On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, - - PowerPoint PPT Presentation

on the security of carrier phase based ranging
SMART_READER_LITE
LIVE PREVIEW

On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, - - PowerPoint PPT Presentation

On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun Importance of Secure Proximity Verification Aanjhan Ranganathan On the Security of Carrier Phase-based Ranging 2 Importance of Secure


slide-1
SLIDE 1

On the Security of Carrier Phase-based Ranging

Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun

slide-2
SLIDE 2

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Importance of Secure Proximity Verification

2

slide-3
SLIDE 3

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Importance of Secure Proximity Verification

2

slide-4
SLIDE 4

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Importance of Secure Proximity Verification

2

slide-5
SLIDE 5

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Importance of Secure Proximity Verification

2

slide-6
SLIDE 6

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Importance of Secure Proximity Verification

2

Distance is determined using a variety of methods (e.g., based on received signal strength, time of flight etc.)

slide-7
SLIDE 7

Physical-layer Techniques for Secure Proximity Verification & Localization

Estimating Distance

3

d

Received Signal Strength (RSS)

ttof tp

d = c * (ttof - tp) / 2

Time of Flight (ToF)

slide-8
SLIDE 8

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

slide-9
SLIDE 9

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

slide-10
SLIDE 10

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

slide-11
SLIDE 11

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

slide-12
SLIDE 12

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

slide-13
SLIDE 13

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Attacks on Proximity Systems

4

No knowledge of the data exchanged is required! Independent of cryptographic primitives

slide-14
SLIDE 14

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Multi-carrier Phase Ranging

5

  • Cost optimised solution for proximity-based applications
  • Low-hardware complexity, low-power consumption, high precision
  • Compliant with prominent standards such as WiFi, ZigBee
  • Localization schemes* leveraging signal phase information are

increasingly becoming popular

  • 802.11, NB-IoT, LoRa, 5G networks

* Vasisht, Deepak, Swarun Kumar, and Dina Katabi. "Decimeter-Level Localization with a Single WiFi Access Point." NSDI 2016. * Xiong, J., Sundaresan, K., Jamieson, K. “Tonetrack: Leveraging frequency-agile radios for time-based indoor wireless localization.” MobiCom 2015. * Exel, R. “Carrier-based ranging in ieee 802.11 wireless local area networks.” IEEE Wireless Communications and Networking Conference (WCNC) 2013.

slide-15
SLIDE 15

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Motivation

6

  • Implications of distance modification attacks are significant
  • loss of property to even human life (e.g., IMD access control)
  • Security of multi-carrier phase ranging has not be analysed yet.
  • number of prior works on other prominent ranging systems*
slide-16
SLIDE 16

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

slide-17
SLIDE 17

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

  • Investigate the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • focus on distance reduction attacks
  • no knowledge of the implemented cryptographic primitive (if any) required
slide-18
SLIDE 18

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

  • Investigate the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • focus on distance reduction attacks
  • no knowledge of the implemented cryptographic primitive (if any) required
  • Three different attack realisations (varying attacker complexity)
slide-19
SLIDE 19

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

  • Investigate the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • focus on distance reduction attacks
  • no knowledge of the implemented cryptographic primitive (if any) required
  • Three different attack realisations (varying attacker complexity)
  • Experiments show that it is possible to reduce the estimated distance to

less than 3 m even though the devices were more than 50 m apart

slide-20
SLIDE 20

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

  • Investigate the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • focus on distance reduction attacks
  • no knowledge of the implemented cryptographic primitive (if any) required
  • Three different attack realisations (varying attacker complexity)
  • Experiments show that it is possible to reduce the estimated distance to

less than 3 m even though the devices were more than 50 m apart

50 m

slide-21
SLIDE 21

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Contributions

7

  • Investigate the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • focus on distance reduction attacks
  • no knowledge of the implemented cryptographic primitive (if any) required
  • Three different attack realisations (varying attacker complexity)
  • Experiments show that it is possible to reduce the estimated distance to

less than 3 m even though the devices were more than 50 m apart

50 m < 3 m

slide-22
SLIDE 22

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Phase-based Ranging

8

d

θ Δ θ Δ

7

slide-23
SLIDE 23

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Phase-based Ranging

8

θ

d = c 2 · f · ( θ 2π + n)

d

θ Δ θ Δ

7

slide-24
SLIDE 24

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Phase-based Ranging

8

θ

d = c 2 · f · ( θ 2π + n)

d

θ Δ θ Δ

7

ambiguity!

slide-25
SLIDE 25

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Phase-based Ranging

8

θ

d = c 2 · f · ( θ 2π + n)

f1 f2 θ1 θ2

d = c 4π · θ2 − θ1 f2 − f1

d

θ Δ θ Δ

7

ambiguity!

slide-26
SLIDE 26

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Distance Decreasing Relay Attacks

9

slide-27
SLIDE 27

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Distance Decreasing Relay Attacks

9

System Assumption

  • Two entities, verifier (e.g., car) and a prover (e.g., key) estimate distance

using multicarrier phase ranging technology

  • Verifier and prover implement some form of cryptographic authentication
slide-28
SLIDE 28

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Distance Decreasing Relay Attacks

9

System Assumption

  • Two entities, verifier (e.g., car) and a prover (e.g., key) estimate distance

using multicarrier phase ranging technology

  • Verifier and prover implement some form of cryptographic authentication

Attacker Model

  • Verifier and prover are trusted and assumed to be honest
  • External attacker tries to reduce the estimated distance between a honest

prover and verifier

slide-29
SLIDE 29

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

d = c 4π · θ2 − θ1 f2 − f1

Distance

f1 f2 θ1 θ2

slide-30
SLIDE 30

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

d = c 4π · θ2 − θ1 f2 − f1

Distance

dmax =

c 4π · ∆θmax ∆f

Maximum measurable distance

f1 f2 θ1 θ2

slide-31
SLIDE 31

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

0 to 2π

d = c 4π · θ2 − θ1 f2 − f1

Distance

dmax =

c 4π · ∆θmax ∆f

Maximum measurable distance

f1 f2 θ1 θ2

slide-32
SLIDE 32

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

dmax = c

2 · 1 ∆f

0 to 2π

d = c 4π · θ2 − θ1 f2 − f1

Distance

dmax =

c 4π · ∆θmax ∆f

Maximum measurable distance

f1 f2 θ1 θ2

slide-33
SLIDE 33

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

dmax = c

2 · 1 ∆f

0 to 2π

∆f

e.g., = 2 MHz, then dmax = 75 m after which distance rollsover back to 0

d = c 4π · θ2 − θ1 f2 − f1

Distance

dmax =

c 4π · ∆θmax ∆f

Maximum measurable distance

f1 f2 θ1 θ2

slide-34
SLIDE 34

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 10

Phase slope Rollover Attack

dmax = c

2 · 1 ∆f

0 to 2π

∆f

e.g., = 2 MHz, then dmax = 75 m after which distance rollsover back to 0

d = c 4π · θ2 − θ1 f2 − f1

Distance

dmax =

c 4π · ∆θmax ∆f

Maximum measurable distance

Attacker leverages this maximum measurable distance property to reduce the estimated distance

f1 f2 θ1 θ2

slide-35
SLIDE 35

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 11

V P θ t Δt θ Δt

Phase slope Rollover Attack

slide-36
SLIDE 36

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 11

V P θ t Δt θ Δt

Phase slope Rollover Attack

0.2 0.4 0.6 0.8 Delay [7s] 20 40 60 80

Measured Distance [m]

∆f = 2 MHz, then dmax = 75 m

slide-37
SLIDE 37

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 11

V P θ t Δt θ Δt

Phase slope Rollover Attack

0.2 0.4 0.6 0.8 Delay [7s] 20 40 60 80

Measured Distance [m]

∆f = 2 MHz, then dmax = 75 m

500 ns

slide-38
SLIDE 38

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Practical Demonstration of the Attack

12

~50m

dap 3 4 2 1

Experimental Setup

  • Two Atmel AT86RF233 multicarrier phase ranging
  • devices. (1) prover, (3) verifier
  • Attacker hardware (2): USRP and two directional

antennas

  • delay logic implemented directly on the FPGA
  • Laptop (4) records the verifier’s distance estimates
slide-39
SLIDE 39

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan 13 13

relay switched on

Practical Demonstration of the Attack

slide-40
SLIDE 40

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

RF Cycle Slip Attack

14

V P θ t Δt1 θ Δt2

The attacker intercepts the prover’s signal and delays each frequency individually. Requires nanosecond level control of the relay signal Limitation: Attacker needs very high sampling rate. May alternatively use analog delay lines.

d = c 4π · θ2 − θ1 f2 − f1

slide-41
SLIDE 41

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

RF Cycle Slip Attack

14

V P θ t Δt1 θ Δt2

The attacker intercepts the prover’s signal and delays each frequency individually. Requires nanosecond level control of the relay signal Limitation: Attacker needs very high sampling rate. May alternatively use analog delay lines.

d = c 4π · θ2 − θ1 f2 − f1

slide-42
SLIDE 42

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sa(t) sif(t) sp(t)

slide-43
SLIDE 43

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sA(t) = sif(t) ⊗ sP (t)

= cos(4πft + θA) ⊗ cos(2πft + θap)

sa(t) sif(t) sp(t)

slide-44
SLIDE 44

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sA(t) = sif(t) ⊗ sP (t)

= cos(4πft + θA) ⊗ cos(2πft + θap)

sa(t) sif(t) sp(t)

slide-45
SLIDE 45

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sA(t) = sif(t) ⊗ sP (t)

= cos(4πft + θA) ⊗ cos(2πft + θap)

LP

=

1 2 cos

⇣ 2πft + θA − θap ⌘

sa(t) sif(t) sp(t)

slide-46
SLIDE 46

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sA(t) = sif(t) ⊗ sP (t)

= cos(4πft + θA) ⊗ cos(2πft + θap)

LP

=

1 2 cos

⇣ 2πft + θA − θap ⌘

sa(t) sif(t) sp(t)

slide-47
SLIDE 47

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

On-the-fly Phase Manipulation

15

θ t V P θap θA θA-θap

sA(t) = sif(t) ⊗ sP (t)

= cos(4πft + θA) ⊗ cos(2πft + θap)

LP

=

1 2 cos

⇣ 2πft + θA − θap ⌘

sa(t) sif(t) sp(t) Almost real time except for the delay from the mixer, low pass filter

slide-48
SLIDE 48

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Possible Countermeasures

16

  • Frequency Hopping
  • nly valid if attacker is incapable of processing a wide band of frequencies
  • simultaneously. Very weak assumption.
  • Rough Time of Flight Estimation
  • available bandwidth limits the precision of the time of flight estimates
  • still vulnerable to On-the-fly and RF cycle slip attacks
  • Random Phase Shifted Prover’s response
  • prover introduces random (but agreed apriori with the verifier) phase shifts in its response
  • forces the attacker to estimate the phase (can’t pre-calculate)
  • does not prevent rollover attacks
slide-49
SLIDE 49

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Possible Countermeasures

16

  • Frequency Hopping
  • nly valid if attacker is incapable of processing a wide band of frequencies
  • simultaneously. Very weak assumption.
  • Rough Time of Flight Estimation
  • available bandwidth limits the precision of the time of flight estimates
  • still vulnerable to On-the-fly and RF cycle slip attacks
  • Random Phase Shifted Prover’s response
  • prover introduces random (but agreed apriori with the verifier) phase shifts in its response
  • forces the attacker to estimate the phase (can’t pre-calculate)
  • does not prevent rollover attacks

Increases system complexity, makes phase ranging redundant

slide-50
SLIDE 50

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Summary

17

  • Investigated the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • Showed that it is possible to reduce the estimated distance to less than 3 m

even though the devices were more than 50 m apart

  • Phase-based ranging systems are not suitable for security-critical

applications

slide-51
SLIDE 51

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Summary

17

  • Investigated the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • Showed that it is possible to reduce the estimated distance to less than 3 m

even though the devices were more than 50 m apart

  • Phase-based ranging systems are not suitable for security-critical

applications

Are we really close? Verifying Proximity in Wireless Systems Aanjhan Ranganathan and Srdjan Capkun IEEE Security & Privacy Magazine, July-August edition, 2017

slide-52
SLIDE 52

On the Security of Carrier Phase-based Ranging Aanjhan Ranganathan

Summary

17

  • Investigated the vulnerability of carrier phase-based ranging system to

distance modification attacks

  • Showed that it is possible to reduce the estimated distance to less than 3 m

even though the devices were more than 50 m apart

  • Phase-based ranging systems are not suitable for security-critical

applications Thank you

www.aanjhan.com

Are we really close? Verifying Proximity in Wireless Systems Aanjhan Ranganathan and Srdjan Capkun IEEE Security & Privacy Magazine, July-August edition, 2017