DocumentCode :
1910013
Title :
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks
Author :
Chiang, Jerry T. ; Haas, Jason J. ; Hu, Yih-Chun ; Kumar, P.R. ; Choi, Jihyuk
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL
fYear :
2009
fDate :
19-25 April 2009
Firstpage :
1962
Lastpage :
1970
Abstract :
In this paper we present fundamental results on secure clock synchronization and man-in-the-middle detection using only timing information. Under the assumption of afflne clocks, we present a clock synchronization protocol that can operate on any channel on which data can be sent. We present a clock synchronization protocol from the literature and add verification steps on top of this protocol. These verification steps force man- in-the-middle attackers, who want to delay traffic between the endpoints and yet remain undetected, to impose only constant delays on packets. In a special case, we show that it is possible to identify and ignore attacker-delayed packets. We then show three different types of attackers: a half-duplex attacker that can always be caught using timing information alone, a double full-duplex attacker that can never be caught using only timing information, and a full-duplex attacker whose capability to perform man-in-the- middle attacks depends on its location relative to the endpoints and on the turnaround times of the endpoints. In particular, we prove that certain attackers are impossible to detect using only timing, and we construct defensive protocols that prevent all other man-in- the-middle delay attacks. A particularly noteworthy result is that a single attacker using the same radio technology as the endpoints can never successfully perform a man-in-the-middle attack to delay traffic. These results form a lightweight man-in-the-middle attack detection protocol, on top of which a wide variety of protocols can be built, including routing protocols and more sophisticated heavyweight protocols.
Keywords :
radio networks; routing protocols; synchronisation; telecommunication security; clock synchronization protocol; defensive protocols; double full-duplex attacker; endpoint turnaround times; fixed wireless networks; half-duplex attacker; man-in-the-middle attack detection protocol; packet delays; radio technology; routing protocols; secure clock synchronization; timing information; Clocks; Delay; Job shop scheduling; Routing protocols; Synchronization; Timing; Wireless mesh networks; Wireless networks; Wireless sensor networks; Wiring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2009, IEEE
Conference_Location :
Rio de Janeiro
ISSN :
0743-166X
Print_ISBN :
978-1-4244-3512-8
Electronic_ISBN :
0743-166X
Type :
conf
DOI :
10.1109/INFCOM.2009.5062118
Filename :
5062118
Link To Document :
بازگشت