Analog Man-in-the-Middle Attack Against Link-Based Packet Source Identification

被引:11
|
作者
Tung, Yu-Chih [1 ]
Shin, Kang G.
Kim, Kyu-Han
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
10.1145/2942358.2942361
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel attack model is proposed against the existing wireless link-based source identification, which classifies packet sources according to the physical-layer link signatures. A link signature is believed to be a more reliable indicator than an IP or MAC address for identifying packet source, as it is generally harder to modify/forge. It is therefore expected to be a future authentication against impersonation and DoS attacks. However, if an attacker is equipped with the same capability/hardware as the authenticator to process physical-layer signals, a link signature can be easily manipulated by any nearby wireless device during the training phase. Based on this finding, we propose an attack model, called the analog man-in-the-middle (AMITM) attack, which utilizes the latest full-duplex relay technology to inject semi-controlled link signatures into authorized packets and reproduce the injected signature in the fabricated packets. Our experimental evaluation shows that with a proper parameter setting, 90% of fabricated packets are classified as those sent from an authorized transmitter. A countermeasure against this new attack is also proposed for the authenticator to inject link-signature noise by the same attack methodology.
引用
收藏
页码:331 / 340
页数:10
相关论文
共 50 条
  • [21] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
    Tang, Huan-Rong
    Sun, Rou-Ling
    Kong, Wei-Qiang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
  • [22] Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
    Endo, Kosei
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 153 - 161
  • [23] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack
    Chowdhury, Abhijit
    Nath, Shubhajit
    Howlader, Jaydeep
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
  • [24] Man-in-the-Middle Attack on "Quantum Dialogue with Authentication Based on Bell States"
    Lin, Tzu-Han
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (09) : 3199 - 3203
  • [25] Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States”
    Tzu-Han Lin
    Ching-Ying Lin
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 3199 - 3203
  • [26] Profinet IO-device emulator based on the man-in-the-middle attack
    Baud, Michel
    Felser, Max
    2006 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION, VOLS 1 -3, 2006, : 1199 - +
  • [27] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
    Yurdagul, Muhammed Ali
    Sencar, Husrev Taha
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
  • [28] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN
    Kumar, Vikas
    Chakraborty, Sandip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
  • [29] Man-in-the-middle Pilot Attack for Physical Layer Authentication
    Wang Shaoyu
    Huang Kaizhi
    Xu Xiaoming
    Ma Keming
    Chen Yajun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3141 - 3148
  • [30] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923