Where are you from?: confusing location distinction using virtual multipath camouflage

In wireless networks, location distinction aims to detect location changes or facilitate authentication of wireless users. To achieve location distinction, recent research has been focused on investigating the spatial uncorrelation property of wireless channels. Specifically, the differences of wireless channel characteristics are used to distinguish locations or identify location changes. However, we discover a new attack against all existing location distinction approaches that are built on the spatial uncorrelation property of wireless channels. In such an attack, the adversary can easily hide her location changes or impersonate movements by injecting fake wireless channel characteristics into a target receiver. Experimental results on our USRP-based prototype show that the discovered attack can craft any desired channel characteristic with a successful probability of 95.0% to defeat spatial uncorrelation based location distinction schemes. To defend against this attack, we propose a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channel characteristics. Experiments demonstrate that our novel detection method achieves a detection rate higher than 91.2% while maintaining a very low false alarm rate.

[1]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .

[2]  Rupul Safaya,et al.  A Multipath Channel Estimation Algorithm using a Kalman filter , 2022 .

[3]  Andreas F. Molisch,et al.  Wireless Communications , 2005 .

[4]  M. VishnevskyV.,et al.  IEEE 802.11 Wireless LAN , 2002 .

[5]  Peng Ning,et al.  Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.

[6]  Peng Ning,et al.  Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.

[7]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[8]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[9]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[10]  Per Ola Börjesson,et al.  OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.

[11]  Sneha Kumar Kasera,et al.  Advancing wireless link signatures for location distinction , 2008, MobiCom '08.

[12]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[13]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[14]  K. Shanmugan,et al.  Random Signals: Detection, Estimation and Data Analysis , 1988 .

[15]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[16]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[17]  Peng Ning,et al.  Poster: mimicry attacks against wireless link signature , 2011, CCS '11.

[18]  Alex B. Gershman,et al.  Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.

[19]  Georgios B. Giannakis,et al.  Blind estimation of direct sequence spread spectrum signals in multipath , 1995, Conference Record of The Twenty-Ninth Asilomar Conference on Signals, Systems and Computers.

[20]  G.T. Zhou,et al.  A first-order statistical method for channel estimation , 2003, IEEE Signal Processing Letters.