winlab
play

WINLAB Contact: Liang Xiao lxiao@winlab.rutgers.edu With Profs. - PowerPoint PPT Presentation

Practical Implementations of Physical Practical Implementations of Physical Layer Authentication Layer Authentication WINLAB Contact: Liang Xiao lxiao@winlab.rutgers.edu With Profs. Larry Greenstein, Wade Trappe, Narayan Mandayam, and Dr.


  1. Practical Implementations of Physical Practical Implementations of Physical Layer Authentication Layer Authentication WINLAB Contact: Liang Xiao lxiao@winlab.rutgers.edu With Profs. Larry Greenstein, Wade Trappe, Narayan Mandayam, and Dr. Alex Reznik at InterDigital

  2. Fingerprints in the Ether (FP) uses channel Fingerprints in the Ether (FP) uses channel responses to detect spoofing attacks responses to detect spoofing attacks � In typical indoor environments, the wireless channel decorrelates rapidly in space � The channel response is hard to predict and to spoof � Utilize channel estimation to detect spoofing attacks for wireless networks -4 x 10 6 Loc 1 Loc 2 Loc 3 5 4 |H(f)| 3 2 1 0 4.9 4.95 5 5.05 5.1 Top View of Alcatel-Lucent’s Crawford f (GHz) Frequency Response over a 200-MHz Bandwidth Hill Laboratory, Holmdel, NJ WINLAB [2]

  3. Alice, Bob and Eve: A Simplified Spoofing Alice, Bob and Eve: A Simplified Spoofing Detection Scenario Detection Scenario TIME: k Alice transmits to Bob Bob H A Bob estimates channel response H A from Alice at time k Alice Probe Signal • Preambles or pilots • Assume static channel response WINLAB [3]

  4. Spoofing Detection Scenario (cont.) Spoofing Detection Scenario (cont.) TIME: k+ 1 Case 1: Alice is still transmitting Bob estimates H t at time k+ 1, Bob and compares with H A H t = H A Eve Alice Probe Signal Desired result: Bob accepts the transmission. WINLAB [4]

  5. Spoofing Detection Scenario (cont.) Spoofing Detection Scenario (cont.) Case 2: Eve is transmitting, pretending to be Alice. TIME: k+ 1 Bob estimates H t at time k+ 1, and Bob compares with H A H t = H E Probe Signal Alice Eve Desired result: Bob rejects the transmission. WINLAB [5]

  6. Extensive theoretical studies for FP have been Extensive theoretical studies for FP have been conducted conducted � We have theoretically analyzed the performance of FP in the detection of spoofing and Sybil attacks – L. Xiao, L. J. Greenstein, N. Mandayam, and W. Trappe, “ Fingerprints in the Ether: using the physical layer for wireless authentication, ” ICC ’ 07 . – --, “ MIMO-assisted channel-based authentication in wireless networks, ” CISS ’ 08 . – --, “ A physical-layer technique to enhance authentication for mobile terminals, ” ICC ’ 08 . – --, “ Using the physical layer for wireless authentication under time-variant channels, ” Trans. Wireless Comm., Jul, 2008. – --, “ Channel-based detection of Sybil attacks in wireless networks, ” Tran. Information Forensics & Security, in review. – --, “ Generalized channel-based spoofing detection in frequency-selective Rayleigh channels, ” Trans. Wireless Comm., in review. � However, in this talk we will only briefly review some important results and focus on the real implementation of FP WINLAB [6]

  7. A simple hypothesis test has been built in FP A simple hypothesis test has been built in FP for spoofing detection for spoofing detection � Observations: ) – H k + ( 1) (channel response to be tested) ) – H k (reference channel response) ( ) A � Hypothesis test: + = + H 0 : H k H k ( 1) ( 1) No Spoofing To cope with A oscillator + ≠ + H k H k Spoofing!!! ( 1) ( 1) H 1 : A drifting ) ) ( ) ) ) 2 � Test statistics: H + jArg H k H k ( 1) ( ) = + − L H k H k e A ( 1) ( ) A – Simplified version of the generalized likelihood ratio test � Rejection region of H 0 : Test statistic >Threshold, η WINLAB [7]

  8. Performance of FP in Snapshot Scenario Performance of FP in Snapshot Scenario � Detection metrics for FP in snapshot scenario: – False Alarm Rate : The probability of falsely rejecting Alice, α = > η P L ( | No spoofing) – Miss Rate : The probability of missing the detection of Eve, β = ≤ η P L ( |Spoofing) � Given maximum false alarm rate, the test threshold of FP can be derived by using Neyman-Pearson test � “Snapshot” scenario: – Two moments (time k and k +1) – A reliable reference channel record always exists (“Bob knows”) WINLAB [8]

  9. A double- -layer authentication protocol is layer authentication protocol is A double used to integrate FP in real systems used to integrate FP in real systems � Reliable reference channel response may not always exist because - – Message is the first sent by a user – Channel response decorrelates (elapsed channel coherence time) – Previous spoofing message accepted by FP � Double-layer authentication – FP maintains a reference channel record for each active user � Each reference CIR record expires after N T N T is an important parameter � Design goal: N T <channel coherence time – Higher-layer processing may include some security mechanism � May be sophisticated (e.g., 802.11i), or very simple (even nominal in some simple systems) – Embed the snapshot performance of FP ( α , β ) into a more realistic context, where we cannot assume that Bob knows true Alice-Bob channel WINLAB [9]

  10. Flowchart of Double- -Layer Authentication Protocol Layer Authentication Protocol Flowchart of Double � Higher-layer process only deals with messages that haven ’ t been filtered out by FP � FP algorithm filters out most spoofing messages Suspend Accept Reject WINLAB [10]

  11. Performance of FP Performance of FP � The generalized performance of FP, (false alarm rate P FA and miss rate P M ), depends on attack pattern, snapshot FP performance, and channel coherence time ( N T ) � We upper bound its performance by assuming ideal higher-layer process: ( ) ( ) N = α − α − − T 1 1 P P P FA a FA ( ) ( ) ( ) N = β + − β − − T 1 1 1 P P P M a FA – Fraction P a of messages sent by Alice � Benefits of FP techniques – Significantly reduce the workload of the higher-layer functions from C to C ((1 -P a ) P M + P a (1- P FA )), which is 0 . 74 C with P a = .8 and P FA =P M = .1 – Slightly increase the overall system false alarm rate while dramatically decrease the overall miss rate, for some “naked” wireless sensor systems WINLAB [11]

  12. Implementation Challenges of FP in 802.11 Implementation Challenges of FP in 802.11 � The WiFi system bandwidth is not always wide enough to provide a very high resolution for the multipath phenomenon inside an office building – Want better performance? Answer: MIMO techniques (802.11n) � The CIR data provided by an 802.11 device are scaled and corrupted by many factors – Receiver thermal noise & phase drifting: addressed by FP – Timing or frequency estimation error � Knowledge of some channel parameters, such as the channel coherence time, may be not available. WINLAB [12]

  13. Verification of the performance of FP in 802.11 Verification of the performance of FP in 802.11 systems was done by field tests on a WiFi WiFi testbed testbed systems was done by field tests on a Eve Alice Bob KOP site, InterDigital WINLAB [13]

  14. Some Results: Its false alarm rate and miss rate in Some Results: Its false alarm rate and miss rate in spoofing detection are mostly below 5%. spoofing detection are mostly below 5%. 0.06 α Workload of higher-layer β 0.05 P FA functions reduced by P M ~30% 0.04 Probability False alarm rate 0.03 0.02 0.01 Miss rate 0 2 3 4 5 6 7 8 Test threshold ), and the snapshot performance ( α and β ), obtained by FP performance ( P FA and P m three-board field test, with N T =2, P a =70% of the received messages sent by Alice. WINLAB [14]

  15. Conclusion & Future Work Conclusion & Future Work � We propose a double-layer authentication protocol to integrate the fingerprinting (FP) algorithm into real wireless systems, which either provides some degree of spoofing detection for a “naked” wireless system, or reduces the workload of the higher-layer processing – Performance analysis in a generalized scenario – Implementation in 802.11 systems – Field test results � Future work: – How to further quantify the performance gain of FP, in terms of computation time or complexity? – Further performance evaluation using more offline/online field tests WINLAB [15]

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend