Draft:Early Detect Late Commit
Review waiting, please be patient.
This may take 7 weeks or more, since drafts are reviewed in no specific order. There are 1,451 pending submissions waiting for review.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Reviewer tools
|
Early Detect Late Commit (EDLC, ED/LC) is a physical-layer distance-reducing attack affecting wireless ranging systems such as UWB ranging[1] or Chirp Spread Spectrum (CSS). These kinds of systems are used in vehicles for keyless entry,[2] localisation in consumer (e.g., Apple AirTag) and industrial applications.[3] By using the ED/LC attack, an attacker can artificially reduce the measured distance between two wireless devices, effectively circumventing an application's requirement of physical viscinity (e.g., only unlock car if keyfob is sufficiently close).
Ranging Principle
[edit]Time of flight-based ranging systems leveraging Ultra-wide band or Chirp Spread Spectrum (CSS) measure distance by estimating the time it takes a signal to propagate through a medium (usually air) at a known speed (approximately , the speed of light, in air). The total round-trip time between a verifier (e.g., car) and a prover (e.g., keyfob) a distance apart equals the sum of the total propagation delay and a processing delay . This processing delay is fixed and known to the verifier, such that it that can be substracted from to calculate the actual propagation delay and physical distance .
To reduce the apparent distance as measured by the verifier, an attacker has to reduce the round-trip time . As it is not possible to shorten the actual propagation delay of the radio wave (as it is already propagating at the speed of light), an attacker has to reduce the processing time . For the attack to be relevant, an attacker has to shorten to such an extent that it completely compensates the additional distance the attacker wants to introduce.
Attack
[edit]A reduction of the total time can be achieved because an attacker might not need to fully receive a symbol before they can determine the symbol value. This is possible because a symbol has non-zero length and carries redundant information. Specifically, in the case of chirp signals, an attacker does not have to receive the complete up- or down-chirp lasting , instead they can early-detect the type of chirp (up or down) prematurely after time . Before the attacker learns the actual value of the symbol, they already start to transmit an arbitrary signal. Only when the value of the symbol is known to the attacker after , they can switch from the arbitrary signal to the actual symbol value (they late-commit to the actual value). Even if the symbol was arbitrary up to , the receiver ideally still correctly decodes the symbol, due to intentional redundance when sending the symbol for the full .[4]
Defenses
[edit]It is possible to defend against ED/LC attacks in Ultra-wideband-based systems by randomly reordering pulses. As only the sender and receiver (i.e., prover and verifier) know the correct sequence to (de)scramble the pulses, the bits are completely unpredictable for an attacker. Hence, an attacker is unable to detect a symbol value early.[5]
References
[edit]- ^ Microchip Application Note AN3523 [1]
- ^ "BMW Digital Key Plus Ultra-Wideband". Retrieved November 29, 2024.
- ^ "Infineon UWB". Retrieved November 29, 2024.
- ^ Ranganathan, Aanjhan; Danev, Boris (16 April 2012). "Physical-layer attacks on chirp-based ranging systems" (PDF). Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. pp. 15–26. doi:10.1145/2185448.2185453. ISBN 978-1-4503-1265-3. Retrieved 29 November 2024.
- ^ Singh, Mridula; Leu, Patrick (January 2019). "UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks" (PDF). Network and Distributed System Security Symposium. doi:10.14722/ndss.2019.23109. ISBN 978-1-891562-55-6. Retrieved 29 November 2024.