Robustness in Wireless Network Access Protocols
MetadataVis full innførsel
Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An adversary can disrupt the availability of a wireless network using denial of service (DoS) attacks. The most widely used wireless protocols are vulnerable to DoS attacks. Researchers have published DoS attacks against IEEE 802.11 local area networks (LANs), IEEE 802.16 wide area networks (WANs) and GSM andUMTS mobile networks. In this work, we analyze DoS vulnerabilities in wireless network protocols and define four categories of attacks: jamming attacks, flooding attacks, semantic attacks and implementation specific attacks. We identify semantic attacks as the most severe threat to current andfuture wireless protocols, and as the category that has received the least attention by researchers. During the first phase of the research project we discover semantic DoS vulnerabilities in the IEEE 802.11 communication protocols through manual analysis. The 802.11 standard has been subject to manual analysis of DoS vulnerabilities for more than a decade, thus our results indicate that protocol vulnerabilities can elude manual analysis. We conclude that formal methods are required in order to improve protocol robustness against semantic DoS attacks.We propose a formal method that can be used to automatically discover protocol vulnerabilities. The formal method defines a protocol model, adversary model and cost model. The protocol participants and adversary are modeled as finite state transducers, while the cost is modeled as a function of time. Our primary goal is to construct a formal method that is practical, i.e. does not require a vast amount of resources to implement, and useful, i.e. able to discover protocol vulnerabilities. We verify and validate our proposed method by modeling the 802.11w amendment to the 802.11 standard using Promela as the modeling language. We then use the SPIN model checker to verify the model properties and experiments to validate the results. The modeling and experiments result in the discovery and experimental validation of four new deadlock vulnerabilities that had eluded manual analysis. We find one deadlock vulnerability in 802.11i and three deadlock vulnerabilitiesin 802.11w. A deadlock vulnerability is the most severe form of communication protocol DoS vulnerabilities, and their discovery and removal are an essential part of robust protocol design. Thus, we conclude that our proposed formal method is both practical and useful.
Består avEian, Martin. Fragility of the Robust Security Network. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY: 400-416, 2009. 10.1007/978-3-642-01957-9_25.
Eian, Martin. A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. CRYPTOLOGY AND NETWORK SECURITY: 62-75, 2010. 10.1007/978-3-642-17619-7_6.
Eian, Martin; Mjølsnes, Stig F.. The modeling and comparison of wireless network denial of service attacks. Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds: 1-6, 2011. 10.1145/2043106.2043113.
Eian, Martin; Mjølsnes, Stig F.. A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. Proceedings of the 31st Annual IEEE International Conference on Computer Communications: 918-926, 2012. 10.1109/INFCOM.2012.6195841.