Demonstrated LLC-layer attack and defense strategies for wireless communication systems

S. Hitefield, V. Nguyen, C. Carlson, T. O'Shea, T. Clancy

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this work we demonstrate an over-the-air capability to exploit software weaknesses in the signal processing code implementing the physical and link layers of the OSI stack. Our test bed includes multiple nodes leveraging both GNU Radio and the Universal Software Radio Peripheral to demonstrate these attacks and corresponding defensive strategies. More specifically, we examine two duplex modem implementations, continuous wave and OFDM, and a link layer framing protocol vulnerable to buffer overflow attacks. We also discuss possible attacks against the network layer and above by exploiting a waveform utilizing the GNU Radio tunnel/tap block, which allows the waveform to directly interact with the Linux kernel's network stack. Lastly, we consider several different defensive countermeasures, both active and passive, for detecting vulnerabilities in the waveform implementation and also detecting malicious activity in the system. These mitigation strategies should be used to protect communications systems from succumbing to similar classes of attacks.

Original languageEnglish
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages60-66
Number of pages7
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Externally publishedYes
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Conference

Conference2014 IEEE Conference on Communications and Network Security, CNS 2014
Country/TerritoryUnited States
CitySan Francisco
Period10/29/1410/31/14

Fingerprint

Dive into the research topics of 'Demonstrated LLC-layer attack and defense strategies for wireless communication systems'. Together they form a unique fingerprint.

Cite this