Top Banner
©2011 Patrick Tague Wireless Network Security 14-814 – Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior
26

Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

Aug 22, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Wireless Network Security14-814 – Spring 2011

Patrick Tague

Feb 15, 2011

SURVEY: MAC Layer Misbehavior

Page 2: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Announcements• I'd like to talk with each project team in the

next week to get a quick progress update– Contact me to set up a time

Page 3: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Survey: MAC Misbehavior• Theme: offensive techniques for protocol

misbehavior at the MAC layer and detection of such behaviors in 802.11 networks

• Papers:– Čagalj et al., “On Cheating in CSMA/CA Ad Hoc

Networks”, EPFL-IC Tech. Report IC/2004/27 (similar to version from INFOCOM 2005).

– Raya et al., “DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots”, IEEE Trans. Mobile Computing, v. 5, n. 12, Dec. 2006.

– Broustis et al., “FIJI: Fighting Implicit Jamming in 802.11 WLANs”, SecureComm 2009.

Page 4: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

MAC Layer Misbehavior• MAC is all about timing: when should you “talk”• Selfish and malicious nodes are free to transmit

whenever they desire– Selfish nodes can transmit early, while others follow

protocols and wait politely– Malicious nodes can use well-timed transmissions to

intentionally interfere with MAC operation and/or reception

– Malicious nodes can initiate channel reservations and then not use them, denying availability to others

Page 5: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

802.11 MAC

Page 6: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Cheating in CSMA/CA[Čagalj et al., 2004]

• “CSMA/CA was designed with the assumption that the nodes would play by the rules”– MAC cheaters deliberately fail to follow the IEEE

802.11 protocol, in particular in terms of the contention window size and backoff

Page 7: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

• N tx-rx pairs in a single collision domain, using 802.11, C of N are cheaters with control of MAC layer parameters

• Cheaters want to maximize avg. throughput ri• As a game:– Each player (cheater) adjusts its contention window

size Wi to maximize utility Ui = ri– Players react to changes of remaining N-C users who

play by the rules

• Authors analyze relationships between throughput and contention window sizes

System Game Model

Page 8: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Single Static Cheater• First case: a single cheater with a fixed strategy

(i.e. makes a decision and sticks with it)

• A single cheater gets best throughput at Wi=1

• In fact, Wi=1 is the Nash Equilibrium for the static game with C=1

Page 9: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Multiple Static Cheaters• Second case: many cheaters with fixed strategy– 2.1 Cheaters don't know about each other– 2.2 Cheaters are aware of cheater v. cheater

competition in forming strategies

• Window size Wi=1 is no longer optimal

Page 10: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Dynamic Cheating Game• In the dynamic game, cheaters can change their

strategy in response to other players (including other cheaters)– A penalty is enforced on the utility function, so

cheaters converge to the optimal operating point – “Cooperative cheaters” can inflict the penalty on

“non-cooperative cheaters” by jamming their packets

Page 11: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Distributed/Adaptive Cheating• Cheaters can observe actual throughput and

jamming to adapt contention window size– Cheaters are forced to cooperate or get lower

throughput due to penalization from other cheaters

Page 12: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Detecting Greedy Behavior[Raya et al., 2006]

• Detection Of greedy behavior in the Mac layer of Ieee 802.11 public NetwOrks (DOMINO)– Software installed at/near the access point that can

detect and identify greedy players– No changes to software of benign players

Page 13: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

DOMINO Architecture

Page 14: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Behavior Tests• The DOMINO-enabled AP performs a number of

behavioral tests as a decision-making basis– Scrambled / re-transmitted frames– Shorter than DIFS– Oversized NAV

– Observed back-off

– Consecutive back-off

Page 15: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

UDP vs. TCP Traffic• Impact of misbehavior varies for different types

of target traffic– Disparity between cheater and benign users is higher

in UDP case

Page 16: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

UDP vs. TCP Detection• Traffic type also has significant impact on

detection capabilities of DOMINO– Actual back-off test in UDP vs. Consecutive back-off

test in TCP• TCP congestion control causes additional timing-related

behaviors that can cause detection error

Page 17: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Further Discussions in Paper• The DOMINO paper talks about a lot of different

types of misbehavior– Jamming attacks, timing misbehavior, etc.

• Design of a deployable system– Lots of design parameters that have to be chosen– Analysis of numerous types of misbehavior– Incorporation of security mechanisms, quality of

service, wireless error scenarios (e.g., hidden terminal)

Page 18: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Implicit Jamming in 802.11[Broustis et al., 2009]

• 802.11 has a built-in fairness mechanism that basically allows all users to get the same long-term throughput– A clever attacker can take advantage of this property

to deny service to others by jamming a single user– Degradation of the single user effectively starves the

other users

Page 19: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Implicit Jamming• Low-power jammer attacks a single nearby

node, degrades throughput for every user using the same AP

Page 20: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Mitigating Implicit Jamming• FIJI: anti-jamming mitigation of the implicit

jamming attack– Goal 1: ensure that nodes not under attack are not

indirectly affected by the attack– Goal 2: ensure that the maximum amount of traffic is

delivered to the node under attack, given that the node is under attack

– Both goals rely on explicit detection of the jamming atack

Page 21: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

FIJI Detection Component• Detection module– Since FIJI is run/managed entirely at the AP,

detection must also take place there; not typical jamming attack detection

– Standard jamming detection mechanisms (e.g., using RSSI+PDR) don't apply, need other metrics

– Instead, look for changes in transmission delay• Very large increment in measured transaction time indicates

the node is under attack

Page 22: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

FIJI Traffic Component• Adjust the traffic patterns to all clients based on

detection events– Trivial solution: don't send any data to jammed

clients, but this is unfair and could lead to big problems if any detection errors occur

– Accept traffic degradation to attacked node, but keep traffic patterns constant for other nodes

– Two approaches to deal with the attacked node:• Adjust the data packet size: shorter packet fragments are

more likely to get through• Adjust the data rate: send to the jammed nodes less often

Page 23: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

FIJI Evaluation

Page 24: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Summary• Discussed three papers that discuss MAC layer

cheating, attacks, and detection– Game theoretic modeling of rational cheating

• Čagalj et al., “On Cheating in CSMA/CA Ad Hoc Networks”, EPFL-IC Tech. Report IC/2004/27 (~INFOCOM 2005).

– Detecting misbehavior with tests• Raya et al., “DOMINO: Detecting MAC Layer Greedy Behavior

in IEEE 802.11 Hotspots”, IEEE Trans. Mobile Computing, v. 5, n. 12, Dec. 2006.

– Implicit jamming leveraging 802.11 fairness• Broustis et al., “FIJI: Fighting Implicit Jamming in 802.11

WLANs”, SecureComm 2009.

Page 25: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Questions?

Page 26: Wireless Network Securitymews.sv.cmu.edu/teaching/14814/s11/files/tague_14814s11...misbehavior at the MAC layer and detection of such behaviors in 802.11 networks • Papers: – Čagalj

©2011 Patrick Tague

Discussion Questions• Is it reasonable to assume that cheaters are

“rational” (in the game-theoretic sense)?

• Is a system like DOMINO ultimately scalable, given the number of tests and factors that must be considered to handle all misbehavior types?

• Which is better, FIJI detection and mitigation or removing the fairness mechanisms from 802.11?