TY - GEN
T1 - Fundamental limits on secure clock synchronization and man-in-the-middle detection in fixed wireless networks
AU - Chiang, Jerry T.
AU - Haas, Jason J.
AU - Hu, Yih Chun
AU - Kumar, P. R.
AU - Choi, Jihyuk
PY - 2009
Y1 - 2009
N2 - In this paper we present fundamental results on secure clock synchronization and man-in-the-middle detection using only timing information. Under the assumption of affine clocks, we present a clock synchronization protocol that can operate on any channel on which data can be sent. We present a clock synchronization protocol from the literature and add verification steps on top of this protocol. These verification steps force man-in-the-middle attackers, who want to delay traffic between the endpoints and yet remain undetected, to impose only constant delays on packets. In a special case, we show that it is possible to identify and ignore attacker-delayed packets. We then show three different types of attackers: a half-duplex attacker that can always be caught using timing information alone, a double full-duplex attacker that can never be caught using only timing information, and a full-duplex attacker whose capability to perform man-in-the-middle attacks depends on its location relative to the endpoints and on the turnaround times of the endpoints. In particular, we prove that certain attackers are impossible to detect using only timing, and we construct defensive protocols that prevent all other man-in-the-middle delay attacks. A particularly noteworthy result is that a single attacker using the same radio technology as the endpoints can never successfully perform a man-in-the-middle attack to delay traffic. These results form a lightweight man-in-the-middle attack detection protocol, on top of which a wide variety of protocols can be built, including routing protocols and more sophisticated heavyweight protocols.
AB - In this paper we present fundamental results on secure clock synchronization and man-in-the-middle detection using only timing information. Under the assumption of affine clocks, we present a clock synchronization protocol that can operate on any channel on which data can be sent. We present a clock synchronization protocol from the literature and add verification steps on top of this protocol. These verification steps force man-in-the-middle attackers, who want to delay traffic between the endpoints and yet remain undetected, to impose only constant delays on packets. In a special case, we show that it is possible to identify and ignore attacker-delayed packets. We then show three different types of attackers: a half-duplex attacker that can always be caught using timing information alone, a double full-duplex attacker that can never be caught using only timing information, and a full-duplex attacker whose capability to perform man-in-the-middle attacks depends on its location relative to the endpoints and on the turnaround times of the endpoints. In particular, we prove that certain attackers are impossible to detect using only timing, and we construct defensive protocols that prevent all other man-in-the-middle delay attacks. A particularly noteworthy result is that a single attacker using the same radio technology as the endpoints can never successfully perform a man-in-the-middle attack to delay traffic. These results form a lightweight man-in-the-middle attack detection protocol, on top of which a wide variety of protocols can be built, including routing protocols and more sophisticated heavyweight protocols.
UR - http://www.scopus.com/inward/record.url?scp=70349659384&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349659384&partnerID=8YFLogxK
U2 - 10.1109/INFCOM.2009.5062118
DO - 10.1109/INFCOM.2009.5062118
M3 - Conference contribution
AN - SCOPUS:70349659384
SN - 9781424435135
T3 - Proceedings - IEEE INFOCOM
SP - 1962
EP - 1970
BT - IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
T2 - 28th Conference on Computer Communications, IEEE INFOCOM 2009
Y2 - 19 April 2009 through 25 April 2009
ER -