Analog Man-in-the-Middle Attack Against Link-Based Packet Source Identification

被引:11
|
作者
Tung, Yu-Chih [1 ]
Shin, Kang G.
Kim, Kyu-Han
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
10.1145/2942358.2942361
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel attack model is proposed against the existing wireless link-based source identification, which classifies packet sources according to the physical-layer link signatures. A link signature is believed to be a more reliable indicator than an IP or MAC address for identifying packet source, as it is generally harder to modify/forge. It is therefore expected to be a future authentication against impersonation and DoS attacks. However, if an attacker is equipped with the same capability/hardware as the authenticator to process physical-layer signals, a link signature can be easily manipulated by any nearby wireless device during the training phase. Based on this finding, we propose an attack model, called the analog man-in-the-middle (AMITM) attack, which utilizes the latest full-duplex relay technology to inject semi-controlled link signatures into authorized packets and reproduce the injected signature in the fabricated packets. Our experimental evaluation shows that with a proper parameter setting, 90% of fabricated packets are classified as those sent from an authorized transmitter. A countermeasure against this new attack is also proposed for the authenticator to inject link-signature noise by the same attack methodology.
引用
收藏
页码:331 / 340
页数:10
相关论文
共 50 条
  • [41] Secret key generation based on private pilot under man-in-the-middle attack
    Yu Huang
    Liang Jin
    Na Li
    Zhou Zhong
    Xiaoming Xu
    Science China Information Sciences, 2017, 60
  • [42] Defense against DNS Man-In-The-Middle Spoofing
    Bai, Xiaolong
    Hu, Liang
    Song, Zixing
    Chen, Feiyan
    Zhao, Kuo
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 312 - 319
  • [43] Secret key generation based on private pilot under man-in-the-middle attack
    Yu HUANG
    Liang JIN
    Na LI
    Zhou ZHONG
    Xiaoming XU
    Science China(Information Sciences), 2017, 60 (10) : 93 - 106
  • [44] Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack
    Anggoro, Oldyson
    Dzulfikar, Muhammad
    Purwandari, Betty
    Mishbah, Muhammad
    2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS), 2019, : 109 - 114
  • [45] Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
    Anada, Hiroaki
    Arita, Seiko
    PROVABLE SECURITY, 2010, 6402 : 18 - 34
  • [46] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [47] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
    Alhazmi, Shatha
    Kandel, Prashanna
    Sabovik, Jayne
    Matondo-Mvula, Nadine
    Elleithy, Khaled
    2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
  • [48] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
    Arnaldy, Defiana
    Perdana, Audhika Rahmat
    2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
  • [49] Light-Weight Solution to Defend Implantable Medical Devices Against Man-In-The-Middle Attack
    Belkhouja, Taha
    Mohamed, Amr
    Al-Ali, Abdulla K.
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [50] Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack
    Li, Yucheng
    Pu, Cong
    2020 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2020), 2020, : 92 - 97