A Survey On Wireless Security Technical Challenges (01-10)
A Survey On Wireless Security Technical Challenges (01-10)
net/publication/277560716
CITATIONS READS
1,088 4,669
3 authors:
L. Hanzo
University of Southampton
3,020 PUBLICATIONS 73,112 CITATIONS
SEE PROFILE
All content following this page was uploaded by L. Hanzo on 18 July 2019.
Abstract—Due to the broadcast nature of radio propagation, AKA Authentication and Key Agreement
the wireless air interface is open and accessible to both authorized AP Access Point
arXiv:1505.07919v1 [cs.IT] 29 May 2015
and illegitimate users. This completely differs from a wired BS Base Station
network, where communicating devices are physically connected
through cables and a node without direct association is unable CDMA Code Division Multiple Access
to access the network for illicit activities. The open communica- CK(s) Ciphering Key(s)
tions environment makes wireless transmissions more vulnerable CSI Channel State Information
than wired communications to malicious attacks, including both CSMA/CA Carrier Sense Multiple Access with Collision
the passive eavesdropping for data interception and the ac- Avoidance
tive jamming for disrupting legitimate transmissions. Therefore,
this paper is motivated to examine the security vulnerabilities CST Carrier Sensing Time
and threats imposed by the inherent open nature of wireless CTS Clear to Send
communications and to devise efficient defense mechanisms for DA Destination Address
improving the wireless network security. We first summarize DCF Distributed Coordination Function
the security requirements of wireless networks, including their DES Data Encryption Standard
authenticity, confidentiality, integrity and availability issues. Next,
a comprehensive overview of security attacks encountered in DIFS Distributed Inter-Frame Space
wireless networks is presented in view of the network protocol DN Destination Node
architecture, where the potential security threats are discussed DSSS Direct-Sequence Spread Spectrum
at each protocol layer. We also provide a survey of the exist- DoS Denial of Service
ing security protocols and algorithms that are adopted in the EPC Evolved Packet Core
existing wireless network standards, such as the Bluetooth, Wi-
Fi, WiMAX, and the long-term evolution (LTE) systems. Then, E-UTRAN Evolved-Universal Terrestrial Radio Access Net-
we discuss the state-of-the-art in physical-layer security, which work
is an emerging technique of securing the open communica- FHSS Frequency-Hopping Spread Spectrum
tions environment against eavesdropping attacks at the physical FTP File Transfer Protocol
layer. Several physical-layer security techniques are reviewed GSVD Generalized Singular Value Decomposition
and compared, including information-theoretic security, artificial
noise aided security, security-oriented beamforming, diversity HSS Home Subscriber Server
assisted security, and physical-layer key generation approaches. HTTP HyperText Transfer Protocol
Additionally, since a jammer emitting radio signals can readily ICMP Internet Control Message Protocol
interfere with the legitimate wireless users, we introduce the ICV Integrity Check Value
family of various jamming attacks and their counter-measures, IK(s) Integrity Key(s)
including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Finally, some IMSI International Mobile Subscriber Identity
technical challenges which remain unresolved at the time of IP Internet Protocol
writing are summarized and the future trends in wireless security IV Initialization Vector
are discussed. LTE Long Term Evolution
Index Terms—Wireless security, eavesdropping attack, denial- MAC Medium Access Control
of-service (DoS), jamming, network protocol, information- MIC Message Integrity Check
theoretic security, artificial noise, beamforming, diversity, wire- MIMO Multiple-Input Multiple-Output
less jamming, wireless networks.
MISOME Multiple-Input Single-Output Multiple-
Eavesdropper
NOMENCLATURE MITM Man In The Middle
3G 3rd Generation MME Mobility Management Entity
AAA Authentication, Authorization and Accounting NIC Network Interface Controller
AES Advanced Encryption Standard NP Non-deterministic Polynomial
OFDMA Orthogonal Frequency-Division Multiple Access
Y. Zou is with the School of Telecommunications and Information Engineer- OSI Open Systems Interconnection
ing, Nanjing University of Posts and Telecommunications, Nanjing, China.
email: {[email protected]}. PER Packet Error Rate
X. Wang is with the Electrical and Computer Engineering Depart- PKM Privacy and Key Management
ment, The University of Western Ontario, London, Ontario, Canada. email: PN Pseudo Noise
{[email protected]}.
L. Hanzo is with the School of Electronics and Computer Science, Univer- PRNG Pseudo-Random Number Generator
sity of Southampton, Southampton, UK. email: {[email protected]}. QoS Quality of Service
PROCEEDINGS OF THE IEEE 2
Channel
RFCOMM Radio Frequency COMMunications characteristics
RSA Rivest-Shamir-Adleman Secrecy
capacity Authentication
RSS Received Signal Strength
RTS Request to Send
SA Source Address Wireless
Intercept
SIFS Short Inter-Frame Space probability
Security Authorization
SINR Signal-to-Interference-and-Noise Ratio Design
SQL Structured Query Language
SMTP Simple Mail Transfer Protocol
SN Source Node Complexity Encryption
SNR Signal-to-Noise Ratio Latency
SS Subscriber Station
Fig. 1. Wireless security methodologies and design factors.
SSL Secure Sockets Layer
TA Transmitter Address
TCP Transmission Control Protocol
TDMA Time-Division Multiple Access application layer, transport layer, network layer [6], medium
TK Temporal Key access control (MAC) layer [7] and physical layer [8], [9].
TKIP Temporal Key Integrity Protocol Security threats and vulnerabilities associated with these pro-
TLS Transport Layer Security tocol layers are typically protected separately at each layer
TSC TKIP Sequence Counter to meet the security requirements, including the authenticity,
TTAK TKIP-mixed Transmit Address and Key confidentiality, integrity and availability [10]. For example,
TTLS Tunneled Transport Layer Security cryptography is widely used for protecting the confidentiality
UDP User Datagram Protocol of data transmission by preventing information disclosure to
UE(s) User Equipment(s) unauthorized users [11], [12]. Although cryptography im-
UMTS Universal Mobile Telecommunications System proves the achievable communications confidentiality, it re-
WEP Wired Equivalent Privacy quires additional computational power and imposes latency
WiMAX Worldwide Interoperability for Microwave Ac- [13], since a certain amount of time is required for both
cess data encryption and decryption [14]. In order to guarantee
WLAN Wireless Local Area Network the authenticity of a caller or receiver, existing wireless
WMAN Wireless Metropolitan Area Network networks typically employ multiple authentication approaches
WPA Wi-Fi Protected Access simultaneously at different protocol layers, including MAC-
WPA2 Wi-Fi Protected Access II layer authentication [15], network-layer authentication [16],
WPAN Wireless Personal Area Network [17] and transport-layer authentication [18]. To be specific,
in the MAC layer, the MAC address of a user should be
authenticated to prevent unauthorized access. In the network
I. I NTRODUCTION layer, the Wi-Fi protected access (WPA) and the Wi-Fi pro-
tected access II (WPA2) are two commonly used network-
D URING the past decades, wireless communications in-
frastructure and services have been proliferating with
the goal of meeting rapidly increasing demands [1], [2].
layer authentication protocols [19], [20]. Additionally, the
transport-layer authentication includes the secure socket layer
According to the latest statistics released by the International (SSL) and its successor, namely the transport layer security
Telecommunications Union in 2013 [3], the number of mobile (TLS) protocols [21]-[23]. It becomes obvious that exploiting
subscribers has reached 6.8 billion worldwide and almost multiple authentication mechanisms at different protocol layers
40% of the world’s population is now using the Internet. is capable of enhancing the wireless security, again, at the
Meanwhile, it has been reported in [4] that an increasing cost of high computational complexity and latency. As shown
number of wireless devices are abused for illicit cyber-criminal in Fig. 1, the main wireless security methodologies include
activities, including malicious attacks, computer hacking, data the authentication, authorization and encryption, for which the
forging, financial information theft, online bullying/stalking diverse design factors e.g. the security level, implementation
and so on. This causes the direct loss of about 83 billion Euros complexity and communication latency need to be balanced.
with an estimated 556 million users worldwide impacted by In wired networks, the communicating nodes are physically
cyber-crime each year, according to the 2012 Norton cyber- connected through cables. By contrast, wireless networks are
crime report [4]. Hence, it is of paramount importance to extremely vulnerable owing to the broadcast nature of the
improve wireless communications security to fight against wireless medium. Explicitly, wireless networks are prone to
cyber-criminal activities, especially because more and more malicious attacks, including eavesdropping attack [24], denial-
people are using wireless networks (e.g., cellular networks and of-service (DoS) attack [25], spoofing attack [26], man-in-
Wi-Fi) for online banking and personal emails, owing to the the-middle (MITM) attack [27], message falsification/injection
widespread use of smartphones. attack [28], etc. For example, an unauthorized node in a
Wireless networks generally adopt the open systems in- wireless network is capable of inflicting intentional interfer-
terconnection (OSI) protocol architecture [5] comprising the ences with the objective of disrupting data communications
PROCEEDINGS OF THE IEEE 3
between legitimate users. Furthermore, wireless communica- physical-layer secret key generation techniques. Additionally,
tions sessions may be readily overheard by an eavesdropper, we provide a review on various wireless jammers (i.e., the
as long as the eavesdropper is within the transmit coverage constant jammer, intermittent jammer, reactive jammer, adap-
area of the transmitting node. In order to maintain confidential tive jammer and intelligent jammer) as well as their detection
transmission, existing systems typically employ cryptographic and prevention techniques. Finally, we outline some of open
techniques for preventing eavesdroppers from intercepting data challenges in wireless security.
transmissions between legitimate users [29], [30]. However, The remainder of this paper is organized as follows. Section
cryptographic techniques assume that the eavesdropper has II presents the security requirements of wireless networks,
limited computing power and rely upon the computational where the authenticity, confidentiality, integrity and avail-
hardness of their underlying mathematical problems. Hence, ability of wireless services are discussed. In Section III,
they can only achieve what we may refer to as computational we analyze the security vulnerabilities and weaknesses of
security. The security of a cryptographic approach would be wireless networks at different protocol layers, including the
significantly compromised, if an efficient method of solving application layer, transport layer, network layer, MAC layer
its underlying hard mathematical problem was to be dis- and physical layer. Next, in Section IV, the security protocols
covered [31]. More importantly, the conventional secret key and algorithms used in existing wireless networks, such as the
exchange in cryptographic techniques (e.g., Diffie-Hellman Bluetooth, Wi-Fi, WiMAX and LTE standards, are discussed.
key agreement protocol) requires a trusted key management Then, Section V presents the physical-layer security which is
center, which however may not be applicable in some wireless emerging as an effective paradigm conceived for improving
networks operating without a fixed infrastructure due to the the security of wireless communications against eavesdrop-
highly dynamic nature of mobile environments [32], [149]- ping attacks by exploiting the physical-layer characteristics
[151]. of wireless channels. Additionally, we summarize the various
To this end, physical-layer security is emerging as a promis- known wireless jamming attacks and their counter-measures
ing means of protecting wireless communications to achieve in Section VI, followed by Section VII, where some open
information-theoretic security against eavesdropping attacks. challenges and future trends in wireless security are presented.
In [33], Wyner examined a discrete memoryless wiretap Finally, Section VIII provides some concluding remarks.
channel consisting of a source, a destination as well as an
eavesdropper and proved that perfectly secure transmission can II. S ECURITY R EQUIREMENTS IN W IRELESS N ETWORKS
be achieved, provided that the channel capacity of the main
link from the source to the destination is higher than that of Again, in wireless networks, the information is exchanged
the wiretap link from the source to the eavesdropper. In [34], among authorized users, but this process is vulnerable to
Wyner’s results were extended from the discrete memoryless various malicious threats owing to the broadcast nature of
wiretap channel to the Gaussian wiretap channel, where the the wireless medium. The security requirements of wireless
notion of a so-called secrecy capacity was developed, which networks are specified for the sake of protecting the wireless
was shown to be equal to the difference between the channel transmissions against wireless attacks, such as eavesdropping
capacity of the main link and that of the wiretap link. If attack, DoS attack, data falsification attack, node compromise
the secrecy capacity falls below zero, the transmissions from attack and so on [44], [45]. For example, maintaining data
the source to the destination become insecure and the eaves- confidentiality is a typical security requirement, which refers
dropper would become capable of intercepting the source’s to the capability of restricting data access to authorized users
transmissions [35], [36]. In order to improve the attainable only, while preventing eavesdroppers from intercepting the
transmission security, it is of importance to increase the information. Generally speaking, secure wireless communica-
secrecy capacity by exploiting sophisticated signal processing tions should satisfy the requirements of authenticity, confiden-
techniques, such as the artificial noise aided security [37]-[39], tiality, integrity and availability [46], as detailed below:
security-oriented beamforming [40], [41], security-oriented • Authenticity: Authenticity refers to confirming the true
diversity approaches [42], [43] and so on. identity of a network node to distinguish authorized users
In this paper, we are motivated to discuss diverse wireless at- from unauthorized users. In wireless networks, a pair
tacks as well as the corresponding defense mechanisms and to of communicating nodes should first perform mutual
explore a range of challenging open issues in wireless security authentication before establishing a communications link
research. The main contributions of this paper are summarized for data transmission [47]. Typically, a network node
as follows. Firstly, a systematic review of security threats and is equipped with a wireless network interface card and
vulnerabilities is presented at the different protocol layers, has a unique medium access control (MAC) address,
commencing from the physical layer up to the application which can be used for authentication purposes. Again, in
layer. Secondly, we summarize the family of security protocols addition to MAC authentication, there are other wireless
and algorithms used in the existing wireless networks, such as authentication methods, including network-layer authen-
the Bluetooth, Wi-Fi, WiMAX and long-term evolution (LTE) tication, transport-layer authentication and application-
standards. Thirdly, we discuss the emerging physical-layer layer authentication.
security in wireless communications and highlight the class • Confidentiality: The confidentiality refers to limiting the
of information-theoretic security, artificial noise aided security, data access to intended users only, while preventing the
security-oriented beamforming, security-oriented diversity and disclosure of the information to unauthorized entities
PROCEEDINGS OF THE IEEE 4
TABLE I
[48]. Considering the symmetric key encryption tech- S UMMARIZATION OF W IRELESS S ECURITY R EQUIREMENTS .
nique as an example, the source node first encrypts the
original data (often termed as plain-text) using an encryp-
tion algorithm with the aid of a secret key that is shared Security Requirements Specific Objectives to be Achieved
with the intended destination only. Next, the encrypted Specified to differentiate authorized users from
Authenticity
plain-text (referred to as cipher-text) is transmitted to unauthorized users
the destination that then decrypts its received cipher- Confidentiality
Specified to limit the confidential data access to
intended users only
text using the secret key. Since the eavesdropper has no
Specified to guarantee the accuracy of the trans-
knowledge of the secret key, it is unable to interpret the Integrity
mitted information without any falsification
plain-text based on the overheard cipher-text. However, Specified to make sure that the authorized users
the classic Diffie-Hellman key agreement protocol used Availability can access wireless network resources anytime
in symmetric key cryptography is only computationally and anywhere upon request
Node A Node B
Application Application
Transport Transport
Network Network
Wireless Medium
Fig. 2. A generic wireless OSI layered protocol architecture consisting of the application layer, transport layer, network layer, MAC layer and physical layer.
TABLE II
M AIN P ROTOCOLS AND S PECIFICATIONS OF THE W IRELESS OSI L AYERS .
To be specific, the data packet at node A is first extended PHY Transmission Medium, Coding and Modulation
with the protocol overheads, including the application-layer
overhead, transport-layer overhead, network-layer overhead,
MAC overhead and physical-layer overhead. This results in
an encapsulated packet. Then, the resultant data packet is transfer protocol (FTP) is used for large-file-transfer, and the
transmitted via the wireless medium to node B, which will simple mail transfer protocol (SMTP) is invoked for electronic
perform packet-decapsulation, commencing from the physical mail (e-mail) transmission and so on [62]. The commonly
layer and proceeding upward to the application layer, in order used transport-layer protocols include the transport control
to recover the original data packet. Note that the difference protocol (TCP) and the user datagram protocol (UDP) [63],
between the wired and wireless networks mainly lies in the [64]. The TCP ensures the reliable and ordered delivery of data
PHY and MAC layers, while the application, transport and packets, whereas UDP has no guarantee of such reliable and
network layers of wireless networks are typically identical to ordered delivery. In contrast to TCP, UDP has no handshaking
those of wired networks. As a consequence, the wired and dialogues and adopts a simpler transmission model, hence
wireless networks share some common security vulnerabilities imposing a reduced protocol overhead. In the network layer,
owing to their identical application, transport and network we also have different protocols, such as the Internet protocol
layers. Nevertheless, they also suffer from mutually exclusive (IP), which was conceived for delivering data packets based
attacks due to the fact that the wired and wireless networks on IP addresses, and the Internet control message protocol
have different PHY and MAC layers, as shown in Fig. 3. (ICMP) designed for sending error messages for indicating,
Table II shows the main protocols and specifications im- for example, that a requested service is unavailable or that
plemented at each of wireless OSI layers. For example, a network node could not be reached [65]. Regarding the
the application-layer supports the hypertext transfer protocol MAC layer, there are numerous different protocols adopted
(HTTP) for the sake of delivering web services, while the file by various wireless networks, such as the carrier sense mul-
PROCEEDINGS OF THE IEEE 6
PHY Attacks Characteristics and Features MAC Attacks Characteristics and Features
Eavesdropping Interception of confidential information [71] MAC spoofing Falsification of MAC address [73]
Jamming Interruption of legitimate transmission [72] Identity theft Stealing of a legitimate user's MAC identity
TABLE V TABLE VI
M AIN T YPES OF W IRELESS ATTACKS AT THE N ETWORK L AYER . M AIN T YPES OF W IRELESS ATTACKS AT THE T RANSPORT L AYER .
Network Attacks Characteristics and Features Transport Attacks Characteristics and Features
IP spoofing Falsification of IP address [76] TCP flooding Sending a huge number of ping requests [80], [81]
IP hijacking Impersonation of a legitimate user’s IP address [77], [78] UDP flooding Launching an overwhelming number of UDP packets [82]
Paralyzation of a network by launching a huge number TCP sequence Fabrication of a legitimate user’s data packets using the
Smurf attack
of ICMP requests [79] prediction attack predicted TCP sequence index
C. Network-Layer Attacks
In the network layer, IP was designed as the principal and for transferring files from one network node to another.
protocol for delivering packets from a SN to a DN through In contrast to TCP, UDP is a connectionless transport protocol
intermediate routers based on their IP addresses. The network- associated with a reduced protocol overhead and latency, but
layer attacks mainly aim for exploiting IP weaknesses, which as a price, it fails to guarantee reliable data delivery. It is often
include the IP spoofing and hijacking as well as the so-called used by delay-sensitive applications which do not impose strict
Smurf attack [76]-[78], as illustrated in Table V. To be specific, reliability requirements, such as IP television, voice over IP
IP spoofing is used for generating a forged IP address with the and online games. Both TCP and UDP suffer from security
goal of hiding the true identity of the attacker or impersonating vulnerabilities including the TCP and UDP flooding as well as
another network node for carrying out illicit activities. The the TCP sequence number prediction attacks, as summarized
network node that receives these packets associated with a in Table VI.
forged source IP address will send its responses back to TCP attacks include TCP flooding attacks and sequence
the forged IP address. This will waste significant network number prediction attacks [80], [81]. The TCP flooding, which
capacity and might even paralyze the network by flooding it is also known as ping flooding, is a DoS attack in the transport
with forged IP packets. IP hijacking is another illegitimate layer, where the attacker sends an overwhelming number of
activity launched by hijackers for the sake of taking over ping requests, such as ICMP echo requests to a victim node,
another legitimate user’s IP address. If the attacker succeeds which then responds by sending ping replies, such as ICMP
in hijacking the IP address, it will be able to disconnect the echo replies. This will flood both the input and output buffers
legitimate user and create a new connection to the network of the victim node and it might even delay its connection
by impersonating the legitimate user, hence gaining access to to the target network, when the number of ping requests is
confidential information. There are some other forms of IP hi- sufficiently high. The TCP sequence prediction technique is
jacking techniques, including prefix hijacking, route hijacking another TCP attack that attempts to predict the sequence index
and border gateway protocol hijacking [78]. of TCP packets of a transmitting node and then fabricates the
The Smurf attack is a DoS attack in the network layer, TCP packets of the node. To be specific, the TCP sequence
which intends to send a huge number of ICMP packets (with prediction attacker first guesses the TCP sequence index of a
a spoofed source IP address) to a victim node or to a group of victim transmitter, then fabricates packets using the predicted
victims using an IP broadcast address [79]. Upon receiving the TCP index, and finally sends its fabricated packets to a victim
ICMP requests, the victims are required to send back ICMP receiver. Naturally, the TCP sequence prediction attack will
responses, resulting in a significant amount of traffic in the inflict damage upon the data integrity owing to the above-
victim network. When the Smurf attack launches a sufficiently mentioned packet fabrication and injection.
high number of ICMP requests, the victim network will
become overwhelmed and paralyzed by these ICMP requests The UDP is also prone to flooding attacks, which are
and responses. To defend against Smurf attacks, a possible imposed by sending an overwhelming number of UDP pack-
solution is to configure the individual users and routers by ets, instead of ping requests used in the TCP flood attack.
ensuring that they do not to constantly respond to ICMP Specifically, a UDP flood attacker transmits a large number
requests. We may also consider the employment of firewalls, of UDP packets to a victim node, which will be forced to
which can reject the malicious packets arriving from the forged send numerous reply packets [82]. In this way, the victim
source IP addresses. node will be overwhelmed by the malicious UDP packets and
becomes unreachable by other legitimate nodes. Moreover, the
UDP flooding attacker is capable of hiding itself from the
D. Transport-Layer Attacks legitimate nodes by using a spoofed IP address for generating
This subsection briefly summarizes the malicious activities malicious UDP packets. The negative impact of such UDP
in the transport layer, with an emphasis on the TCP and UDP flooding attacks is mitigated by limiting the response rate
attacks. To be specific, TCP is a connection-oriented transport of UDP packets. Furthermore, firewalls can be employed for
protocol designed for supporting the reliable transmission of defending against the UDP flooding attacks for filtering out
data packets, which is typically used for delivering e-mails malicious UDP packets.
PROCEEDINGS OF THE IEEE 8
Application Attacks Characteristics and Features Transport attacks same Transport attacks
Network type
User Interface
WMAN
General
Application Application Application Managament
Entity
WLAN
RFCOMM
Security Service
(or other multiplexing protocol)
Manager Database
WPAN
Coverage area
L2CAP
2Mb/s
Device
1Gb/s
250m
100m
Database
Bluetooth HCI
Link Manager/Controller
Wi-Fi
Query Registration