Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency

As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference. However, recently revealed Man-in-the-middle (MITM) attack can endanger the security and privacy of mmWave communication systems. Existing MITM attack detection solutions, established on ideal assumptions, neglect the fact that a MITM attacker can change its transmitting power and make it hard to be detected. In this backdrop, a cross-layer location consistency-based MITM detection and localization algorithm is introduced in this paper. Firstly, we propose a positioning algorithm based on the information of the physical layer with a directional antenna sector propagation model; secondly, based on the information at the MAC layer, we propose a MITM attack detection scheme and a sector consistency check algorithm; thirdly, a MITM attack detection and localization algorithm using cross-layer information is proposed. Simulation results have shown that the proposed algorithm can effectively detect the MITM attack and its positioning error is less than 0.53m in typical parameter settings.

[1]  Andrew R. Nix,et al.  Codebook based beamforming and multiuser scheduling scheme for mmWave outdoor cellular systems in the 28, 38 and 60GHz bands , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[2]  Matthias Hollick,et al.  Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks , 2018, WISEC.

[3]  Hai Deng,et al.  A Unitary Precoder for Optimizing Spectrum and PAPR Characteristic of OFDMA Signal , 2018, IEEE Transactions on Broadcasting.

[4]  Zhi Sun,et al.  Modeling and Analysis of Eavesdropping Attack in 802.11ad mmWave Wireless Networks , 2019, IEEE Access.

[5]  Wen-Rong Wu,et al.  High-Resolution AoA Estimation for Hybrid Antenna Arrays , 2015, IEEE Transactions on Antennas and Propagation.

[6]  Young Joong Yoon,et al.  Modeling the Indoor Channel for the MIMO System using Dual Polarization Antennas , 2006, 2006 European Conference on Wireless Technology.

[7]  Waldemar Gerok,et al.  Influence of the real UWB antennas on the AoA estimation based on the TDoA localization technique , 2010, IEEE Middle East Conference on Antennas and Propagation (MECAP 2010).

[8]  Xianglin Wei,et al.  Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.

[9]  Alireza Esfahani,et al.  An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain , 2019, IEEE Access.

[10]  Leandros Tassiulas,et al.  Handling asymmetry in gain in directional antenna equipped ad hoc networks , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[11]  Sinem Coleri Ergen,et al.  Directional MAC protocol for IEEE 802.11ad based wireless local area networks , 2018, Ad Hoc Networks.

[12]  Ignas Niemegeers,et al.  Performance Analysis of IEEE 802.11ad MAC Protocol , 2017, IEEE Communications Letters.

[13]  Shengjun Zhang,et al.  A TOA-Based Localization Algorithm With Simultaneous NLOS Mitigation and Synchronization Error Elimination , 2019, IEEE Sensors Letters.

[14]  Ian Sharp,et al.  Indoor TOA Error Measurement, Modeling, and Analysis , 2014, IEEE Transactions on Instrumentation and Measurement.

[15]  Vincenzo Inzillo,et al.  Exploiting frame aggregation and weighted round robin with beamforming smart antennas for directional MAC in MANET environments , 2019, Ad Hoc Networks.

[16]  Yuguang Fang,et al.  IEEE 802.11ay-Based mmWave WLANs: Design Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[17]  Ilker Demirkol,et al.  An Alternative to IEEE 802.11ba: Wake-Up Radio With Legacy IEEE 802.11 Transmitters , 2019, IEEE Access.

[18]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[19]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.