S2, 5) ≥ 4 connected by a line segment. Even

though many matches are produced, most of them involve locations that are close to each

other. Overall, 430 matches were found (4.8% of all pairs), with 51%, 74%, and 91% of

them found respectively for locations within 5, 7, and 10 meters from each other. However,

there are still many matches found for locations more than 15 meters from each other. (All

matching results presented in this section are summarized in Table 6.1.)

Matching results are improved by increasing the number of max-matches required.

Still using 6 sensors, Figure 6.6(b) shows the locations whose signalprints satisfy the rule

maxMatches(S1, S2, 5) ≥ 5. Compared to Figure 6.6(a), there is a significant reduction

in the number of long-distance matches. A total of 150 matches were found (1.7% of all

pairs), with respectively 64%, 88%, and 98% of them found for locations within 5, 7, and

10 meters from each other. In this case, there are no matches for locations more than 15

meters apart.

The matching rules just described can be made even more precise (fewer false posi-

tives and long-distance matches) if we extend them with min-match clauses. Figures 6.7(a)

Page 157: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.6. EVALUATION 137

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

m

l

l

l

l

l l l l l l l

l

l l l l l l l l l

l

l

l l l l l l l l l l

l

l l l l l l l

l

l

l

l

l

l

l l

l

l

l l

l

l l

m m l

l m

m l

l l

l l

l l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

m

l

l

m

l

l

l

l

l

l

l

m

l

m

l l

l

l

l

l

l

l l

l

l

l l

l

l

l

l

l

l

l

l

l l

l

l l

l

l

l

l

l

l

l

l

l

l

(a) maxMatches(S1, S2, 5) ≥ 4.

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

m

l

l

l

l

m l l l l m l

l

l l l l l l l l l

l

l

m l l m m l l l l l

l

l l l l l l m

l

m

l

l

m

m

m l

l

l

l l

l

l l

m m l

m m

m m

l l

m l

l l

l

l

l

m

m

m

m

l

l

l

l

l

l

l

m

m

l

l

m

l

m

l

l

m

l

m

m

m

m

m l

l

l

l

l

l

l l

l

l

l l

l

l

l

l

l

l

l

l

l l

l

l l

l

l

l

l

l

m

l

l

l

l

(b) maxMatches(S1, S2, 5) ≥ 5.

Figure 6.6: Figures 6.6(a) and 6.6(b) show the location pairs producing a minimum of re-spectively 4 and 5 5-dB max-matches using the 6-AP configuration (APs shown as triangles).

Page 158: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

138 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

m

m

l

l

l

l l l l l m l

l

l l l l l l l l l

l

l

l l l l l l l l l l

l

l l l l l l l

l

m

l

l

m

m

l l

l

l

l l

l

l l

m m l

l m

m m

l l

l l

l l

l

l

l

l

l

l

l

l

m

l

l

l

l

l

l

m

l

l

m

l

l

l

l

l

l

l

m

l

m

l l

l

l

l

m

l

m l

m

l

l l

l

l

m

l

m

l

l

l

l l

l

l m

m

l

l

l

l

m

l

l

l

l

(a) maxMatches(S1, S2, 5) ≥ 4 ∧minMatches(S1, S2, 8) = 0.

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

s

s

m

m

l

l

l

m l l l l m l

l

l l l l l l l l m

l

l

m l l m m l l l l l

l

l l l l l l m

l

m

l

l

m

m

m l

l

l

l l

l

l l

m m l

m m

m m

l l

m l

l l

l

l

l

m

m

m

m

l

m

l

l

l

l

l

m

m

l

l

m

l

m

l

l

m

l

m

m

m

m

m l

l

l

l

m

l

m l

m

m

m l

l

l

m

l

m

l

l

l

l l

l

m m

m

l

l

m

l

m

m

l

l

l

(b) maxMatches(S1, S2, 5) ≥ 5 ∧minMatches(S1, S2, 8) = 0.

Figure 6.7: Figures 6.7(a) and 6.7(b) extend respectively figures 6.6(a) and 6.6(b) with aclause that allows no 8-dB min-matches.

Page 159: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.6. EVALUATION 139

0

10

20

0 10 20 30 40

Y co

ordi

nate

(m)

X coordinate (m)

s

s

s

s

l

l

l

l

l

l l l l l l l

l

l l l l l l l l l

l

l

l l l l l l l l l l

l

l l l l l l l

l

l

m

l

l

l

l l

l

l

l l

l

l l

m m l

l m

l l

l l

l l

l l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l

l l

l

l

l

l

l

l l

l

l

l l

l

l

l

l

l

l

l

l

l l

l

l l

l

l

l

l

l

l

l

l

l

l

(a) maxMatches(S1, S2, 5) ≥ 3 ∧minMatches(S1, S2, 8) = 0.

Figure 6.8: Location pairs producing a minimum of 3 5-dB max-matches using the 4-APconfiguration.

and 6.7(b) extend respectively figures 6.6(a) and 6.6(b) with a clause that discards loca-

tion pairs with 8-dB min-matches (minMatches(S1, S2, 8) = 0). For instance, the rule in

Figure 6.7(a) still requires a minimum of 4 max-matches of 5 dB, but now rejects all the

location pairs for which any difference larger than 8-dB is found. As shown, the min-match

clause reduces the number of matches from 430 to 160 (1.8% of all pairs), with respectively

71%, 92%, and 99% of them found for locations within 5, 7, and 10 meters from each other.

A similar improvement is seen in Figure 6.7(b), that reduced the number of matches from

150 to 97 (1.1% of all location pairs). For both rules in Figure 6.7, there is a single match

for locations more than 10 meters from each other.

Finally, Figure 6.8(a) shows that performance degrades if we decrease the number of

access points used to 4, but that results are still satisfactory due to the use of min-matches.

With 4 APs, this matching rule requires at least 3 5-dB max-matches and no 8-dB min-

matches. It produces 317 matches, with respectively 62%, 86%, and 99% of them found for

locations within 5, 7, and 10 meters from each other. Note that these numbers are better

than the ones related to Figure 6.6(a) even though there are two fewer access points and

the matching rule requires fewer max-matches.

These results show that resource depletion attacks can be detected with high probability,

as matching signalprints are found mostly for locations that are near each other. Therefore, a

Page 160: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

140 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

Matching Rule Figure APs Matches ≤ 5m ≤ 7m ≤ 10m

maxMatches(5) ≥ 4 6.6(a) 6 430 (4.8%) 50.9% 74.4% 91.2%maxMatches(5) ≥ 5 6.6(b) 6 150 (1.7%) 64.0% 88.0% 98.0%maxMatches(5) ≥ 4 ∧minMatches(8) = 0 6.7(a) 6 160 (1.8%) 71.3% 91.9% 99.4%maxMatches(5) ≥ 5 ∧minMatches(8) = 0 6.7(b) 6 97 (1.1%) 72.2% 90.7% 99.0%maxMatches(5) ≥ 3 ∧minMatches(8) = 0 6.8(a) 4 317 (3.5%) 62.2% 86.4% 99.1%minMatches(10) ≥ 1 (none) 6 8643 (95.6%) 4.6% 10.1% 21.9%minMatches(10) ≥ 2 (none) 6 7768 (85.9%) 2.6% 6.9% 17.9%minMatches(15) ≥ 1 (none) 6 7896 (87.3%) 2.0% 6.1% 16.8%

Table 6.1: Matching results. Each row shows a matching rule, the figure (if any) containingthe signalprints created from our measurements that satisfy that rule, the number of accesspoints used as sensors, the number of matches produced, and the percentages of matchescreated by locations within 5, 7, and 10 meters from each other. The first four rules areused to detect packets transmitted by the same device, while the last two detect packetssent by distinct devices.

large number of matching requests means they are being transmitted from a specific location

or area, which could be found by coupling our mechanism with a localization system. Some

signalprints produced at the same location may not match due to RSSI oscillations, but

this does not prevent the WA from detecting high-rate DoS attacks.

Detecting Packets From Distinct Devices

In this section we evaluate matching rules specified to decrease the probability of false

positives when looking for masquerading attacks. We want signalprints to match only if

there is a high probability that they were indeed produced by distinct devices. In this

case, detecting large RSSI differences is more important than finding similar values, so

min-matches play a more important role in these situations.

Most location pairs in our dataset generate signalprints that satisfy the matching rule

minMatches(S1, S2, 10) ≥ 1, i.e., values in at least one position differ by 10 dB or more. As

shown in Table 6.1 (5th row) over 95% of all location pairs satisfy this rule. Even a large

number of locations that are physically close can be distinguished, with over 400 matches

produced for locations less than 5 meters from each other. Overall, these results show that

masquerading attacks can be detected with high probability, as at least one access point

Page 161: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.6. EVALUATION 141

can tell the two locations apart. Most of the signalprint pairs that did not satisfy this rule

were related to locations that were physically close: respectively 55% and 81% of them were

within 5 and 7 meters from each other.

One way to decrease the probability of false positives is to increase the minimum number

of 10-dB min-matches to 2. As shown in the 6th row in the table, over 85% of all location

pairs still produce a match. In this case, a match is an even stronger indication that an

attack is taking place, as signalprints differ substantially relative to at least two access

points. However, a smaller percentage of the location pairs that did not satisfy this rule

were in close proximity: only 52% of them are within 7 meters from each other. In fact, over

31% of all pairs have distances larger than 10 meters. The reason for this is lack of feedback.

A min-match occurs only if both signalprints have non-default values in a position. If one

location is outside the range of two APs and the other outside the range of a third, there

are just 3 APs left to produce matches. Consequently, even locations what are far apart

may not create considerable RSSI differences in multiple locations.

Another way to make such rules more precise is to increase the value of ε, i.e. re-

quire larger differences in signal strength. For instance, over 87% of all location pairs

differ by 15 dB or more relative to at least one access point, i.e., they satisfy the rule

minMatches(S1, S2, 15) ≥ 1 (Table 6.1, 7th row). Of the location pairs that did not satisfy

this rule, over 62% were less than 7 meters apart.

These results demonstrate that with enough sensors, distinct devices can be distin-

guished with high probability. The last two rules also demonstrate that one can collect

more evidence of an attack without considerably decreasing chances of detection.

6.6.4 Moving Devices

We do not expect legitimate clients on the move to generate false alarms because they send

requests at rates much lower than required by most attacks. For example, consider an 802.11

client that associates with an access point and after some time moves to a different location

and requests disassociation. Despite the fact that the two signalprints generated can be

quite different, an alarm should not be raised in this situation. An effective disassociation

attack requires higher rates of deauthentication requests to keep a client off the network, so

only a larger number of matching signalprints detected during a short period of time (e.g.

tens of seconds) should generate an alarm.

Page 162: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

142 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

Unless an attacker moves towards the victim, changing his location does not increase

the chances of having a successful masquerading attack. What matters is not how the

signalprints he produces compare to each other – for this matter they could be all different

– but how similar they are to the one produced by the victim. Attacks are detected as long

as there are considerable RSSI differences, which only cease to exist if the attacker moves

close to his victim.

Whether an attacker can disguise a resource depletion attack by changing his location

over time depends on his speed and the required packet rate. Let us assume that an attacker

moves at pedestrian speeds and consider an attack requiring R > 10 pps (such as the attack

against TLS). In this case, attacks are still detected with high probability. If he transmits

at a uniform rate, which has to be close to R pps, he continuously provides the system

with information about his location. Packets transmitted close in time generate similar

signalprints, allowing the system to track his location if a localization system is available.

To avoid being tracked, an attacker needs to alternate periods of packet transmissions and

radio silence. During such transmission bursts, however, he needs to send packets at rates

higher than R pps in order to compensate for the periods of silence. This attack would

be also detected because signalprints generated during each burst should match each other

with high probability. However, tracking the attacker becomes more challenging because

these bursts produce location estimates that are further apart.

6.6.5 Directional and Beamforming Antennas

A single directional or beamforming antenna would be more helpful to an attacker imple-

menting a resource depletion attack than a masquerading attack. In a masquerading attack,

it is still hard for an attacker to clone the exact signalprint produced by his intended victim

from a large distance. In close range, an omni-directional transmitter would also be effective

while being easier to conceal. During resource depletion attacks, changing the transmission

beam allows an attacker to change his signalprint, which decreases the number of matching

requests. The probability of detection depends on the number of distinct patterns a trans-

mitter is able to create and the packet rate required by the attack. If an attacker is only

able to produce a small number of antenna patterns and an attack requires high packer

rates (tens or hundreds of packets per second), some of the signalprints produced are still

associated with a large number of requests, allowing detection with high probability.

Page 163: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

6.7. LIMITATIONS 143

6.7 Limitations

Due to the use of RSSI levels to characterize wireless clients, one inherent limitation of our

mechanism is that it may be unable to distinguish two devices located physically close to

each other. Masquerading attempts can be detected if there is a noticeable difference in

RSSI with respect to at least one access point. As shown in Section 6.6.3, this happens even

for some locations in close range, possibly due to obstacles that affect one location more

than the other. In some situations – such as multiple clients in a conference room – the

system may not have compelling evidence that packets are coming from different devices,

making masquerading attacks possible. The level of physical security in an installation

dictates whether these attacks can be mounted: compared to a cafeteria, it is harder for an

attacker in an enterprise building to get close enough to his victim to mount an undetected

masquerading attack.

Our mechanism may also not be able to detect DoS attacks composed of few packets.

The more packets are involved in an attack, the more signalprints are available for processing

and the higher the probability of detection. A single-packet deauthentication attack in a

802.11 network may go unnoticed – for example if APs are sensing other channels – or not

provide enough confidence as to raise an alarm. In most situations, however, attacks require

high packet rates to be effective, increasing chances of detection.

An attacker may be able to avoid detection if provided with multiple antennas (A > 1).

Suppose that an attacker configures its antennas so that each sensor can only listen to trans-

missions from a single antenna (e.g. using directional antennas with narrow beamwidth

values). To successfully mount a resource depletion attack, the attacker can simultaneously

transmit a different packet through each antenna. As a single sensor detects each transmis-

sion, the signalprints produced are too short to satisfy the rules presented in Section 6.5.1.

To mount a masquerading attack, the attacker simultaneously transmits the same packet

using all antennas. By choosing the proper transmission power level for each of them, he

is able to “compose” any arbitrary signalprint with A values. In both scenarios, attacks

would be detected if some of the packets – even a small fraction – were detected by multiple

access points.

Page 164: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

144 CHAPTER 6. DETECTING IDENTITY-BASED ATTACKS

6.8 Summary and Conclusion

In this chapter we showed that reliable client identifiers, which we call signalprints, can

be created using signal strength measurements reported by access points acting as sensors.

We showed that while malicious clients can lie about their MAC addresses, the signalprints

they produce are strongly correlated with their physical location. We demonstrated that

by tagging packets with their signalprints and crafting proper matching rules, a wireless

network is able to detect a large class of effective denial-of-service attacks based on MAC

address spoofing. We presented several examples of attacks that can be easily mounted

in IEEE 802.11 networks and that can be detected by our proposed mechanism with high

probability.

Measurements in our network testbed demonstrate that multiple packets transmitted by

a stationary device produce similar signalprints with high probability. In our test dataset,

most RSSI variations for a stationary client with respect to a single access point are small,

within 5 dB from the median signal strength level. This allows the network to detect

resource depletion attacks, in which a malicious device transmits high rates of packets

(e.g. DHCP or authentication requests) containing random, forged MAC addresses. We

presented matching rules able to detect that a large percentage of these packets were indeed

generated by a single device, despite the different MAC addresses.

We also showed that similar signalprints are mostly found in close proximity. First,

using 6 of our deployed access points, we showed that locations that produce signalprints

with multiple similar RSSI values tend to be within 5 meters from each other. Then we

showed that large RSSI differences provide strong evidence that packets were generated

by distinct devices. Consequently, an attacker needs to be physically close to his intended

victim in order to mount undetected masquerading attacks.

Overall, we showed that signalprints are tags that allow a wireless network to identify

mobile devices according their physical location, improving security in a cost-effective man-

ner. Although signalprints can be defeated, such as by the use of multiple synchronized

direction antennas, these situations present a challenge for an intruder and increase the

likelihood of detection by physical security measurements. Thus, like the use of fingerprints

to identify humans, the mechanism is not infallible but a significant improvement over just

believing the identity that the individual claims.

Page 165: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Chapter 7

Conclusion

This chapter provides an overall perspective on our work, summarizes its main contributions,

and provides directions for future work.

7.1 A Perspective

Our objective in this dissertation has been to apply to wireless local area networks the same

approach that people have been using for centuries to protect general assets: leveraging

physical security to the best possible extent. People have used this mechanism to secure

almost everything, from general goods at home to highly-sensitive equipment at military

bases. We have also been successful at extending this approach to controlling access to

our wired LANs. From homes to enterprise buildings, access to Ethernet ports is mainly

controlled through a combination of gates, fences, locks, cameras, badges, and security

personnel. In this work we have shown that by exploring inherent properties of wireless

communications, we can use location-based services to better leverage physical security

measures in wireless LANs, decreasing the security gap between wireless and wired networks.

With our approach, similar security guidelines can be used to protect both wired and

wireless LANs. In both cases, a base security level can be achieved with low management

costs by exploring client location information and taking advantage of physical security

measures. Regarding security at the link layer – think for example of network access control

– current usage of wired networks suggests that this level of protection is sufficient for most

installations. I.e., these measures alone raise security to a level that is sufficient to prevent

most practical attacks. Finer grained access control capabilities can then be left to be

145

Page 166: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

146 CHAPTER 7. CONCLUSION

implemented at upper layers, on a per-application basis, for instance using identity-based

mechanisms such as IPSec [70], TLS [42], and SSH [117, 118]. The link layer can focus

on controlling access to network resources (e.g. bandwidth) and take advantage of a much

simpler security model.

7.2 Summary

In this dissertation we have addressed the problem of improving security in wireless LANs

– more specifically access control and accountability – without resorting to mechanisms

that incur substantial management costs. Nowadays, wireless networks are forced to rely

on mechanisms based on user credentials (e.g. passwords, private keys) to achieve satis-

factory security levels. Statistics suggest that the costs associated with creating, revoking,

and securely managing these credentials are too high for a large percentage of wireless

installations, which are ultimately forced to use insecure yet easily deployable solutions.

Consequently, even a sizable fraction of enterprise networks operate with insecure config-

urations, vulnerable to attacks ranging from casual war-driving to exposure of sensitive

information. We have shown that networks can use location-based security policies to im-

plement a cost-effective access control and accountability framework while taking advantage

of the increasing number of access points to deploy self-configurable services, with little or

no dependence on operator assistance.

We showed that a properly-designed localization system can be used to improve ac-

countability and to implement location-based access control policies. Using measurements

in a real deployment, we showed that our system is able to accurately track the location of

wireless clients using signal strength statistics reported by access points. This improves ac-

countability because clients being serviced by the network can now be closely monitored and

are constantly exposed to physical security measures. We also showed that our system can

be used as a building block to implement cost-effective access control. Conditions imposed

by the system can be easily satisfied by the targeted clients while demanding considerable

levels of amplification from attackers located beyond the boundaries of the service area.

This increases the costs required to mount successful attacks, making wireless LANs harder

to compromise. This system was described in detail in Chapter 4.

We also showed that we can further increase the resources required to access a network

beyond the service area by forcing clients to act as receivers during authentication. In

Page 167: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

7.2. SUMMARY 147

Chapter 5, we presented the design and evaluation of range-based authentication, a mecha-

nism that takes advantage of inherent characteristics of wireless channels to force clients to

be located in close proximity to access points. While users with standard wireless devices

and located within the SA succeed with high probability, we showed that attackers located

more than 30 meters from the service area need large directional antennas to cope with the

higher signal attenuation. Acting as receivers, attackers cannot rely on amplifiers to acquire

all the necessary gain, being forced to use high-gain antennas or get closer to the network

infrastructure. In both of these cases, the attacker is physically exposed and within range

of physical security measures.

In Chapter 6, we showed that networks can also use signal strength information to create

reliable client identifiers – called signalprints – and use them to detect a large class of denial-

of-service attacks. Several link-layer services rely on MAC addresses to identify clients, so

even without permission to access a specific network, malicious devices can easily deny

service to legitimate clients. In fact, even authenticated clients in IEEE 802.11 networks

are currently vulnerable to several of such identity-based DoS attacks. However, while

malicious devices can lie about their MAC addresses as they control the contents of their

packets, we have shown that the signalprints they produce are strongly correlated with

their physical locations. We showed that this property allows identity-based attacks to be

detected with high probability. An intruder using random MAC addresses to generate high

rates of requests (e.g. towards an authentication server) produces many similar signalprints

and provides enough evidence for the attempt to be detected. Similarly, we demonstrated

that an attacker needs to be within close range (within 5-10 meters) to its intended victim

for them to generate indistinguishable signalprints.

Finally, we used our testbed network to demonstrate that our proposed services can be

deployed in a self-configurable manner, therefore having little impact on overall management

costs. We showed that during system calibration, APs communicate amongst themselves

to establish models that coarsely approximate signal attenuation within the service area.

This creates all the environment-specific state needed by our localization and range-based

authentication mechanisms, so measurements can be performed autonomously by the system

and repeated periodically to cope with the dynamics of wireless networks. We described

system calibration in Chapter 3.

In summary, our approach follows a direction of past success in computing, namely

“throwing more resources” at the problem, access points in this case. As with other

Page 168: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

148 CHAPTER 7. CONCLUSION

large-scale systems, the costs associated with dense wireless LANs have been shown to

be dominated by operational rather than capital expenses. With the sharp falling prices of

commodity hardware – IEEE 802.11 devices provide a timely example – large numbers of

access points can be deployed without severely affecting total cost of ownership. Moreover,

we have shown that location-based security mechanisms are extremely suitable to such sce-

narios. First, the more APs are deployed, the higher the number of vantage points, which

improves both calibration and localization performance. Second, increasing access point

density decreases the average length of wireless links, improving security guarantees and

reducing network coverage beyond the service area.

The main limitations of our architecture are a consequence of the use of signal strength

measurements and the required modeling of signal attenuation in indoor environments.

One one hand, the use of signal strength measurements makes our services immediately

deployable and reduces overall costs because the required infrastructure is composed of

cheap, off-the-shelf hardware components. On the other hand, the somewhat unpredictable

nature of signal propagation makes it challenging for RSSI-based services to be highly

accurate, which has important security implications. For instance, our proposed signalprint-

based mechanism may be unable to distinguish devices in close proximity to each other while

our localization system may fail to reject a mobile device located right outside a building. As

we can only coarsely model signal attenuation with distance, services need to be conservative

when rejecting clients to prevent impractical rates of false negatives. As a result, there is

an area around each SA where successful attacks are possible with attainable hardware

requirements. We showed that unless physical security measures are in place, attackers

may successfully bypass our localization system and range-based mechanism with practical

amounts of amplification when located in close proximity to a service area.

7.3 Future Work

There are many avenues for extending the mechanisms presented in this dissertation. In

this section we present three directions that we consider promising.

First, it seems possible to explore characteristics of specific wireless standards and their

hardware implementations to further improve security guarantees. The techniques presented

in this dissertation explore general properties of wireless channels – signal attenuation with

distance, signal quality as a function of signal-to-noise ratio, etc – being applicable to most

Page 169: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

7.3. FUTURE WORK 149

wireless systems. However, we believe it is possible to have optimizations that explore the

characteristics of a specific system to reduce the space of practical attacks. For instance,

the IEEE 802.11n standard being currently developed will rely heavily on multiple-input

multiple-output (MIMO) techniques to improve actual data rates to over 100 Mbps. Let us

assume that the upcoming 802.11n standard defines a mechanism to implement a MIMO

technique called spatial multiplexing, in which distinct data streams can be transmitted

simultaneously and at the same frequency using multiple spatial channels. A network

targeting only 802.11n-capable clients can set its reference client accordingly and implement

a variant of our range-based authentication protocol in which distinct nonce messages are

sent simultaneously over distinct spatial channels. The first consequence of this change is

that single-output1 clients (such as current 802.11a/b/g devices) may not be able to recover

all transmitted nonces, therefore not being able to authenticate successfully. Moreover, an

attacker that aims to extend the service area now has to amplify multiple distinct signals

coming through multiple antennas. Whether this poses a more challenging scenario for the

attacker is an interesting research question.

Another interesting research direction would be to use the real-time measurements col-

lected about clients not only for security purposes by also to improve performance. Wireless

networks today are still deployed in a fairly static manner: relatively few access points are

installed and clients are responsible for selecting which one to use. As users are not usually

uniformly distributed across the service area – for instance, in enterprise buildings they tend

to be clustered inside offices and conference rooms – it is common for some access points to

operate under heavy loads while others are almost idle. In a centrally-controlled WLAN,

load-balancing decisions can be made by the WA dynamically, based on the measurements

constantly reported by the access points. With such real-time information, the WA can

select which APs to activate and which clients should be served by each AP in order to

optimize user experience. Some current products already claim to provide such “RF man-

agement” functions, but it is an interesting research question how dynamic a network can

be while avoiding unnecessary oscillation (e.g. high rates of hand-offs) and still allowing

networks to scale to large numbers of APs.

1In MIMO systems, “multiple input” means that a devices is able to transmit multiple signals using

multiple antennas, while “multiple output” means that a device is able to receive through multiple antennas.

Page 170: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

150 CHAPTER 7. CONCLUSION

Finally, it would be of great value to better understand how location-based services are

affected over longer periods of time by dynamic changes in the environment. For exam-

ple, our results demonstrate that signal strength is fairly stable for stationary clients over

several minutes. However, our results are specific to our building, its construction materi-

als, as well as the number and the movement of people inside our service area during our

measurements. Real deployments in environments with different characteristics and usage

patterns, monitored over the course of several weeks or months, would be extremely useful

to support the use of location-based services. For instance, these studies would be able

to demonstrate how localization accuracy varies over time and how frequently calibration

needs to be performed to allow an installation to respond quickly to events that affect signal

attenuation within a service area.

Our work demonstrates the advantages of exploring inherent characteristics of wireless

channels to improve security, and we hope our efforts will encourage a wider adoption of

location-based security policies.

Page 171: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

Bibliography

[1] LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN

Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Techni-

cal Report 1999 Edition, IEEE Std 802.11, 1999.

[2] LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN

Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amend-

ment 1: High-speed Physical Layer in the 5 GHz band. Technical Report 1999 Edition,

IEEE Std 802.11a, 1999.

[3] LAN MAN Standards Committee of the IEEE Computer Society. Standard for Port

based Network Access Control. Technical Report Draft P802.1X/D11, IEEE Com-

puter Society, March 2001.

[4] Cisco Aironet 350 Series Client Adapters. Product Data Sheet. Cisco Systems, Inc.,

2003.

[5] LAN MAN Standards Committee of the IEEE Computer Society. Wireless Medium

Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wire-

less Personal Area Networks (WPANs). Technical Report 2003 Edition, IEEE Std

802.15.3, September 2003.

[6] EliteConnectTM Universal 2.4GHz/5GHz High Power Wireless Cardbus Adapter.

Product Data Sheet. SMC Networks, Inc., 2004.

[7] LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN

Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amend-

ment 6: Medium Access Control (MAC) Security Enhancements. Technical Report

2004 Edition, IEEE Std 802.11i, July 2004.

151

Page 172: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

152 BIBLIOGRAPHY

[8] The Official Worldwide Wardrive. http://www.worldwidewardrive.org/, June

2004, accessed in July 2006.

[9] 2.4 GHz 17.5 dBi High Performance Parabolic Dish Wireless LAN Antenna, Model

HG2418D. Product Data Sheet. HyperLink Technologies, Inc., 2005.

[10] 2.4 GHz 19 dBi Directional Reflector Grid Wireless LAN Antenna, Model HG2419G.

Product Data Sheet. HyperLink Technologies, Inc., 2005.

[11] 2.4 GHz 9 dBi Radome Enclosed Wireless LAN Yagi Antenna, Model HG2409Y.

Product Data Sheet. HyperLink Technologies, Inc., 2005.

[12] Cisco Aironet 1240AG Series 802.11A/B/G Access Point. Product Data Sheet. Cisco

Systems, Inc., 2005.

[13] LAN MAN Standards Committee of the IEEE Computer Society. Wireless Medium

Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal

Area Networks (WPANs). Technical Report 2005 Edition, IEEE Std 802.15.1, June

2005.

[14] 2.4 GHz 18 dBi Wireless LAN Heavy Duty Panel Antenna, Model HG2418P. Product

Data Sheet. HyperLink Technologies, Inc., 2006.

[15] 2.4 GHz 24 dBi High Performance Reflector Grid Wireless LAN Antenna, Model

HG2424G. Product Data Sheet. HyperLink Technologies, Inc., 2006.

[16] 2.4 GHz 8 dBi Wireless LAN Round Patch Antenna, Model HG2408P. Product Data

Sheet. HyperLink Technologies, Inc., 2006.

[17] OpenWrt – Wireless Freedom. http://www.openwrt.org, July 2006, accessed in July

2006.

[18] Merriam-Webster Online Dictionary. http://www.m-w.com, accessed in November

2006.

[19] Martin Abadi, Michael Burrows, and Ted Wobber. Moderately Hard, Memory-Bound

Functions. In Proceedings of the Network and Distributed System Security Symposium

(NDSS), San Diego, USA, February 2003.

Page 173: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 153

[20] B. Aboba and D. Simon. PPP EAP TLS Authentication Protocol, RFC2716, IETF.

October 1999.

[21] William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, An-

gelos D. Keromytis, and Omer Reingold. Just Fast Keying: Key Agreement in a

Hostile Internet. ACM Transactions on Information and System Security (TISSEC),

7(2):242-273, May 2004.

[22] S. E. Alexander. Radio Propagation within Buildings at 900 MHz. Electronic Letters,

18(21):913-914, October 1982.

[23] Jørgen Bach Andersen, Theodore S. Rappaport, and Susumu Yoshida. Propagation

measurements and models for wireless communications channels. IEEE Communica-

tion Magazine, 33(1):42-49, January 1995.

[24] Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. DoS-resistant Authentication

with Client Puzzles. In Proceedings of the Cambridge Security Protocols Workshop,

LNCS, Cambridge, UK, April 2000.

[25] Olufunmilola Awoniyi and Fouad A. Tobagi. Effect of Fading on the Perfomance

of VoIP in IEEE 802.11a WLANs. In Proc. of IEEE International Conference on

Communications, June 2004.

[26] Paramvir Bahl and Venkata N. Padmanabhan. RADAR: An In-Building RF-Based

User Location and Tracking System. In Proc. of the 19th Annual Joint Conference of

the IEEE Computer and Communications Societies (INFOCOM’00), Tel-Aviv, Israel,

March 2000.

[27] Paramvir Bahl, Venkata N. Padmanabhan, and A. Balachandran. Enhancements to

the RADAR User Location and Tracking System. Technical Report MSR-TR-00-12,

Microsoft Research, February 2000.

[28] Dirk Balfanz, D. K. Smetters, Paul Stewart, and H. Chi Wong. Talking to Strangers:

Authentication in Ad-Hoc Wireless Networks. In Proc. of Network and Distributed

System Security Symposium (NDSS), February 2002.

Page 174: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

154 BIBLIOGRAPHY

[29] John Bellardo and Stefan Savage. 802.11 Denial-of-Service Attacks: Real Vulnera-

bilities and Practical Solutions. In Proceedings of the USENIX Security Symposium,

Washington, DC, USA, August 2003.

[30] Stefan Brands and David Chaum. Distance-bounding protocols. In EUROCRYPT ’93:

Workshop on the Theory and Application of Cryptographic Techniques on Advances

in Cryptology, pages 344–359, Secaucus, NJ, USA, 1994. Springer-Verlag.

[31] P. Calhoun, M. Montemurro, and D. Stanley. CAPWAP Protocol Specification. IETF

Internet Draft, draft-ietf-capwap-protocol-specification-01, May 2006.

[32] Joseph J. Carr. Practical Antenna Handbook. McGraw-Hill, 3rd edition, 1998.

[33] Paul Castro, Patrick Chiu, Ted Kremenek, and Richard Muntz. A Probabilistic

Room Location Service for Wireless Networked Environments. In Proc. of the Inter-

national Conference on Ubiquitous Computing (UbiComp’01), pages 18-34, Atlanta,

GA, September 2001.

[34] Yi-Chao Chen, Ji-Rung Chiang, Hao hua Chu, Polly Huang, and Arvin Wen Tsui.

Sensor-Assisted Wi-Fi Indoor Location System for Adapting to Environmental Dy-

namics. In Proc. of the ACM/IEEE International Symposium on Modeling, Analysis,

and Simulation of Wireless and Mobile Systems (MSWiM’05), pages 118-125, October

2005.

[35] David Cheung and Cliff Prettie. A Path Loss Comparison Between the 5 GHz UNII

Band (802.11a) and the 2.4 GHz ISM Band (802.11b). Technical report, Intel Corpo-

ration, January 2002.

[36] Mark D. Corner and Brian D. Noble. Zero-Interaction Authentication. In Proc. of

ACM International Conference on Mobile Computing and Networking - MobiCom’02,

pages 1-11, Atlanta, GA, September 2002.

[37] CSI. Tenth Annual CSI/FBI Computer Crime and Security Survey. Technical report,

Computer Security Institute, June 2005.

[38] D. Dean and A. Stubblefield. Using Client Puzzles to Protect TLS. In Proceedings of

the Tenth USENIX Security Symposium, Washington, DC, USA, August 2001.

Page 175: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 155

[39] Murat Demirbas and Youngwhan Song. An RSSI-based Scheme for Sybil Attack De-

tection in Wireless Sensor Networks. In Proc. of International Workshop on Advanced

Experimental Activities on Wireless Networks and Systems, June 2006.

[40] Dorothy E. Denning and Peter F. MacDoran. Location-Based Authentication:

Grounding Cyberspace for Better Security. Computer Fraud & Security Bulletin,

1996(2):12-16, February 1996.

[41] D. M. J. Devasirvatham, C. Banerjee, M. J. Krain, and D. A. Rappaport. Multi-

Frequency Radiowave Propagation Measurements in the Portable Radio Environment.

In Proc. of IEEE International Conference on Communications (ICC), volume 4,

pages 1334-1340, April 1990.

[42] T. Dierks and C. Allen. The TLS Protocol - Version 1.0, RFC 2246, IETF. January

1999.

[43] A. Doufexi, S. Armour, M. Butler, A. Nix, and D. Bull. A Study of the Performance

of HIPERLAN/2 and IEEE 802.11a Physical Layers. In Proc. of IEEE Vehicular

Technology Conference - VTC’01, volume 1, pages 668-672, May 2001.

[44] A. Doufexi, S. Armour, B. Lee, A. Nix, and D. Bull. An Evaluation of the Performance

of IEEE 802.11a and 802.1g Wireless Local Area Networks in a Corporate Office

Environment. In Proc. of IEEE International Conference on Communications, pages

1196-1200, May 2003.

[45] Dragos Niculescu and Badri Nath. VOR Base Stations for Indoor 802.11 Positioning.

In Proc. of ACM International Conference on Mobile Computing and Networking -

MobiCom’04, pages 58-69, Philadelphia, PA, August 2004.

[46] Greg Durgin, Theodore S. Rappaport, and Hao Xu. Measurements and Models for

Radio Path Loss and Penetration Loss in and Around Homes and Trees at 5.85 GHz.

IEEE Transactions on Communications, 46(11):1484-1496, November 1998.

[47] K. J. Ellis and Nur Serinken. Characteristics of Radio Transmitter Fingerprints. Radio

Science, 36:585-598, 2001.

[48] Per Enge and Pratap Misra. Special Issue on Global Positioning System. Proceedings

of the IEEE, 87(1):3-15, January 1999.

Page 176: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

156 BIBLIOGRAPHY

[49] ETSI. Broadband Radio Access Networks (BRAN); HIPERLAN Type 2; System

Overview. Technical Report DTR/BRAN-00230002, February 2000.

[50] Daniel B. Faria and David R. Cheriton. No Long-term Secrets: Location-based Se-

curity in Overprovisioned Wireless LANs. In Proc. of the Third ACM Workshop on

Hot Topics in Networks (HotNets-III), November 2004.

[51] Daniel B. Faria and David R. Cheriton. Detecting Identity-Based in Wireless Networks

Using Signalprints. In Proc. of the Fifth ACM Workshop on Wireless Security (WiSe),

pages 43-52, September 2006.

[52] Farpoint Group. WLAN Total Cost of Ownership: Comparing Centralized and Dis-

tributed Architectures, White Paper FPG-2004-013.1. January 2004.

[53] Paul Funk and Simon Blake-Wilson. EAP Tunneled TLS Authentication Protocol

Version 1 (EAP-TTLSv1), Internet Draft, IETF. draft-funk-eap-ttls-v1-01.txt, March

2006.

[54] Dan Garlan, Daniel P. Siewiorek, Asim Smailagic, and Peter Steenkiste. Project aura:

Toward distraction-free pervasive computing. IEEE Pervasive Computing, 1(2):22-31,

April 2002.

[55] Ivan E. Getting. The Global Positioning System. IEEE Spectrum, 30(12):36-47,

December 1993.

[56] Marco Gruteser and Dirk Grunwald. Enhancing Location Privacy in Wireless LAN

Through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks

and Applications, 10(3):315-325, June 2005.

[57] Youngjune Gwon and Ravi Jain. Error Characteristics and Calibration-free Tech-

niques for Wireless LAN-based Location Estimation. In Proc. of the International

Worshop on Mobility Management, pages 2-9, Philadelphia, PA, October 2004.

[58] Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, , Algis Rudys, Dan S. Wallach,

and Lydia Kavraki. Practical Robust Localization over Large-Scale 802.11 Wireless

Networks. In Proc. of the ACM International Conference on Mobile Computing and

Networking (MobiCom’04), Philadelphia, PA, September 2004.

Page 177: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 157

[59] Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. Enhancing Intrusion De-

tection in Wireless Networks Using Radio Frequency Fingerprinting. In Proc. of

The IASTED Conference on Communications, Internet and Information Technology,

November 2004.

[60] Andy Harter and Andy Hopper. A New Location Technique for the Active Office.

IEEE Personal Communications, 4(5):42-47, October 1997.

[61] Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The

Anatomy of a Context-Aware Application. In Proc. of ACM/IEEE International

Conference on Mobile Computing and Networking (MobiCom’99), pages 59-68, Seat-

tle, WA, August 1999.

[62] Homayoun Hashemi. The Indoor Radio Propagation Channel. Proceedings of IEE,

81(7):943-968, July 1993.

[63] Homayoun Hashemi, Michael McGuire, Thomas Vlasschaert, and David Tholl. Mea-

surements and Modeling of Temporal Variations of the Indoor Radio Propagation

Channel. 43(3):733-737, August 1994.

[64] Jeffrey Hightower, Roy Want, and Gaetano Borriello. SpotON: An Indoor 3D Location

Sensing Technology Based on RF Signal Strength. Technical Report UW CSE 2000-

02-02, University of Washington, February 2000.

[65] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet Leashes: A Defense

against Wormhole Attacks in Wireless Ad Hoc Networks. In Proc. of the Annual Joint

Conference of the IEEE Computer and Communications Societies (INFOCOM’03),

pages 1976-1986, San Francisco, CA, March 2003.

[66] Norman L. Johnson, Samuel Kotz, and N. Balakrishnan. Continuous Univariate

Distributions, volume 2. John Wiley & Sons, Inc., 1994.

[67] Ari Juels and John Brainard. Client Puzzles: A Cryptographic Defense Against

Connection Depletion Attacks. In Proceedings of the Network and Distributed System

Security Symposium (NDSS), pages 151-165, San Diego, USA, February 1999.

[68] Charlie Kaufman. Internet Key Exchange (IKEv2) Protocol, Internet Draft, IETF.

August 2004.

Page 178: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

158 BIBLIOGRAPHY

[69] J. M. P. Keenan and A. J. Motley. Radio Coverage in Buildings. British Telecom

Technology Journal, 8(1):19-24, January 1990.

[70] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol, RFC 2401,

IETF. November 1998.

[71] Tim Kindberg, Kan Zhang, and Narendar Shankar. Context Authentication Using

Constrained Channels. In WMCSA ’02: Proc. of the 4th IEEE Workshop on Mobile

Computing Systems and Applications, page 14, 2002.

[72] T. Kivinen and M. Kojo. More Modular Exponential (MODP) Diffie-Hellman groups

for Internet Key Exchange (IKE), RFC 3526, IETF. May 2003.

[73] D. Kotz and K. Essien. Analysis of a Campus-wide Wireless Network. In Proc. of

ACM International Conference on Mobile Computing and Networking - MobiCom’02,

pages 107-118, Atlanta, GA, September 2002.

[74] P. Krishnan, A. S. Krishnakumar, Wen-Hua Ju, Colin Mallows, and Sachin Ganu. A

System for LEASE: Location Estimation Assisted by Stationary Emitters for Indoor

RF Wireless Networks. In Proc. of the Annual Joint Conference of the IEEE Computer

and Communications Societies (INFOCOM’04), pages 1001-1011, Hong Kong, March

2004.

[75] John Krumm and John Platt. Minimizing Calibration Effort for an Indoor 802.11

Device Location Measurement System. Technical Report MSR-TR-2003-82, Microsoft

Research, November 2003.

[76] Andrew M. Ladd, Kostas E. Bekris, Algis Rudys, Guillaume Marceau, Lydia E.

Kavraki, and Dan S. Wallach. Robotics-Based Location Sensing using Wireless Ether-

net. In Proc. of ACM International Conference on Mobile Computing and Networking

(MobiCom’02), Atlanta, GA, USA, September 2002.

[77] Loukas Lazos, Radha Poovendran, and Srdjan Capkun. ROPE: Robust Position

Estimation in Wireless Sensor Networks. In Proc. of the International Symposium on

Information Procesing in Sensor Networks (IPSN’05), pages 324-331, Los Angeles,

CA, April 2005.

Page 179: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 159

[78] Arjen K. Lenstra and Eric R. Verheul. Selecting Cryptographic Key Sizes. Journal

of Cryptology, 14(4):255-293, September 2001.

[79] Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, and Haiyun Luo. Zero-Configuration,

Robust Indoor Localization: Theory and Experimentation. In Proc. of the An-

nual Joint Conference of the IEEE Computer and Communications Societies (IN-

FOCOM’06), Barcelona, Spain, April 2006.

[80] L. Mamakos, K. Lidl, J. Evarts, D. Carrel, D. Simone, and R. Wheeler. A Method

for Transmitting PPP Over Ethernet (PPPoE), RFC 2516, IETF. February 1999.

[81] Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, TJ Giuli,

and Yanto Muliadi. Preserving peer replicas by rate-limited sampled voting. In Proc.

of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP), pages

44-59, October 2003.

[82] Jonas Medbo and Jan-Erik Berg. Simple and Accurate Path Loss Modeling at 5

GHz in Indoor Environments with Corridors. In Proc. of IEEE Vehicular Technology

Conference (VTC), volume 1, pages 30-36, September 2000.

[83] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied

Cryptography. CRC Press, October 1996.

[84] D. Molkdar. Review on Radio Propagation into and within Buildings. IEE

Proceedings-H, 138(1):61-73, February 1991.

[85] N. Moraitis and P. Constantinou. Indoor Channel Measurements and Characterization

at 60 GHz for Wireless Local Area Network Applications. 52(12):3180-3189, December

2004.

[86] A. J. Motley and J. M. P. Keenan. Personal Communication Radio Coverage in

Buildings at 900 MHz and 1700 MHz. Electronic Letters, 24(12):763-764, June 1988.

[87] Ashwin Palekar, Dan Simon, Glen Zorn, Joe Salowey, Hao Zhou, and S. Josefsson.

Protected EAP Protocol (PEAP) Version 2, Internet Draft, IETF. draft-josefsson-

pppext-eap-tls-eap-07.txt, October 2003.

Page 180: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

160 BIBLIOGRAPHY

[88] Nissanka Bodhi Priyantha, Anit Chakraborty, and Hari Balakrishnan. The Cricket

Location-Support System. In Proc. of ACM International Conference on Mobile Com-

puting and Networking (MobiCom’00), pages 32-43, Boston, MA, August 2000.

[89] Nissanka Bodhi Priyantha, Allen K. L. Miu, Hari Balakrishnan, and Seth Teller.

The Cricket Compass for Context-Aware Mobile Applications. In Proc. of ACM

International Conference on Mobile Computing and Networking (MobiCom’01), pages

1-14, Rome, Italy, July 2001.

[90] Ram Ramanathan. On the Performance of Ad Hoc Networks with Beamforming

Antennas. In Proc. of ACM International Symposium on Mobile Ad Hoc Networking

and Computing - MobiHoc’01, pages 95-105, Long Beach, CA, October 2001.

[91] Theodore S. Rappaport. Wireless Communications - Principles and Practice. Prentice

Hall PTR, 2nd edition, January 2002.

[92] Infonetics Research. User Plans for Wireless

LANs: North America 2005. Press Release,

http://www.infonetics.com/resources/purple.shtml?upna05.wl.nr.shtml,

October 2005, accessed in November 2006.

[93] Infonetics Research. Wireless LAN Equipment Report. Press Release,

http://www.infonetics.com/resources/purple.shtml?ms06.wl.4q.nr.shtml,

March 2006, accessed in June 2006.

[94] Infonetics Research. L2-L7 LAN Switches Re-

port, Enterprise Routers Report. Press Release,

http://www.infonetics.com/resources/purple.shtml?ms06.rtr.sw.4q.nr.shtml,

February 2006, accessed in November 2006.

[95] Infonetics Research. Network Security Appliances and Software Report. Press Release,

http://www.infonetics.com/resources/purple.shtml?ms06.sec.4q.nr.shtml,

March 2006, accessed in November 2006.

[96] Michael J. Riezenman. Cellular security: better, but foes still lurk. IEEE Spectrum,

37(6):39-42, June 2000.

Page 181: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 161

[97] C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In

User Service (RADIUS), RFC 2865, IETF. June 2000.

[98] Teemu Roos, Petri Myllymaki, Henry Tirri, Pauli Misikangas, and Juha Sievanen. A

Probabilistic Approach to WLAN User Location Estimation. International Journal

of Wireless Information Networks, 9(3):155-164, July 2002.

[99] Sheldon Ross. A First Course in Probability. Macmillan, 2 edition, 1984.

[100] RSA Security Inc. The Wireless Security Survery of Frankfurt, White Paper WSFR05-

WP-0305. March 2005.

[101] RSA Security Inc. The Wireless Security Survery of London, White Paper WSLN05-

WP-0305. March 2005.

[102] RSA Security Inc. The Wireless Security Survery of New York, White Paper WSNY05-

WP-0305. March 2005.

[103] RSA Security Inc. The Wireless Security Survery of San Francisco, White Paper

WSSF05-WP-0305. March 2005.

[104] Naveen Sastry, Umesh Shankar, and David Wagner. Secure verification of location

claims. In Proc. of the Second ACM Workshop on Wireless Security (WiSe’03), pages

1-10, September 2003.

[105] S. Y. Seidel and T. S. Rappaport. 914 MHz Path Loss Prediction Models for Indoor

Wireless Communications in Multifloored Buildings. IEEE Transactions on Antennas

and Propagation, 40(2):207-217, February 1992.

[106] Jason Small, Asim Smailagic, and Daniel P. Siewiorek. Determining User Location

For Context Aware Computing Through the Use of a Wireless LAN Infrastructure.

Technical report, Project Aura, Carnegie Mellon University, 2000.

[107] Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for

Ad-hoc Wireless Networks. In Proc. of 7th Security Protocols Workshop - LNCS,

volume 1796, pages 172-194, 1999.

[108] Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for

Ubiquitous Computing. IEEE Computer (Security & Privacy Supplement), 35(4):22-

26, April 2002.

Page 182: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

162 BIBLIOGRAPHY

[109] Ping Tao, Algis Rudys, Andrew Ladd, and Dan S. Wallach. Wireless LAN Location-

Sensing for Security Applications. In Proc. of the Second ACM Workshop on Wireless

Security (WiSe’03), pages 11-20, September 2003.

[110] O. Ureten and Nur Serinken. Detection of Radio Transmitter Turn-On Transients.

Electronic Letters, 35(23):1996-1997, November 1999.

[111] O. Ureten and Nur Serinken. Bayesian Detection of Wi-Fi Transmitter RF Finger-

prints. Electronic Letters, 41(6):373-374, March 2006.

[112] Srdjan Capkun and Jean-Pierre Hubaux. Secure Positioning of Wireless Devices with

Application to Sensor Networks. In Proc. of the Annual Joint Conference of the IEEE

Computer and Communications Societies (INFOCOM’05), pages 1917-1928, Miami,

FL, March 2005.

[113] Srdjan Capkun and Jean-Pierre Hubaux. Secure Positioning in Wireless Networks.

IEEE Journal on Selected Areas in Communications, 24(2):221-232, February 2006.

[114] Roy Want, Andy Hopper, Veronica Falc ao, and Jonathan Gibbons. The Active Badge

Location System. ACM Transactions on Information Systems, 10(1):91-102, January

1992.

[115] Brent R. Waters and Edward W. Felten. Secure, Private Proofs of Location. Technical

Report TR-667-03, Princeton University, Computer Science Dept., January 2003.

[116] L. Yang, P. Zerfos, and E. Sadot. Architecture Taxonomy for Control and Provisioning

of Wireless Access Points (CAPWAP). RFC 4118, IETF, June 2005.

[117] T. Ylonen and C. Lonvick. The Secure Shell (SSH) Authentication Protocol, RFC

4252, IETF. January 2006.

[118] T. Ylonen and C. Lonvick. The Secure Shell (SSH) Protocol Architecture, RFC 4251,

IETF. January 2006.

[119] Moustafa Youssef and Ashok Agrawala. WLAN Location Determination via Clus-

tering and Probability Distributions. In Proc. of the IEEE International Conference

on Pervasive Computing and Communcations (PerCom’03), pages 143-150, Dallas

Fort-Worth, TX, March 2003.

Page 183: SCALABLE LOCATION-BASED SECURITY IN WIRELESS …dbfaria/files/faria-dissertation.pdf · This dissertation presents a location-based approach to wireless security. It di ers from current

BIBLIOGRAPHY 163

[120] Moustafa Youssef and Ashok Agrawala. Handling Samples Correlation in the Horus

System. In Proc. of the Annual Joint Conference of the IEEE Computer and Com-

munications Societies (INFOCOM’04), pages 1023-1031, Honk Kong, March 2004.

[121] Moustafa Youssef and Ashok Agrawala. The Horus WLAN Location Determination

System. In Proc. of the Third International Conference on Mobile Systems, Applica-

tions, and Services (Mobisys’05), pages 205-218, Seattle, WA, June 2005.