Visible to the public Dissecting Customized Protocols: Automatic Analysis for Customized Protocols Based on IEEE 802.15.4

TitleDissecting Customized Protocols: Automatic Analysis for Customized Protocols Based on IEEE 802.15.4
Publication TypeConference Paper
Year of Publication2016
AuthorsChoi, Kibum, Son, Yunmok, Noh, Juhwan, Shin, Hocheol, Choi, Jaeyeong, Kim, Yongdae
Conference NameProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4270-4
Keywords6LoWPAN, automatic protocol reversing, composability, customized pan protocol, Metrics, pubcrawl, wireless spoofing attacks
Abstract

IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such as ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly for various Internet of Things (IoT) devices. Customized protocols are not usually publicly disclosed nor standardized. Moreover, unlike textual protocols (e.g., HTTP, SMTP, POP3.), customized protocols for IoT devices provide no clues such as strings or keywords that are useful for analysis. Instead, they use bits or bytes to represent header and body information in order to save power and bandwidth. On the other hand, they often do not employ encryption, fragmentation, or authentication to save cost and effort in implementations. In other words, their security relies only on the confidentiality of the protocol itself. In this paper, we introduce a novel methodology to analyze and reconstruct unknown wireless customized protocols over IEEE 802.15.4. Based on this methodology, we develop an automatic analysis and spoofing tool called WPAN automatic spoofer (WASp) that can be used to understand and reconstruct customized protocols to byte-level accuracy, and to generate packets that can be used for verification of analysis results or spoofing attacks. The methodology consists of four phases: packet collection, packet grouping, protocol analysis, and packet generation. Except for the packet collection step, all steps are fully automated. Although the use of customized protocols is also unknown before the collecting phase, we choose two real-world target systems for evaluation: the smart plug system and platform screen door (PSD) to evaluate our methodology and WASp. In the evaluation, 7,299 and 217 packets are used as datasets for both target systems, respectively. As a result, on average, WASp is found to reduce entropy of legitimate message space by 93.77% and 88.11% for customized protocols used in smart plug and PSD systems, respectively. In addition, on average, 48.19% of automatically generated packets are successfully spoofed for the first target systems.

URLhttp://doi.acm.org/10.1145/2939918.2939921
DOI10.1145/2939918.2939921
Citation Keychoi_dissecting_2016