30
Improving Wireless Privacy with an Identifier-Free Link Layer Protocol Ben Greenstein, Damon McCoy, Yoshi Kohno, Jeffrey Pang, Srini Seshan, and David Wetherall [MobiSys 2008]

Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

  • Upload
    elliot

  • View
    23

  • Download
    1

Embed Size (px)

DESCRIPTION

Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. Ben Greenstein, Damon McCoy, Yoshi Kohno, Jeffrey Pang, Srini Seshan , and David Wetherall [ MobiSys 2008]. Motivation. Problem Overview. tcpdump. Alice -> AP. IM chat…. Charlie -> AP. Video …. Bob -> AP. - PowerPoint PPT Presentation

Citation preview

Page 1: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Ben Greenstein, Damon McCoy, Yoshi Kohno, Jeffrey Pang, Srini Seshan, and David Wetherall

[MobiSys 2008]

Page 2: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Motivation

2

Page 3: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Problem Overview

Bob -> AP WiFi probe IM chat… Alice -> AP Video … Charlie -> AP

tcpdump

3

Page 4: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Problem Overview

Bob -> AP WiFi probe

IM chat… Alice -> AP

Video… Charlie -> APtcpdump

???

???

State-of-the-art: WPA-CCMP Encryption

• Sensitive information remains exposed:– Sender, receiver identities location tracking– Sender, receiver relationship profiling– Management frame information profiling

4

Page 5: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Problem Overview

Bob -> AP WiFi probe

IM chat… Alice -> AP

Video… Charlie -> APtcpdump

???

???

Recent research: MAC address pseudonyms

• Probes/beacons remain exposed because:– Objective: find out if someone I know is nearby– Problem: Typically done by broadcasting identity– Sender and receiver may want to protect identity

??? -> AP

??? -> AP

Bob -> Dave

5

Page 6: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Problem Overview

Bob -> AP WiFi probe

IM chat… Alice -> AP

email … Charlie -> APtcpdump

???

???

Charlie -> AP ???

Charlie -> AP ???

Charlie -> AP ???

IM chat… Alice -> AP

Charlie -> AP ???

Charlie -> AP ???

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

big

small

big

small

big

small

Side-channel analysis -patterns in packet sizes and timing can expose:

•Videos watched•Keystrokes•Webpages visited•Languages spoken•Device identity

70% probability:Video of

Charlie Brown’sChristmas

Bob -> Dave

???

6

Page 7: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Objective

tcpdump

Bob -> AP WiFi probe

IM chat… Alice -> AP

email … Charlie -> AP

???

???

Charlie -> AP ???

Charlie -> AP ???

Charlie -> AP ???

IM chat… Alice -> AP

Charlie -> AP ???

Charlie -> AP ???

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP

??? -> AP ???

Mask entire contents of link layer packets

Which packets are mine? Which packets are mine?

Problem:Efficient packet filtering

Bob -> Dave

???

???

???

???

???

???

???

???

???

???

Mitigates attacks:Tracking,Profiling,

Side-channel analysis

7

Page 8: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Objective• Summary of goals:– Hide entire message contents from third parties– Prevent third parties from “linking” any two packets

• I.e., when A generates Message to B, he sends:PrivateMessage = F(A, B, Message)

where F has these security properties:– Unlinkability: Only A and B can link PrivateMessages

to same sender or receiver.– Authenticity: B can verify A created PrivateMessage.– Confidentiality: Only A and B can determine Message.– Integrity: B can verify Message not modified.

8

Page 9: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Objective

• Assumptions:– Senders trust intended receivers with their messages

• We don’t protect clients from malicious APs

– Senders and receivers pre-share cryptographic keys• Same as WEP, WPA, and secure Bluetooth• Bootstrap via pairing, passphrase, etc. (see also HotNets ‘07)

• Primary challenges– Private rendezvous– Efficient message filtering

9

Page 10: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Solution: SlyFi

10

Page 11: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Solution Overview

11

Page 12: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Straw man: Public Key Protocol

Probe “Alice”

Client Service

Key-private encryption(e.g., ElGamal)

KAlice

Check signature:

Try to decrypt

K-1Alice

KBob

Based on [Abadi ’04]

K-1BobSign:

timestamp

12

???

Page 13: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Problem

• Must try to decrypt every message– Public key decryption is slow (>100ms on typical AP) delays processing of other messages susceptible to low-rate denial-of-service attacks

13

Page 14: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Observations

• Must try to decrypt every message– Common case is to rediscover known services– Can bootstrap a secret symmetric key the first time

14

Page 15: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Straw man: Symmetric Key Protocol

Probe “Alice”

Client Service

Symmetric encryption(e.g., AES w/ random IV)

Check MAC:

MAC: K’Shared

KShared

K’Shared

timestamp

Try todecrypt

with each shared key

KShared1

KShared2

KShared3…

15

???

Page 16: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Observations

• Must try to decrypt every message– Common case is to rediscover known services– Can negotiate a secret symmetric key the first time

• Discovery & binding messages:– Infrequent: only sent once per association attempt–Narrow interface: single application, few side-channels Linkability at short timescales is usually OK Can use temporary unlinkable addresses

16

Page 17: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

???

Discovery & Binding Messages: Tryst

Probe “Alice”

Client Service

Symmetric encryption(e.g., AES w/ random IV)

Check MAC:

MAC: K’Shared

KShared

K’Shared

AT

AT

KShared

Lookup AT in atable to get KShared

timestamp

Try todecrypt

with each shared key

KShared1

KShared2

KShared3…

AT-1A0 AT

AESK’’Shared(0)

AT+1… …

AESK’’Shared(T-1) AESK’’Shared(T) AESK’’Shared(T+1)

T = time epoch

17

Page 18: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

More Problems

• Must try to decrypt every message– Common case is to rediscover known services– Can negotiate a secret symmetric key the first time

• Data messages:– Frequent: sent often to deliver data–Wide interface: many applications, many side-channels Linkability at short timescales is NOT usually OK Can NOT use temporary unlinkable addresses

18

Page 19: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

More Problems

• Must try to decrypt every message– Common case is to rediscover known services– Can negotiate a secret symmetric key the first time

• Data messages:–Only sent over established connections Expect messages to be delivered, barring message loss

19

Page 20: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

???

Data Transport: Shroud

Data

Client Service

Symmetric encryption(e.g., AES w/ random IV)

Check MAC:

MAC: K’Shared

KShared

K’Shared

AT

AT

KShared

Lookup AT in atable to get KShared

timestamp

AT-1A0 AT

AESK’’Shared(0)

AT+1… …

AESK’’Shared(T-1) AESK’’Shared(T) AESK’’Shared(T+1)

T = transmission #

20

???

Page 21: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Data Transport: Shroud

• On receipt of packet with address AT,compute next address AT+1

• Handling message loss:– Compute AT+1, … , AT+k

– Can progress unless k consecutive packets are lost– Studies show k=50 sufficient for vast majority of cases– Common case: compute 1 new address per reception,

except first packet, which requires 49 computations

21

Page 22: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Evaluation

22

Page 23: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Setup• SlyFi implementation:– Linux kernel module using Click Modular Router– Run on Soekris devices similar to APs, iPods, etc.– Assume AP with 500 client accounts, 50 associations

• Compare against:– wifi-open: baseline Click unsecure 802.11– wifi-wpa: baseline Linux 802.11 with WPA– public-key: straw man #1– symmetric-key: straw man #2– armknecht: previous header encryption proposal

23

Page 24: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Evaluation Metrics

• Link setup time– Time to discover and setup a link– Lower shorter wait to deliver data,

less interruption when roaming

• Key questions:– Is address computation overhead large?– Can Tryst filter messages efficiently?

24

Page 25: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Link Setup Time vs. Background Rate

Tryst has less overhead than WPA25

Page 26: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Link Setup Failure vs. Background Rate

Tryst filtering is much more efficient than straw men26

Page 27: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Evaluation Metrics

• Data throughput– How fast can link deliver data– Higher faster applications– Note: Shroud uses software AES while

wifi-wpa uses hardware AES We also simulate Shroud hardware AES

• Key questions:– What is Shroud’s overhead?– Can Shroud filter messages efficiently?

27

Page 28: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Data Throughput vs. Packet Size

Shroud overhead is similar to WPA28

Page 29: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Data Throughput vs. Background Rate

Shroud filtering is almost as efficient as 802.1129

Page 30: Improving Wireless Privacy with an Identifier-Free Link Layer Protocol

Summary

• We presented design, implementation of SlyFi– Link layer that encrypts entire messages– No two messages are linkable by third parties

• Mitigates attacks that are currently easy to do– Tracking, profiling, and side-channel attacks

• Performs about as well as WPA– Link setup is actually faster– Throughput penalty is comparable– Similar assumptions, but strictly stronger security

30