Analog Man-in-the-Middle Attack Against Link-Based Packet Source Identification

被引:11
|
作者
Tung, Yu-Chih [1 ]
Shin, Kang G.
Kim, Kyu-Han
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
10.1145/2942358.2942361
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel attack model is proposed against the existing wireless link-based source identification, which classifies packet sources according to the physical-layer link signatures. A link signature is believed to be a more reliable indicator than an IP or MAC address for identifying packet source, as it is generally harder to modify/forge. It is therefore expected to be a future authentication against impersonation and DoS attacks. However, if an attacker is equipped with the same capability/hardware as the authenticator to process physical-layer signals, a link signature can be easily manipulated by any nearby wireless device during the training phase. Based on this finding, we propose an attack model, called the analog man-in-the-middle (AMITM) attack, which utilizes the latest full-duplex relay technology to inject semi-controlled link signatures into authorized packets and reproduce the injected signature in the fabricated packets. Our experimental evaluation shows that with a proper parameter setting, 90% of fabricated packets are classified as those sent from an authorized transmitter. A countermeasure against this new attack is also proposed for the authenticator to inject link-signature noise by the same attack methodology.
引用
收藏
页码:331 / 340
页数:10
相关论文
共 50 条
  • [31] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    Quantum Information Processing, 2014, 13 : 917 - 923
  • [32] Man-in-the-Middle Attack Mitigation in Internet of Medical Things
    Salem, Osman
    Alsubhi, Khalid
    Shaafi, Aymen
    Gheryani, Mostafa
    Mehaoua, Ahmed
    Boutaba, Raouf
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2053 - 2062
  • [33] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223
  • [34] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [35] Toward a hardware man-in-the-middle attack on PCIe bus
    Khelif, Mohamed Amine
    Lorandel, Jordane
    Romain, Olivier
    Regnery, Matthieu
    Baheux, Denis
    Barbu, Guillaume
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [36] Defense against man-in-the-middle attack in client-server systems with secure servers
    Serpanos, DN
    Lipton, RJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2966 - 2970
  • [37] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [38] Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems
    Choi, Jinchun
    Ahn, Bohyun
    Bere, Gomanth
    Ahmad, Seerin
    Mantooth, Homer Alan
    Kim, Taesic
    2021 IEEE DESIGN METHODOLOGIES CONFERENCE (DMC), 2021,
  • [39] Secret key generation based on private pilot under man-in-the-middle attack
    Huang, Yu
    Jin, Liang
    Li, Na
    Zhong, Zhou
    Xu, Xiaoming
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (10)
  • [40] Revisiting man-in-the-middle attacks against HTTPS
    Kampourakis V.
    Kambourakis G.
    Chatzoglou E.
    Zaroliagis C.
    Network Security, 2022, 2022 (03)