Jump to content

Draft:Early Detect Late Commit

From Wikipedia, the free encyclopedia


Early Detect Late Commit (EDLC, ED/LC) is a physical-layer distance-reducing attack affecting wireless ranging systems such as UWB ranging[1] or Chirp Spread Spectrum (CSS). These kinds of systems are used in vehicles for keyless entry,[2] localisation in consumer (e.g., Apple AirTag) and industrial applications.[3] By using the ED/LC attack, an attacker can artificially reduce the measured distance between two wireless devices, effectively circumventing an application's requirement of physical viscinity (e.g., only unlock car if keyfob is sufficiently close).

Ranging Principle

[edit]
By shortening the processing delay from to , an attacker at distance can pretend to be at location

Time of flight-based ranging systems leveraging Ultra-wide band or Chirp Spread Spectrum (CSS) measure distance by estimating the time it takes a signal to propagate through a medium (usually air) at a known speed (approximately , the speed of light, in air). The total round-trip time between a verifier (e.g., car) and a prover (e.g., keyfob) a distance apart equals the sum of the total propagation delay and a processing delay . This processing delay is fixed and known to the verifier, such that it that can be substracted from to calculate the actual propagation delay and physical distance .

To reduce the apparent distance as measured by the verifier, an attacker has to reduce the round-trip time . As it is not possible to shorten the actual propagation delay of the radio wave (as it is already propagating at the speed of light), an attacker has to reduce the processing time . For the attack to be relevant, an attacker has to shorten to such an extent that it completely compensates the additional distance the attacker wants to introduce.

Attack

[edit]
An attacker can shorten the processing time and therefore the apparent distance by prematurely deciding on the received signal (early detect) and prematurely sending a response whose value is decided later (late commit).

A reduction of the total time can be achieved because an attacker might not need to fully receive a symbol before they can determine the symbol value. This is possible because a symbol has non-zero length and carries redundant information. Specifically, in the case of chirp signals, an attacker does not have to receive the complete up- or down-chirp lasting , instead they can early-detect the type of chirp (up or down) prematurely after time . Before the attacker learns the actual value of the symbol, they already start to transmit an arbitrary signal. Only when the value of the symbol is known to the attacker after , they can switch from the arbitrary signal to the actual symbol value (they late-commit to the actual value). Even if the symbol was arbitrary up to , the receiver ideally still correctly decodes the symbol, due to intentional redundance when sending the symbol for the full .[4]

Defenses

[edit]

It is possible to defend against ED/LC attacks in Ultra-wideband-based systems by randomly reordering pulses. As only the sender and receiver (i.e., prover and verifier) know the correct sequence to (de)scramble the pulses, the bits are completely unpredictable for an attacker. Hence, an attacker is unable to detect a symbol value early.[5]

References

[edit]
  1. ^ Microchip Application Note AN3523 [1]
  2. ^ "BMW Digital Key Plus Ultra-Wideband". Retrieved November 29, 2024.
  3. ^ "Infineon UWB". Retrieved November 29, 2024.
  4. ^ Ranganathan, Aanjhan; Danev, Boris (16 April 2012). "Physical-layer attacks on chirp-based ranging systems" (PDF). Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. pp. 15–26. doi:10.1145/2185448.2185453. ISBN 978-1-4503-1265-3. Retrieved 29 November 2024.
  5. ^ Singh, Mridula; Leu, Patrick (January 2019). "UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks" (PDF). Network and Distributed System Security Symposium. doi:10.14722/ndss.2019.23109. ISBN 978-1-891562-55-6. Retrieved 29 November 2024.