750 likes | 933 Views
Xiuzhen Cheng cheng@gwu.edu. Csci 388 Wireless and Mobile Security – MAC Layer Misbehavior, DoS. Outline. 802.11 MAC Management 802.11 DoS Attacks: Discussion and More Break (5 minutes) 802.11 MAC Layer Misbehavior Detection and Handling Discussion on DOMINO.
E N D
Xiuzhen Chengcheng@gwu.edu Csci388Wireless and Mobile Security – MAC Layer Misbehavior, DoS
Outline • 802.11 MAC Management • 802.11 DoS Attacks: Discussion and More • Break (5 minutes) • 802.11 MAC Layer Misbehavior Detection and Handling • Discussion on DOMINO
Frame Control (2) Duration ID (2) Address 1 (6) Address 2 (6) Address 3 (6) Sequence Control (2) Address 4 (6) Data (0-2312) CRC (4) Protocol version Type Subtype To DS From DS More Frag Retry Power Mgmt More Data WEP Order IEEE 802.11 MAC Packet Structure • Packet Type: Management (00), Control (01), and Data (10) • Subtype: In control – RTS, CTS, ACK, etc • MAC frames can be transmitted between mobile stations, between mobile stations and an AP, and between APs over a DS • Address Interpretation
MAC Synchronization • In infrastructure network: • The AP is responsible for generating beacons which contains a valid time stamp • If the channel is in use,defer beacon transmission until it is free
MAC Synchronization – (cont.) • Adhoc Network: • Every station is responsible for generating its beacon • All stations compete for transmission of the beacon using a standard backoff algorithm • All others adjust their times according to the winning station
Power Management • Power states for a STA: • awake - fully powered • doze – low power, cannot transmit/receive • PM in Infrastructure Networks • when enter doze mode, STAs inform AP • AP buffers frames for STAs in doze mode • AP sends beacons periodically • beacon contains time stamp + Traffic Indication Map (TIM) • STA wakes up to get the beacon(check TIM) • if traffic is pending, stay awake until transmission complete
Power Management – (cont.) • PM in Ad-hoc Networks • ATIM window • traffic for stations in doze mode is announced during ATIM window • all stations are awake during ATIM window • both ATIMs and DATA are acknowledged and use standard backoff algorithm.
What is a DoS Attack ? • Denying genuine users a particular service • In our context, preventing transmission of data to/from stations
Vulnerabilities in 802.11 • Two kinds of vulnerabilities • Identity vulnerabilities • MAC vulnerabilities
Identity Vulnerabilities • Arise because of the implicit trust placed in the source address • No verification of source’s identity • Causes 2 kinds of attacks: • Deauthentication and Disassociation attacks • Power saving mode attack
Deauthentication and Disassociation Attack • Authentication Mechanism • Client sends authentication request to AP • AP sends back response • Client then sends association request • AP responds accordingly • Problem: • Explicit message for deauthentication sent in the clear, without being authenticated by keying material. • This message can be spoofed
Deauthentication and Disassociation Attack • The spoofed deauthentication message causes the communication between client and AP to be suspended. Hence, attacker has achieved DoS • Client must reauthenticate to resume communication • Attacker should be careful to spoof the deauthentication message only when a successful authentication has taken place • Similar attack can be carried out by spoofing the disassociation message, since that message is also sent in the clear. • From the attackers perspective, disassociation attack is less effective compared to deauthentication attack.
Power Saving Mode Attack (1) • Power Conservation Mechanism • Client enters sleep mode intermittently • AP buffers data during that time • Either client awakens and sends a poll message to AP for pending data, or AP broadcasts a periodic Traffic Indication Map (TIM) message conveying availability of pending data • AP delivers data and clears its buffer • Problem: • Attacker can spoof either the poll message or TIM message, as these are sent unauthenticated • For the same reason, attackers can spoof the TSF packet to cause nodes out of synchronization
Power Saving Mode Attack (2) • Big problem: • Other management messages can also be spoofed, thereby making these attacks more effective • Solution • Simply, encrypt these messages like the data messages, using WEP. Works?
MAC Vulnerabilities • Arise because of the collision avoidance mechanism of the 802.11 MAC layer • Carrier sense is down in two layers • Cause two kinds of attacks: • Time window attack • Virtual carrier sense attack
Time Window attack • 802.11 MAC defines time windows to prioritize access to the channel • Two time windows - Short interframe space (SIFS) for existing frame exchange and Distributed interframe space (DIFS) for new frame exchange with SIFS<DIFS • Every STA has to wait at least SIFS before transmitting • Therefore, the attacker can completely monopolize the channel by sending a signal before the end of every SIFS interval • However, there is a problem with the attack • Resource intensive – Since SIFS is 28 µs (802.11b), the attacker will have to send a signal approx. 37,000 times per second
Virtual Carrier Sense Attack • Carrier Sensing Mechanism • To prevent collisions, station sends a short Request-to-Send (RTS) message • RTS contains a Duration field specifying the time for which the sender requires the channel • Receiver responds with Confirm-to-Send (CTS) if it is ready to receive data • CTS contains the updated Duration field • Other stations within the range set their Network Allocation Vector (NAV) such that they do not transmit for the time specified in the Duration field • Duration field is present in all 802.11 frames, so any frame can be used to carry out this attack
Virtual Carrier Sense Attack • Problems • The attacker can set Duration field to high values (maximum 32767), preventing channel access to others • Assuming attacker sets maximum value, he has to transmit only 30 times per second, therefore, easy for the attacker • Attack RTS is more efficient since it will always be replied by a well-behaved receiver!
Practical Perspective • DoS attacks are theoretically possible, but what about actual practice ? • Bad News ! • It is feasible to carry out these attacks with commodity hardware with little tweaking • Management frames necessary to exploit the identity attacks can be generated. • Exploit the AUX port for carrier sense attacks.
Deauthentication attack – Proposed Solutions • Solution 1: Authenticate management frames • But there are two problems with this solution: • Not feasible using software upgrade • A standardized authentication framework requires, can take time • Not feasible to upgrade all STAs across all networks • Solution 2: Defer deauthentication • Manipulate the firmware to delay deauthentication after receiving the message. If AP receives a data message after this, then the deauth request was spoofed • Advantages of solution 2: • Low overhead • Modification only limited to the APs, which is feasible • More Potential Attacks introduced?
Virtual carrier sense attack – Proposed Solution • Put a cap on the value of the maximum duration on received frames • If a station receives a frame with duration more than the cap value, truncate the duration to the cap value
Virtual carrier sense attack – Proposed Solution • Put a cap on the value of the maximum duration on received frames • If a station receives a frame with duration more than the cap value, truncate the duration to the cap value • Can be further improved by selectively adhering to the specified duration value in: • Data and ACK frames – These frames will have a high duration value only if they are a part of a fragmented packet exchange. Since, fragmentation is almost never used, duration specified in these frames can be ignored • RTS frame – A station that receives an RTS frame will also receive the data frame. 802.11 std specifies the exact times for the subsequent CTS and data frames. So the duration value of RTS is respected till the following data frame is received/not received • CTS frame – Either the observed CTS is unsolicited or the observing node is a hidden terminal. If this CTS is addressed to a valid in-range station, the valid station can nullify this by sending a zero duration null function frame. If this CTS is addressed to an out of range station, one foolproof defense is to introduce authenticated CTS frames, containing cryptographically signed copy of the preceding RTS. But there are overhead and feasibility issues with this
Conclusions • 802.11 WLANs suffer from many vulnerabilities threatening the availability of service • Secure and extended authentication mechanisms can help • Changes to the MAC layer protocol also required, may track and punish malicious nodes
Take a Break • Will study the detection and handling MAC layer misbehavior by P. Kyasanur and N.H. Vaidya. • P. Kyasanur and N.H. Vaidya, Detection and Handling of MAC Layer Misbehavior in wireless Networks, In Dependable Systems and Networks, June 2003. • Will Discuss the detection of Greedy Behavior in 802.11 hotspots after the break • M. Raya, J. P. Hubaux,, and I. Aad DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots, Proceedings of the Second International Conference on Mobile Systems, Applications, and Services, Boston, June 2004
Paper 1 • P. Kyasanur and N.H. Vaidya, Detection and Handling of MAC Layer Misbehavior in wireless Networks, In Dependable Systems and Networks, June 2003.
D Access Point C Wireless channel A B Infrastructure-based Network Ad hoc Network Problem Definition Nodes may violate Medium Access Control rules
IEEE 802.11 overview • Distributed Coordination Function (DCF) - Mandatory • Widely used for channel access • DCF is a Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) protocol
CSMA/CA • Carrier sense • Don’t transmit when channel is busy • Collision avoidance • Defer transmission for random time after channel goes idle
B1=20 B1=15 B1=0 S1 Transmit wait CW=31 S2 wait Transmit B2=25 B2=10 B2=10 Backoff Example • Choose backoff value B in range [0,CW] • CW is the Contention Window • Count down backoff by 1 every idle slot
RTS CTS B=10 Sender S ACK CTS RTS DATA Receiver R Data Transmission • Reserve channel with RTS/CTS exchange A S R B
Possible Misbehavior • Backoff selected from different distribution • Select a small constant backoff always B1 = 1 B1 = 1 Misbehaving node Transmit Transmit Well-behaved node wait wait B2 = 20 B2 = 19
Goals of proposed scheme • Diagnose node misbehavior • Catch misbehaving nodes • Discourage misbehavior with MAC layer scheme • Punish misbehaving nodes
Related work at other layers • Many proposals for securing network layer • Designing protocols resilient to misbehavior • [Savage99, Nisan99, Buttyan01] • Explicitly detect and penalize misbehavior • [Marti00, Zhang00, Buchegger02, Hu02]
Related work at MAC Layer • Game-theoretic solutions proposed for selfish misbehavior at MAC layer • [Konorski01, MacKenzie01, Konorski02] • Game-theoretic approach + Protocols resilient to misbehavior - Assumptions not always valid - Performance may not be good
Solution Approaches • Misbehaving node can gain more bandwidth Use payment schemes, charging per packet • Misbehaving node can achieve lower delay • Send burst of packets ignoring MAC rules • Average delay is less with same cost Payment based schemes not sufficient
Access Point Wireless channel A Proposed Approach • Receivers detect sender misbehavior • Assume receivers are well-behaved (can be relaxed) • Receiver does not know exact backoff value chosen by sender • Wireless Channel introduces uncertainties
Use long-term statistics • Observe backoffs chosen by sender over multiple packets • Backoff values not from expected distribution Misbehavior Selecting right observation interval difficult
Alternate Approach • Receiver provides backoff values to sender • Send in current transmission backoff value for next transmission • Receiver can then accurately observe sender behavior Uncertainty of sender’s backoff eliminated
B Sender S CTS ACK(B) DATA RTS RTS Receiver R Modifications to 802.11 • 1. R provides backoff B to S in ACK and/or in DATA • B selected from [0,CWmin] 2. S uses B for backoff
Protocol steps • Detect deviations: Receiver observes one transmission from the sender • Penalize deviations: Penalty is added, if the sender appears to have deviated • Diagnose misbehavior: Based on last W observations, diagnose misbehavior
Backoff Sender S ACK(B) RTS Receiver R Bobsr Detecting deviations • Receiver counts number of idle slots Bobsr Condition for detecting deviations: Bobsr < B 0 < <= 1
Actual backoff < B Sender S ACK(B) CTS ACK(B+P) DATA RTS Receiver R Bobsr Penalizing Misbehavior • When Bobsr < B, penalty P added • P proportional to B– Bobsr • Total backoff assigned = B + P
Penalty Scheme issues • With penalty, sender has to misbehave more for the same throughput gain • Misbehaving sender has two options • Ignore assigned penalty Easier to detect • Follow assigned penalty No throughput gain
Diagnosing Misbehavior • Total deviation for last W packets used • Deviation per packet is B – Bobsr • If total deviation > THRESH then sender is designated as misbehaving • Higher layers/ administrator can be informed of misbehavior