Visible to the public Analog Man-in-the-middle Attack Against Link-based Packet Source Identification

TitleAnalog Man-in-the-middle Attack Against Link-based Packet Source Identification
Publication TypeConference Paper
Year of Publication2016
AuthorsTung, Yu-Chih, Shin, Kang G., Kim, Kyu-Han
Conference NameProceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4184-4
Keywordscommand injection attacks, composability, injection, injection attacks, Metrics, pubcrawl, Resiliency
Abstract

A novel attack model is proposed against the existing wireless link-based source identification, which classifies packet sources according to the physical-layer link signatures. A link signature is believed to be a more reliable indicator than an IP or MAC address for identifying packet source, as it is generally harder to modify/forge. It is therefore expected to be a future authentication against impersonation and DoS attacks. However, if an attacker is equipped with the same capability/hardware as the authenticator to process physical-layer signals, a link signature can be easily manipulated by any nearby wireless device during the training phase. Based on this finding, we propose an attack model, called the analog man-in-the-middle (AMITM) attack, which utilizes the latest full-duplex relay technology to inject semi-controlled link signatures into authorized packets and reproduce the injected signature in the fabricated packets. Our experimental evaluation shows that with a proper parameter setting, 90% of fabricated packets are classified as those sent from an authorized transmitter. A countermeasure against this new attack is also proposed for the authenticator to inject link-signature noise by the same attack methodology.

URLhttp://doi.acm.org/10.1145/2942358.2942361
DOI10.1145/2942358.2942361
Citation Keytung_analog_2016