+ All Categories
Home > Documents > Opportunities and Pitfalls in Securing Visible Light...

Opportunities and Pitfalls in Securing Visible Light...

Date post: 26-Mar-2018
Category:
Upload: tranthuan
View: 213 times
Download: 1 times
Share this document with a friend
21
20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer Jiska Classen, Daniel Steinmetzer, Matthias Hollick Jiska Classen Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Mornewegstr. 32 D-64293 Darmstadt, Germany Tel.+49 6151 16-25474, Fax. +49 6151 16-25471 http://seemoo.de or http://www.seemoo.tu-darmstadt.de
Transcript
Page 1: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical LayerJiska Classen, Daniel Steinmetzer, Matthias Hollick

Jiska Classen

Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO

Department of Computer ScienceCenter for Advanced Security Research Darmstadt - CASED

Mornewegstr. 32 D-64293 Darmstadt, Germany

Tel.+49 6151 16-25474, Fax. +49 6151 16-25471http://seemoo.de or http://www.seemoo.tu-darmstadt.de

Page 2: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 2

● Using physical effects that are already there● Typically more light-weight than cryptographic solutions● Ideal for visible light communication and Internet of Things applications

VLC has different physical layer characteristics compared to WiFi.

Physical Layer Security

Can we use physical layer security for VLC?How do VLC characteristics strengthen/weaken security?

Page 3: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 3

● User failures● Failure to spot an attacker within trusted zone

● Better equipment● Attacker has thousand phothodiodes

● Additional information● Attacker guesses plain-text

● Active attackers● Blockage and injection of signals

Attacker ModelExamples

Page 4: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 4

● Channel HAB is…● not known by Eve● not reproducible by Eve (often called “trusted zone”)

● Channel difference can be used to encode confidential information

ConfidentialityWyner’s Wiretap Channel

Alice Bob

Eve

HAB

HAE

Trusted Zone

Page 5: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 5

● In practice: unknown attacker location!● Eve in proximity gets some information, but how much?● Assumption that Eve is not within trusted zone.

ConfidentialityWyner’s Wiretap Channel

Alice

Bob

Eve

HAB

HAE

Page 6: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 6

⚡ User failures

Failure to spot Eve inside trusted zone,even though light propagates more intuitive

⚡ Better equipment

Additional photodiodes enable Eve to receive more information,despite worse channels outside trusted zone

⚡ Additional information

The incoherent visible light channel HAB contains only light intensity variations, no phase: easier to guess for Eve!

ConfidentialityWyner’s Wiretap Channel

Page 7: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 7

● Bob can synchronize to the pseudo-random jamming sequence and remove it

● Eve has no key to generate the jamming sequence, jamming prevents from…● decoding data from Alice● transmitting data inside

jammed zone

ConfidentialityJamming

AliceJammer Bob

Eve

Page 8: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 8

● Eve can use multiple photodiodes to subtract the jamming

● Since the jamming is only amplitude additions, the attack becomes easier than for WiFi

ConfidentialityJamming

AliceJammer Bob

EveEve

Page 9: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 9

⚡ Better equipment

Additional photodiodes enable Eve to remove the jamming signal

ConfidentialityJamming

Page 10: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 10

● Central instance generates random key stream transmitted over VLC● Stream can be used as one-time pad for WiFi● Eve’s WiFi transmission range is limited to the VLC range

ConfidentialityKeys

Bob Eve

Key Stream & Decryption

Page 11: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 11

❓ User failures❓ Better equipment

Both can cause a VLC range that is higher than expected,but the actual range shortage from WiFi range to VLC range is not affected

ConfidentialityKeys

Page 12: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 12

● Multiple fixed pattern transmissions enable Bob to locate himself● Possibility to transmit data along with location information

Localization and AuthenticationKnown Patterns

Bob

Page 13: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 13

● Attackers might inject false location information● If Bob is not trusted, he can report a false location, because channel

reciprocity is missing in VLC

Localization and AuthenticationKnown Patterns

EveBob

Page 14: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 14

❓ User failures

Users might not see attackers injecting false locations

❓ Better equipment

Additional equipment is required for attacks, but solely does not make a successful attack

⚡ Additional information

Attackers knowing the pattern can report oblivious locations

⚡ Active attackers

Active attackers can block the localization and, with pattern knowledge, fake locations to users

Localization and AuthenticationKnown Patterns

Page 15: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 15

● Patterns send to Bob are random● Bob cannot compute his position, but needs to report measurements to

a central instance doing the computation

Localization and AuthenticationRandom Patterns

Bob

LocationDatabase

Page 16: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 16

✓ Randomness successfully prevents the aforementioned attacks

❓ Better equipment

Multi-antenna attackers might still extract the location pattern and replay it, which requires the addition of distance bounding

Localization and AuthenticationRandom Patterns

Page 17: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 17

● Alice and Bob vary their polarization filter by a shared pseudo-random pattern

● Only if the patterns match, the transmitted information can be reconstructed

IntegrityPolarization

Alice

? ?Bob

Page 18: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 18

● Eve can measure the polarization pattern and inject her own signal

IntegrityPolarization

Alice

?

?Bob

Eve

?

Page 19: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 19

⚡ Better equipment

Attackers with additional hardware can extract polarization information, hence can decode signals

⚡ Active attackers

Active attackers can even inject signals

IntegrityPolarization

Page 20: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 20

Overview

Wiretap channel Jamming Keys Known

patternsRandom patterns Polarization

User failures⚡ ✓ ❓ ✓ ✓ ✓

Better equipment ⚡ ⚡ ❓ ❓ ❓ ⚡Additional information ⚡ ✓ ✓ ⚡ ✓ ✓

Active attackers✓ ✓ ✓ ⚡ ✓ ⚡

Page 21: Opportunities and Pitfalls in Securing Visible Light ...dartnets.cs.dartmouth.edu/VLCS2016/slides/vlcs-jiska.pdf20.10.2016 | Secure Mobile Networking Lab | Jiska Classen Opportunities

20.10.2016 | Secure Mobile Networking Lab | Jiska Classen | 21

Can we use physical layer security for VLC?How do VLC characteristics strengthen/weaken security?

● Schemes that do not require channel reciprocity can be adapted● Missing phase information weakens approaches● Better range estimation by users strengthens approaches● WiFi attacks also apply to VLC physical layer security

Conclusion


Recommended