WO2024233221A1 - Early commit late detect attack prevention - Google Patents
Early commit late detect attack prevention Download PDFInfo
- Publication number
- WO2024233221A1 WO2024233221A1 PCT/US2024/027225 US2024027225W WO2024233221A1 WO 2024233221 A1 WO2024233221 A1 WO 2024233221A1 US 2024027225 W US2024027225 W US 2024027225W WO 2024233221 A1 WO2024233221 A1 WO 2024233221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- received
- authentic
- attack
- degradation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00555—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks comprising means to detect or avoid relay attacks
Definitions
- the present disclosure relates generally to an electronic system and method, and, in particular embodiments, to a method for early commit late detect (ECLD) attack prevention.
- ECLD early commit late detect
- ECLD Early commit late detect attacks can occur in wireless communication environments when an attacking device learns symbols of a transmitted signal early during a communication phase between two devices and commits the symbols later in the communication phase to attempt to deceive the receiving device about the arrival time of the transmitted signal, and consequently, the proximity of the transmitting device to the receiving device. In turn, if successful, the receiving device may perform an action based on the signal, such as unlocking a device (e.g.. a vehicle door, a hotel door) for the attacker.
- a device e.g. a vehicle door, a hotel door
- Some embodiments disclosed herein advantageously result in improvements to early commit late detect attack prevention. Some embodiments may prevent attacks on devices and systems by manipulating signals communicated between devices such that attacks on the devices are detectable.
- a method for preventing ECLD attacks is provided. The method includes identifying, by a first device, a level of degradation, transmitting, by the first device during a first communication phase, a first signal with a first signal qualify based on the level of degradation, and transmitting, by the first device during a second communication phase, a second signal with a second signal qualify, wherein the second signal qualify' is greater than the first signal qualify.
- FIGS. 1 A and IB show block diagrams of a system, according to an embodiment of the present disclosure
- FIGS. 2A and 2B show methods for communicating signals of varying qualities between elements of a system, according to an embodiment of the present disclosure
- FIGS. 3A and 3B show sequence diagrams of a system, according to an embodiment of the present disclosure
- FIG. 4 shows phase trajectories and instantaneous frequency deviations of 3 symbol periods, according to an embodiment of the present disclosure
- FIGS. 5A, 5B, and 5C show waveforms associated with devices of FIGS. 1A and IB, according to embodiments of the present disclosure
- FIGS. 6 and 7 show bit error rate (BER) versus detection delay (DD) for different scenarios, according to embodiments of the present disclosure
- FIG. 8 shows eye diagrams associated with a device, according to an embodiment of the present disclosure
- FIG. 9 illustrates a relationship between eye quality indication (EQI) and DD, according to an embodiment of the present disclosure.
- FIGS. 10-20 show DD, EQI, eye diagrams, and waveforms for various scenarios, according to embodiments of the present disclosure.
- Embodiments of the present disclosure will be described in specific contexts, e.g., an early commit late detect (ECLD) attack prevention for unlocking a vehicle, e.g., using Bluetooth or Bluetooth Low Energy (BLE).
- Some embodiments may be used in other applications, such as for access control, e.g., in hotel rooms or businesses, as well as using other wireless communication protocols.
- Some embodiments may be used in applications different from access control, such as controlling a first device based on a proximity of a second device to the first device and/or for authenticating, by the first device, the second device based in part on the proximity of the second device to the first device.
- ECLD attacks may be understood as a ty pe of cyberattack on devices transmitting and receiving Bluetooth signals, for example.
- a malicious device attempting to commit an ECLD attack can mimic signals of one device to gain access or control of another device.
- a malicious device can transmit copied signals from a smart phone to a vehicle to attempt to unlock the vehicle and gain access inside the vehicle.
- the vehicle may receive the copied signals and believe the signals were coming from the smart phone, or otherwise an authorized device, and perform an action based on the signals.
- a first device e.g., a key fob or another device acting as a key fob
- the increased phase noise is intentionally caused by increasing the bandwidth of a PLL of the first device during transmission of at least a portion of the authentication packet.
- the first device uses a decreased phase noise while transmitting packets to the second device during a communication phase.
- a method of preventing ECLD attacks includes identifying, by a first device, a level of degradation, transmitting, by the first device during a first communication phase, a first signal with a first signal qualify based on the level of degradation, and transmitting, by the first device during a second communication phase, a second signal with a second signal qualify, wherein the second signal quality is greater than the first signal qualify.
- a device including a transmitter circuit and a processor is provided.
- the processor is configured to transmit, using the transmitter circuit during a first communication phase, a first packet with a first qualify , and transmit, using the transmitter circuit during a second communication phase, a second packet with a second qualify lower than the first qualify.
- a device including a transceiver and a processor is provided.
- the processor is configured to identify a level of degradation, identify a reference signal based on the level of degradation, receive a first signal, perform a comparison between the first signal and the reference signal to produce a comparison result, and determine whether the first signal is authentic or not authentic based on the comparison result.
- systems, methods, and devices for preventing ECLD attacks may not only increase robustness of a secure device that provides access, but also reduce design area requirements and cost by utilizing existing transceiver circuitry to produce filterable distortion to detect attacks while abiding by Bluetooth communications standards and protocols.
- FIGS. 1 A and IB show block diagrams of a system, according to an embodiment of the present disclosure.
- FIG. 1A includes operating environment 101, which includes device 105, device 1 10, and components thereof.
- FIG. IB includes operating environment 102, which also includes device 105, device 110, and components thereof, and further includes attack devices 120-1 and 120-2.
- Device 105 includes circuitry 7 106 and processor 108.
- Device 110 includes circuitry 7 111 and processor 113.
- devices 105 and 110 perform early commit late detect (ECLD) attack prevention processes, such as processes 200 and 210 of FIGS. 2A and 2B, respectively. Accordingly, devices 105 and 110 may execute such processes on hardware, software, firmware, or any combination or variation thereof.
- ECLD early commit late detect
- operating environment 101 is representative of an environment including device 105 and device 110 in wireless communication with each other.
- Device 105 may be representative of any device, apparatus, or system capable of transmitting and receiving signals to and from device 105 using a wireless communication protocol such as Bluetooth or BLE.
- device 105 may be a key fob or a smart phone.
- device 1 10 may be representative of any device, apparatus, or system capable of transmitting and receiving signals to and from device 105 via the wireless communication protocol.
- device 110 may be a vehicle, a hotel room keypad, or any other device configured to provide wireless access control.
- the wireless communication between devices 105 and 110 uses gaussian frequency -shift keying (GFSK).
- devices 105 and 110 include components capable of establishing wireless communications between each other, performing actions based on signals received from each other, and preventing ECLD attacks.
- device 105 includes circuitry 106 and processor 108.
- device 110 includes circuitry 111 and processor 113.
- Circuitry 106 and circuitry 1 11 may be representative of one or more hardware components capable of transmitting, receiving, and processing signals communicated over the wireless network.
- examples of circuitry' 106 and 111 may include communications equipment, antennas, transmit circuitry and receiver circuitry (e.g., a transceiver), logic devices, amplifiers and buffers, filters, analog-to-digital converters, and the like.
- circuitry 106 may include transceiver 107
- circuitry' 111 may include transceiver 112.
- additional circuitry' may be included in or external to devices 105 and 110.
- devices 105 and 110 may include or use one or more antennas located externally to devices 105 and 1 10 (e.g., and respectively coupled to circuitry 106 and 1 1 1) to facilitate communications between device 105 and device 110.
- Processors 108 and 113 may be representative of one or more processors or processing cores capable of controlling circuitry’ 106 and 111, respectively, and other aspects of devices 105 and 110, respectively.
- each of processors 108 and 113 may be implemented as a generic or custom controller or processor coupled to a memory and capable of executing instructions stored in the memory'.
- examples of processors 108 and 113 may include one or more generic or custom microcontrollers, DSPs, general purpose central processing units, application specific processors or circuits (e.g.. ASICs), and/or logic devices (e.g., FPGAs), as well as any other type of processing device, combinations, or variations thereof.
- devices 105 and 110 via circuitry 106 and 111 and processors 108 and 113, may perform several communication phases to negotiate characteristics of the communications between each other, authenticate each other, and provide signals and other data to each other.
- a first communication phase may include a negotiation phase.
- a second communication phase may include an authentication phase.
- a third communication phase may include a data communication phase.
- devices 105 and 110 may perform degradation negotiation 115 where devices 105 and 110 agree on a signal quality for communications over the Bluetooth connection.
- Device 110 may initialize the degradation negotiation 115 by transmitting, via circuitry 111 (e.g.. transceiver 112). a first signal to device 105 indicating a level of degradation to apply to a signal to be transmitted during authentication check 116.
- processor 113 of device 110 may select the level of degradation based on the quality or capabilities of circuitry 111 of device 110. For example, processor 113 may select a level of degradation corresponding to an amount of distortion that one or more filters of circuitry 1 11 can filter out to identify whether a received signal is authentic or not authentic.
- device 105 or 110 selects a level of degradation that corresponds to a qualify level that is lower than a maximum achievable communication qualify between devices 105 and 110 but that is higher than a minimum communication qualify to ensure that communication occurs between devices 105 and 110 without substantial errors (e g., a bit error rate lower than a predetermined threshold).
- device 105 may identify the level of degradation and transmit, via circuitry 106, an acknowledgement signal to device 110.
- device 110 may initiate an authentication phase to verify that device 105 is an authorized device and that subsequently received signals are authentic signals.
- devices 105 and 110 can perform authentication check 116.
- Authentication check 116 may begin when device 110 (or device 105 in other examples) transmits an authentication message (e.g., a message with a sequence of bits known to both devices 105 and 110) to device 105.
- the authentication message may be or include a round-trip time (RTT) packet (e.g., the RTT packet is sent by device 110 to device 105, received by device 105 and sent back by device 105 to device 110, and received by device 110, where the time between transmitting the RTT packet by device 110 and receiving the RTT packet by device 110 may be used to determine the distance between devices 105 and 110).
- RTT round-trip time
- Device 105 may receive the RTT packet during authentication check 116 and transmit a signal, including the known bits (or data based on the known bits), to device 110.
- Device 105 via circuitry 106 and processor 108, may intentionally distort the signal based on the level of degradation (i.e., transmit the signal with a lower signal qualify relative to other signals (e.g., communicated by device 105 during degradation negotiation 115 and/or data communication 117)) before sending the signal to device 110 to prevent ECLD attacks.
- This may entail changing the phase of the signal, injecting noise into the message to increase the signal-to-noise ratio (SNR) or bit error rate (BER) of the signal, or by some other means.
- SNR signal-to-noise ratio
- BER bit error rate
- Device 110 can receive the distorted signal, filter out the noise using circuitry 111, and determine whether the received signal is authentic or not authentic. This may entail determining the distance between devices 105 and 110 based on the arrival time (e.g.. phase) of the received signal versus the transmittal time of the RTT packet from device 110 (e.g.. a round trip delay (RTT) of the authentication message sent either from device 105 or device 110). In some examples, the distance may include a threshold distance range (e.g., 0 to 3 meters). If device 110 determines that the distance between devices 105 and 110 is outside the threshold distance range, device 110 may determine that the received signal is not authentic and may not perform an action.
- the distance may include a threshold distance range (e.g., 0 to 3 meters). If device 110 determines that the distance between devices 105 and 110 is outside the threshold distance range, device 110 may determine that the received signal is not authentic and may not perform an action.
- device 110 may determine that the received signal is authentic and may perform an action. In some examples, determining whether the received signal is authentic or not authentic may, instead or in addition, entail determining an amount of distortion of the received signal, the BER value of the received signal, and/or the phase of the received signal. If the amount of distortion, BER value, or phase of the received signal exceeds a respective threshold value, device 110 may determine that the received signal is not authentic.
- device 110 may be a vehicle and device 1 5 may be a key fob (or a smart phone or other device acting as a key fob). Based on the time of arrival (e.g., phase) of the authentication message received by device 110 from device 105 during authentication check 116, device 110 may determine the proximity between the devices. If device 105 is closer than a predetermined threshold (e.g., 1 meter) from device 110. device 110 may take an action, such as unlock the vehicle, enable an unlocking capability of the vehicle, e.g., upon pressing a button in a handle of the vehicle, etc.
- a predetermined threshold e.g. 1 meter
- devices 105 and 110 may perform data communication 117 during a communication phase.
- Data communication 117 may include transmission of data and other signals from device 105 to device 110.
- data communication 1 17 between devices 105 and 110 may occur continuously or irrespectively with regard to authentication check 116.
- device 105 may transmit signals during data communication 117 with higher signal quality relative to the signal transmitted during authentication check 116.
- device 105 may not intentionally distort signals based on the negotiated level of degradation.
- the signals transmitted during the communication phase may have decreased noise, and BER values, and increased SNR values relative to signals transmitted during the authentication phase.
- operating environment 102 is representative of an environment including device 105, device 110, and attack devices 120-1 and 120-2 (collectively referred to as attack devices 120) whereby attack devices 120 attempt to wirelessly communicate with devices 105 and 110 to perform an ECLD attack on device 110.
- Attack devices 120 may be representative of any device, apparatus, or system capable of communicating with devices 105 and 110 and with each other.
- attack devices 120 may be referred to as a man in the middle (MITM) device that can manipulate the communication between devices 105 and 110 and cause device 110 to receive the authentication message during authentication check 116, where the authentication message appears to arrive earlier than what it would have without the actions of attack devices 120.
- MITM man in the middle
- attack device 120-1 may be positioned in proximity to device 105, while attack device 120-1 may be positioned in proximity to device 110.
- Attack devices 120-1 and 120-2 may be connected to each other via a physical cable or some other high-speed communication mechanism.
- scenario 102 is similar to scenario 101, but with attack devices 120 acting to relay /forward communications between devices 105 and 110.
- devices 105 and 110 are far from each other and are outside Bluetooth communication range.
- device 110 initiates degradation negotiation 115 between device 110 and device 105 via attack devices 120 (devices 105 and 110 are outside Bluetooth communication range). In some embodiments, this may entail device 110 providing a first signal to device 105 to agree upon a level of degradation and transmitting a signal indicating the identified level of degradation. In some embodiments, this may entail attack device 120-2 intercepting the signal indicating the identified level of degradation being transmitted by device 110. In any case, attack device 120-2 can provide the signal, via the physical link, to attack device 120-1. Attack device 120-1 may provide the signal to device 105. Device 105 can acknowledge the level of degradation and transmit an acknowledgement signal. In some examples, device 105 is not close enough to device 110 for this signal to reach device 110. However, attack device 120-1 can intercept this signal and relay it to device 110 via attack device 120-2.
- attack devices 120 can attempt to perform authentication check 116 between device 105 and device 110 to attempt to gain access to device 110 via an ECLD attack.
- device 110 can transmit a signal including an RTT packet, which can be relayed from device 1 10 to device 105 if the two devices are not close enough to each other by attack devices 120.
- device 105 can transmit an authentication signal with a signal quality based on the identified level of degradation. The signal quality may be a poor quality signal relative to other signals transmitted by device 105 during other phases.
- Attack device 120-1 can intercept the degraded signal, attempt to predict a sequence of bits of the degraded signal (in an attempt to replicate the signal transmitted by device 105), and transmit a signal to attack device 120-2 for further transmission to device 110. More particularly, in some embodiments, attack devices 120 begins transmitting "relayed" bits before receiving them (based on a prediction), and then make an adjustment (flip the bit) if the prediction was wrong. If, because of noise, device 120 determines that the prediction is wrong too late, then it needs to boost the flipped bit to recover from the bad prediction. The later the bad prediction is identified, the more boost the flipped bit needs, and the more distortion imparted to the signal, which makes it more recognizable.
- Device 110 can receive a signal from attack devices 120 and determine whether the received signal is authentic or not authentic. Determining whether the received signal is authentic or not authentic may include determining an amount of distortion of the received signal, the BER value of the received signal, and/or the phase, or phase trajectory, of the received signal. If the amount of distortion, BER value, or phase of the received signal exceeds a respective threshold value, device 110 may determine that the received signal is not authentic. In addition, or instead, determining whether the received signal is authentic or not authentic may entail determining the distance between devices 105 and 110 based on the received signal. In this example including attack devices 120, device 110 may utilize any of the aforementioned methods to determine that the received signal is not authentic.
- device 1 10 may determine that the round trip delay time between transmitting the authentication signal and receiving the returned signal is beyond a predetermined threshold value. The delay may occur based on the level of degradation applied to the signal by device 105 as attack device 120-1 may experience issues predicting and relaying the signal due to the poor signal quality. It follows that the distortion added to the signal may also influence the distortion, BER value, and/or phase of the signal copied by attack device 120-1. Thus, after determining that the received signal is not authentic, device 110 may not authorize access or perform an event. Device 1 10 may further terminate data communications 117 between device 105 in some examples.
- device 110 may be a vehicle parked in a driveway of a house, and device 105 may be at the master bedroom of the house (e.g., 20 meters away from device 110).
- Attack devices 120 may be split into two nodes, a first node (attack device 120-1) near the master bedroom of the house (near device 105) and a second node (attack device 120-2) near the vehicle (near device 110). where the two attack devices 120 are connected via a physical cable or some other high-speed communication mechanism.
- attack devices 120 may attempt to predict the next symbol and transmit the predicted symbol to device 110 (e.g..
- device 110 can determine that an ECLD attack has occurred and refuse to perform an action, such as unlocking one or more doors of the vehicle.
- device 105 may be a hotel key
- device 110 may be a hotel room keypad.
- Devices 105 and 110 can employ the described techniques to prevent ECLD attacks from attack devices 120 attempting to gain unauthorized access.
- FIGS. 2A and 2B show methods for communicating signals of varying qualities between elements of a system to prevent ECLD attacks, according to an embodiment of the present disclosure.
- FIG. 2A includes process 200
- FIG. 2B includes process 210. Both processes 200 and 210 reference elements of operating environments 101 and 102 of FIGS. 1A and IB, respectively.
- processes 200 and 210 may be implemented in software, hardware, firmware, or any combination or variation thereof.
- process 200 may include a series of steps taken, e.g., by device 105, or from the perspective of device 105, during different communication phases occurring between device 105 and device 110.
- device 105 via processor 108 of device 105, identifies a level of degradation with which to transmit an authentication signal to device 110 during a negotiation phase.
- the level of degradation may be selected based on the capabilities of device 105, such as the hardware capabilities of device 105.
- level of degradation is identified during design or manufacturing of device 105 and such level of degradation may be stored in non-volatile memory of device 105.
- the level of degradation is selected based on the capabilities of device 110 (which may be received via a message), in addition to the capabilities of device 105. For example, in some embodiments, the level of degradation may be selected as the worst degradation tolerated by both devices 105 and 110.
- devices 105 and 110 may agree on a signal quality for communications over the Bluetooth connection.
- device 105 may initiate the negotiation phase.
- device 110 may transmit a first signal to device 105 indicating a level of degradation to apply to a signal to be transmitted during an authentication phase.
- Processor 113 of device 110 may select the level of degradation based on the quality or capabilities of circuitry' 111 of device 110 and/or circuitry 106 of device 105. For example, processor 113 may select a level of degradation corresponding to an amount of distortion that one or more filters of circuitry 111 can filter out to identify whether a received signal is authentic or not authentic.
- device 105 may identify the level of degradation and transmit, via circuitry 106, an acknowledgement signal to device 110.
- device 105 via circuitry 106 (e.g., transceiver 107), transmits the authentication signal with a first signal quality based on the identified level of degradation.
- device 105 may send the authentication signal in response to receiving an RTT packet sent from device 110.
- the authentication signal may include an authentication packet with a series of bits known to both device 105 and device 110.
- Device 105 may intentionally inject noise or otherwise degrade the quality with which it transmits the packet (e.g., based on the selected level of degradation identified during step 201), e.g., so that a MITM (e.g., attack devices 120) cannot reproduce the authentication signal sufficiently earlier and/or without substantial distortion.
- Degrading the signal may entail changing the phase or phase trajectory of the signal, injecting noise into the message to decrease the signal -to-noise ratio (SNR) or increase the bit error rate (BER) of the signal, or by some other means.
- SNR signal -to-noise ratio
- BER bit error rate
- Device 110 can receive the distorted authentication signal, filter out the noise using circuitry 7 111, and determine whether the received signal is authentic or not authentic. This may entail determining the distance between devices 105 and 110 based on the arrival time (e.g.. phase) of the received signal versus the transmittal time of the RTT packet from device 110 (e.g., a round trip delay (RTT) of the authentication message sent either from device 105 or device 110). In some examples, the distance may include a threshold distance range (e.g., 0 to 3 meters). If device 110 determines that the distance between devices 105 and 110 is outside the threshold distance range, device 110 may determine that the received signal is not authentic and may not perform an action.
- the distance may include a threshold distance range (e.g., 0 to 3 meters). If device 110 determines that the distance between devices 105 and 110 is outside the threshold distance range, device 110 may determine that the received signal is not authentic and may not perform an action.
- device 110 may determine that the received signal is authentic and may perform an action, such as initializing a data communication phase with device 105.
- device 110 may determine that the signal is not authentic based on the BER (e.g., BER higher than a predetermined threshold), a change in phase during transmission of the RTT packet, and/or an SNR lower than a predetermined threshold.
- device 105 may transmit a data signal with a second signal quality that is greater than the first signal quality of the authentication signal.
- the data signal may include a data packet unrelated to the authentication between devices 105 and 110.
- devices 105 and 110 may exchange data signals periodically, continuously, or at any time before and/or after the authentication phase. However, device 105 may transmit the authentication signals with degraded signal quality relative to the data signals. It follows that, in some embodiments, device 105 may not inject noise into the data signals transmitted before or after the authentication phase, such that the data signals are transmitted with higher quality than the authentication signals.
- process 210 may represent a series of steps taken by device 110, or from the perspective of device 110 during different communication phases occurring between device 105 and device 110.
- device 110 identifies a level of degradation that device 105 may use to transmit an authentication signal during an authentication phase (e.g.. based on a message received from device 105).
- the level of degradation may correspond to a signal quality of the communication transmitted from device 105 to device 110.
- device 110 may determine the level of degradation based on capabilities of circuitry 111 to filter out an amount of distortion and noise corresponding to the level of degradation and/or based on capabilities of circuitry 105 to produce distorted signals based on the level of degradation.
- device 110 may provide the level of degradation to device 105 (e.g., via a message during the degradation negotiation).
- device 110 identifies a reference signal based on the level of degradation selected.
- the reference signal includes an authentication packet (or a portion thereof) having a sequence of bits.
- the sequence of bits may be known to both device 110 and device 105 used for authentication purposes.
- Device 110 may use the reference signal to compare incoming authentication signals to determine whether any received authentication signals are authentic or not.
- the reference signal includes a degradation based on the selected degradation level.
- device 110 determines a reference signal based on the sequence of bits and the level of degradation selected, e.g., such that the reference signal is a degraded sequence of bits (e.g.. a digital representation of an analog signal that encodes the sequence of bits, where the analog signal is degraded based on the selected level of degradation.
- device 110 receives a first signal having a first signal quality'.
- the first signal may refer to an authentication signal including the authentication packet.
- the first signal may include an RTT packet.
- the first signal may be transmitted by device 105.
- the first signal may be transmitted by another device, such as a MITM like one of attack devices 120, e.g., forwarding the signal transmitted by device 105.
- device 110 performs a comparison between the reference signal and the received first signal to produce a comparison result.
- device 110 can filter out noise and distortion of the received first signal before making the comparison, and then identify whether the sequence of bits of the received first signal matches the sequence of bits of the reference signal.
- comparing the received signal with the reference signal comprises performing a correlation operation.
- a correlation operation is performed between the reference signal and the received first signal, where the comparison result is indicative of a deviation of the first signal from the reference signal.
- the received signal is compared with a predetermined metric (e.g., based on the selected degradation level). For example, in some embodiments, a BER of the received signal is compared with a predetermined BER threshold (e.g., based on the selected degradation level) to produce a comparison result. In some embodiments, an SNR of the received signal is compared with a predetermined SNR threshold (e.g., based on the selected degradation level) to produce a comparison result. In some such embodiments, the step of generating the reference signal may be replaced with generating the (e.g., BER, SNR) threshold.
- device 110 may determine whether the first received signal is authentic or not authentic. Determining whether the received signal is authentic or not authentic may include determining an amount of distortion of the received signal, the BER value of the received signal, and/or the phase, or phase trajectory, of the received signal. If one or more of the amount of distortion, BER value (e.g., even if the errors are recoverable), or phase of the received signal exceeds a respective threshold value, device 110 may determine that the received signal is not authentic. For example, a signal with too much distortion or incorrect sequencing of the bits may indicate an attack signal, or a signal that is not authentic.
- determining whether the received signal is authentic or not authentic may entail determining the distance between devices 105 and 110 based on the received signal.
- device 110 may determine a threshold distance value.
- Device 110 can compare the determined distance to the threshold distance value, and based on the comparison result, determine whether the received signal is authentic or not authentic. This distance determination process may occur before, after, or simultaneously with the authentication process.
- device 110 may detect a change of phase during reception of the authentication packet (e.g., during reception of the sequence of bits). Such change of phase may be indicative of an attack and may result in device 110 determining that the device is not authentic (e.g., during step 215). In some such embodiments, generation of the reference signal (e.g., during step 212) and generating the comparison result (e.g., during step 214) may be omitted. In some embodiments, detection of the change of phase may be performed by performing a correlation between the received signal and the reference signal.
- device 110 may perform an action.
- device 105 may be a smart phone and device 110 may be a vehicle, or a component thereof. If device 105 is close enough to device 110, and device 110 is able to decipher the authentication packet and detect that the authentication packet is authentic (i.e., device 110 does not detect anomalies (e g., BER beyond a threshold, change of phase beyond a threshold, etc.)), then device 110 may unlock doors of the vehicle. If device 105 is close enough to device 110, but device 110 is not able to decipher the authentication packet (e.g., based on noise), then device 110 may not unlock doors of the vehicle and device 110 may instead proceed to operation 217.
- anomalies e.g., BER beyond a threshold, change of phase beyond a threshold, etc.
- device 110 may terminate communications and refuse to perform an action (e.g.. unlocking action). For example, device 110 may determine that the received first signal is not authentic if the round trip delay 7 time between transmitting the RTT packet and receiving the first signal is beyond a predetermined threshold value.
- the delay may occur based on the level of degradation applied to the signal by device 105 as attack device 120-1 may experience issues predicting sequencing of the signal and relaying a predicted signal to device 110 due to the poor signal quality. It follows that the distortion added to the signal may also influence the distortion, BER value, and/or phase of the signal copied by attack device 120-1 or attack device 120-2, which in turn, may prevent unauthorized access to device 110.
- FIGS. 3A and 3B show sequence diagrams of a system, according to an embodiment of the present disclosure.
- FIG. 3 A includes sequence 301, which references elements of operating environment 101 of FIG. 1A.
- FIG. 3B includes sequence 302, which references elements of operating environment 102 of FIG. IB.
- Sequences 301 and 302 include a senes of operations taken by elements of FIGS. 1A and IB, respectively, which may correspond to steps of processes 200 and 210 of FIGS. 2A and 2B, respectively.
- sequence 301 includes a series of communications and events occurring between device 105 and device 110.
- Sequence 301 may begin when device 110 initiates a negotiation phase with device 105.
- devices 105 and 110 may agree on a signal quality for communications over the Bluetooth connection.
- device 110 may select or identity' a level of degradation for use during a subsequent communication phase between devices 105 and 110.
- device 105 may select or identify the level of degradation for use during the subsequent communication phase between devices 105 and 1 10.
- device 110 may then transmit a signal indicating the level of degradation to device 105.
- device 105 may return an acknowledgement to device 110.
- device 105 may transmit a signal indicating the level of degradation to device 11 .
- device 1 10 may return an acknowledgement to device 105.
- device 110 may initiate an authentication phase to verify that device 105 is an authorized device and that subsequently received signals are authentic signals within predetermined thresholds.
- device 110 (or device 105 in other examples) may transmit an authentication message (e.g., a message with a sequence of bits known to both devices 105 and 110) to device 105.
- the authentication message may be a round-trip time (RTT) packet (e.g., the RTT packet is sent by device 110 to device 105, received by device 105 and sent back by device 105 to device 110, and received by device 110, where the time between transmitting the RTT packet by device 110 and receiving the RTT packet by device 110 may be used to determine the distance between devices 105 and 110).
- RTT round-trip time
- Device 105 may receive the RTT packet during authentication check 116 and transmit a signal, including the known bits, to device 110.
- device 105 Prior to transmitting a return signal in response to the RTT packet, however, device 105, via circuitry' 106 and processor 108. may intentionally degrade the signal based on the level of degradation (i. e. , transmit the signal with a lower signal quality relative to other signals communicated during other communication phases) before sending the signal to device 110 to prevent ECLD attacks.
- Degrading the signal carrying the RTT packet may entail changing the phase or phase trajectory of the signal, injecting noise into the message to increase the signal -to-noise ratio (SNR) or bit error rate (BER) of the signal, or by some other means.
- SNR signal -to-noise ratio
- BER bit error rate
- Device 110 can receive the distorted signal, fdter out noise using circuitry 111, and determine whether the received signal is authentic or not authentic. This may entail determining an amount of distortion of the received signal, the BER value of the received signal, the phase or phase traj ectory of the received signal, or the distance between devices 105 and 110 based on the arrival time (e.g., phase) of the received signal versus the transmittal time of the RTT packet from device 110 (e.g., a round trip delay (RTT) of the authentication message sent either from device 105 or device 110). In some examples, the distance may include a threshold distance range (e.g., 0 to 3 meters).
- device 110 may determine that the received signal is not authentic and may not perform an action. However, if device 110 determines that the distance between devices 105 and 110 is within the threshold distance range, device 110 may determine that the received signal is authentic and may perform an action. In some examples, if the amount of distortion, BER value, or phase of the received signal exceeds a respective threshold value, device 1 10 may determine that the received signal is not authentic.
- device 105 may begin a communication phase (if not already in progress) where device 105 transmits data signals without the degradation applied during the authentication phase.
- sequence 302 includes a series of communications and events occurring between device 105, device 110, and attack devices 120.
- attack devices 120 may function as malicious MITM devices attempting to gain access to device 110.
- Sequence 302 begins when device 105 initiates the negotiation phase with device 110.
- device 105 may transmit a signal to device 110 to agree upon a level of degradation with which to transmit a signal between device 105 and device 110.
- attack device 120-1 can intercept a signal indicating the identified level of degradation being transmitted by device 105.
- Attack device 120-1 can provide the signal, via a physical cable linking atack device 120-1 and 120-2, to atack device 120-2.
- Atack device 120-2 may provide the signal to device 110.
- Device 110 can acknowledge the level of degradation and transmit an acknowledgement signal, which may be transmited from device 110 to atack device 120-2 and further to atack device 120-1 and device 105.
- device 105 can, instead, acknowledge the level of degradation and transmit the acknowledgement signal to device 110 via atack devices 120.
- Atack devices 120 can atempt to gain access to device 110 via an ECLD atack.
- device 110 can transmit an RTT packet, which can be relayed (and possibly modified) from device 110 to device 105 if the two devices are not close enough to each other by atack devices 120.
- device 105 can transmit an authentication signal with a signal quality based on the identified level of degradation. The signal quality may be a poor quality signal relative to other signals transmited by device 105 during other phases.
- Atack device 120-1 can intercept the degraded signal, atempt to predict a sequence of bits of the degraded signal, and transmit a modified version of the signal to atack device 120-2 for further transmission to device 110.
- Device 110 can receive the signal from atack device 120-2 and determine whether the received signal is authentic or not authentic. Determining whether the received signal is authentic or not authentic may include determining an amount of distortion of the received signal, the BER value of the received signal, the phase or phase trajectory of the received signal, or the distance between devices 105 and 1 10 based on the received signal. In this example including atack devices 120, device 110 may utilize any of the aforementioned methods to determine that the received signal is not authentic. For example, device 110 may determine that the round trip delay time between transmiting the authentication signal and receiving the returned signal is beyond a predetermined threshold value.
- the delay may occur based on the level of degradation applied to the signal by device 105 as atack device 120-1 may 7 experience issues copying the signal due to the poor signal quality 7 . It follows that the distortion added to the signal may also influence the distortion. BER value, and/or phase of the signal copied by atack device 120-1. Thus, after determining that the received signal is not authentic, device 110 may not authorize access or perform an event. Device 1 10 may further terminate data communications between device 105 in some examples.
- FIG. 4 shows possible phase trajectories and instantaneous frequency deviations of 3 symbol periods, according to an embodiment of the present disclosure.
- Curve 402 represent symbols (1, 1 ,1).
- Curve 404 represent symbols (1, 1 ,0).
- Curve 406 represent symbols (1, 0 ,1).
- Curve 408 represent symbols (1, 0 ,0).
- Curve 410 represent symbols (0, 1 ,1).
- Curve 412 represent symbols (0, 1 ,0).
- Curve 414 represent symbols (0, 0 ,1).
- Curve 416 represent symbols (0, 0 ,0).
- the last of the three symbols of any of curves 402. 404, 406, 408, 410, 412, 414 and 416 may be predicted based on the phase of the signal at the detection delay (DD) period of the second symbol.
- the DD period also referred to as the attack window, may be defined from the symbol boundary (e.g.. zero-crossing) and may be a negative value if the bit can be detected based on the gaussian spreading into the previous bit.
- the signal (r(t)) may include a message (m(t)), which represents the signal in time, may each be defined by the following equations:
- graphical representation 400 shows the signal in the top most portion that includes curves 402, 404. 406, 408. 410, 412, 414. an 416, and derivatives of the signal in the bottom four portions of the graph.
- phase noise or 0 n in the signal equation above, from device 105 may cause a shift to the right (a delay) to the attack window (making DD less negative, or more positive), which may result in more distortion in the signal received by device 110 a change (e.g., increase) in phase of the signal received by device 110.
- FIG. 5A shows graphical representations 501, 502, and 503, which include waveforms 510, 512, and 514, respectively, associated with device 105, attack devices 120, and device 110 of FIG. IB, respectively, in an example where attack devices 120 do not make an attack.
- FIG. 5B shows graphical representations 501, 504. and 505, which include waveforms 510, 516, and 518, respectively, associated with device 105, attack devices 120, and device 110, respectively, in an example where attack devices 120 make an attack.
- FIG. 5A shows graphical representations 501, 502, and 503, which include waveforms 510, 512, and 514, respectively, associated with device 105, attack devices 120, and device 110 of FIG. IB, respectively, in an example where attack devices 120 do not make an attack.
- FIG. 5B shows graphical representations 501, 504. and 505, which include waveforms 510, 516, and 518, respectively, associated with device 105, attack devices 120, and device 110, respectively, in
- FIGS. 5C shows graphical representations 501, 506, and 507, which include waveforms 510, 520, and 522, respectively, associated with device 105, attack devices 120, and device 110, respectively, in an example where attack devices 120 make an attack.
- Each of the waveforms of FIGS. 5A, 5B, and 5C may represent derivatives of the message (mft)) transmitted by device 105, transmitted by attack devices 120, and processed at device 110 (e.g., an internal signal of device 110 following filtering with a full-symbol latency filter), respectively.
- waveform 510 includes a sequence of bits, such as “10100111” transmitted by device 105 to device 110.
- attack devices 120 intercepts the signal transmitted by device 105 and forwards such signal to device 110 without modifying the signal, as shown by waveform 510.
- Wav eform 514 illustrates the signal received by device 110. As shown in FIG. 5 A.
- waveform 514 may be shifted (e.g., due to the effect of filtering by device 110) and includes the same sequence of bits as waveforms 510 and 512, e.g., but with a single period delay as the zero-crossings of device 110 correspond to zero-crossings of device 105 (e.g., due to a full symbol latency filter).
- attack devices 120 may produce waveform 516 while attempting to predict the sequence of bits of waveform 510.
- attack devices 120 may create the attack signal (waveform 516) from approximately 20 meters away from device 105 and with a detection delay (DD) of -0.16. As can be seen by comparing FIGS.
- waveform 518 (which illustrates the waveform received by device 110 after being modified by device 120) is shifted to the left with respect to waveform 512.
- the distortion introduced by attack devices 120 e.g., by boosting the predicted signal to cause the shift in the waveform, as illustrates by waveform 516) may be filtered by device 110, thereby allowing device 110 to recreate the authentication message sent by device 105 without detecting substantial distortion, while the authentication message appears to arrive earlier, thereby causing device 105 appearing to be closer to device 1 10.
- FIG. 5C shows waveforms 510, 520, and 522 associated with device 105, attack devices 120, and device 110, respectively.
- FIG. 5C shows a scenario with a higher DD (compared to FIG. 5B) in which attack device is unable to detect the next symbol too early (e.g., due to increased noise).
- device 120 may detect a prediction error and correct such error at a later time.
- FIGS. 5B and 5C show a symbol prediction error at about time 4 (prediction 1: actual symbol 0), which is corrected as soon as device 120 detects such error.
- device 120 detects such error at a later time in FIG. 5C with respect to FIG. 5B (e.g., DD is -0.16 in FIG. 5B versus 0 in FIG. 5C), more distortion is introduced at about time 4 in the scenario illustrated in FIG. 5C versus the scenario illustrated in FIG. 5B (see magnitude of flipping of symbol at about time 4 in waveform 520 versus waveform 514).
- Such distortion may become high enough (if DD is sufficiently high, such as 0 or positive, in some embodiments) so that it becomes perceivable and detectable after filtering in device 110 (see increased distortion in waveform 522 between about times 4 and about 5.4 versus distortion in waveform 518 between about times 4 and 5.4).
- device 110 detects the distortion of waveform 520 and, in response, refuses to take action (e.g., does not authenticate device 105, even if device 105 appears to be near device 110).
- device 105 degrades the signal carrying the RTT packet (e.g., by injecting noise into the signal) to prevent device 120 from predicting the symbols early (thereby causing DD to be less negative, 0, or even positive, with respect to a non-degraded signal).
- device 105 dynamically (e.g., abruptly) changes the phase noise component 0 n (and, thus, the signal-to-noise ratio (SNR)) during transmission of a packet or message (e.g., during the RTT packet).
- SNR signal-to-noise ratio
- a device may have a transmitter capable of adjusting a SNR output within a given range for modulated transmissions.
- a transmitter capable of adjusting a SNR output within a given range for modulated transmissions.
- a device supports at least 1 of the SNR levels shown in Table 1 (e.g., level 3 may be mandatory, according to a protocol or standard), but may not support all of the levels.
- a device e.g.. 105 or 110
- selecting or identifying a degradation level includes selecting a level from a predetermine list of possible levels, such as the 7 possible levels shown in Table 1.
- the lowpass filter used for the reception of CS_SYNC packet transmitted by the device may be considered wideband.
- the SNR control error may be computed by:
- device 105 changes the phase noise by changing the bandwidth of a phase-locked-loop (PLL) of a transmit path of device 105.
- PLL phase-locked-loop
- the bandwidth of the PLL of device 105 may be low at a first value, which may advantageously result in a low BER.
- the bandwidth of the PLL may be increased to a second value higher than the first value.
- Such increased bandwidth may result in an increase in phase noise, which may advantageously increase the chances of device 1 10 of detecting an attack by attack devices 120, or may make it difficult for attack devices 120 to cany' out the attack.
- the PLL of device 105 has the bandw idth equal to the second value during the entirety of the authentication phase. In some embodiments, the PLL of device 105 has the bandwidth equal to the second value during a portion of the authentication phase (at the beginning, or at the end), while the PLL has the first value (or another value different than the first value) during other portions of the authentication phase.
- FIG. 6 shows simulations 601, 602, and 603 of bit error rate (BER) versus detection delay (DD) for different signal-to-noise ratios (SNR).
- FIG. 7 shows simulation 700 of bit error rate (BER) versus DD for different real device data captures, such as for different distances within line of sight (LoS) and for nonLoS (nLoS).
- degrading the transmitted signal quality results in higher DD. This is illustrated, e.g.. in FIGS. 6 and 7 with respect to BER. Since a higher DD may cause device 120 to introduce more distortion, which may be detectable by device 110, in some embodiments, degrading the transmitted signal quality may advantageously allow a device (e.g., 110) to detect an ECLD attack.
- phase noise may force attack devices 120 to adopt a higher DD and consequently make the attack more detectable.
- FIG. 8 shows eye diagrams 801 and 802 associated with device 110, according to an embodiment of the present invention.
- FIG. 9 illustrates a relationship on graphical representation 9000 between eye quality indication (EQI) (i.e., an indication of the quality of the eye diagram, which may be measured/determined in any way known in the art) and detection delay (DD), according to an embodiment of the present invention.
- EQI eye quality indication
- DD detection delay
- the EQI may correspond to an SNR value, such as a value of Table 1 above.
- EQI may be indicative of the DD, with a higher EQI resulting in a higher DD.
- an EQI of around 0.6 results in a DD of 0.
- a DD of 0 may be sufficiently high to allow for device 110 to detect an attack by attack devices 120.
- the phase noise of device 105 is increased to a value to cause the EQI of device 105 to be, e.g., lower than 0.7, such as between an upper threshold value (e.g., 0.7) and a lower threshold value (e.g., 0.6).
- modulation characteristics may be used to determine upper and lower threshold values at varying frequencies, such as between 200 kHz and 300 kHz. Based on the frequency values recorded over various test packets, a modulation characteristic between 0.6 and 0.7, for example, may be used to distort signals to prevent attacks by malicious devices, such as attack devices 120.
- a positive DD may require the attacker (e.g., attack devices 120) to manipulate the signal delay in such a way so as to leave a measurable imprint (e.g., distortion) in the intended receiver (e.g., device 110).
- the real transmitter e.g., device 105
- the real transmitter can control its local phase noise so as to cause the attacker (e.g.. attack devices 120) to resort to DD values higher than or equal to 0.
- a modulation characteristic can require a certain guaranteed level of phase noise for RTT packets.
- FIGS. 10-20 show DD, EQI, eye diagrams, and waveforms for various scenarios, according to embodiments of the present invention.
- Example 1 A method, including: identifying, by a first device, a level of degradation; transmitting, by the first device during a first communication phase, a first signal with a first signal qualify based on the level of degradation; and transmitting, by the first device during a second communication phase, a second signal with a second signal quality, where the second signal qualify is greater than the first signal quality.
- Example 2 The method of example 1, where identifying the level of degradation includes identifying the level of degradation based on a capability of the first device.
- Example 3 The method of one of examples 1 or 2, further including: identify ing, by a second device, a reference signal based on the level of degradation; receiving, by the second device during the first communication phase, the first signal; performing, by the second device, a comparison between the reference signal and the received first signal to produce a comparison result; and determining, by the second device, whether the received first signal is authentic or not authentic based on the comparison result.
- Example 4 The method of one of examples 1 to 3, further including, in response to determining that the received first signal is not authentic, terminating communication between the first device and the second device.
- Example 5 The method of one of examples 1 to 4, where determining that the received first signal is not authentic includes determining that the received first signal deviates from the reference signal by more than a predetermined threshold.
- Example 6 The method of one of examples 1 to 5, where: performing the comparison between the received first signal and the reference signal includes performing a correlation between the received first signal and the reference signal to generate a correlation result, where the comparison result includes the correlation result; and determining whether the received first signal is authentic or not authentic includes: determining that the received first signal is authentic when the correlation result is above a predetermined threshold; and determining that the received first signal is not authentic when the correlation result is below the predetermined threshold.
- Example 7 The method of one of examples 1 to 6, further including, in response to determining that the received first signal is authentic, authenticating, by the second device, the first device for the second communication phase.
- Example 8 The method of one of examples 1 to 7, further including determining a distance between the first device and the second device based on the received first signal.
- Example 9 The method of one of examples 1 to 8, further including, in response to determining that the distance is below a predetermined distance, and that the received first signal is authentic, unlocking a vehicle.
- Example 10 The method of one of examples 1 to 9, where the predetermined distance is three meters.
- Example 11 The method of one of examples 1 to 10. where the first and second devices are part of an access control system for a room.
- Example 12 The method of one of examples 1 to 11, where the level of degradation corresponds to a predetermined signal-to-noise ratio (SNR) value or a predetermined bit error rate (BER).
- SNR signal-to-noise ratio
- BER bit error rate
- Example 13 The method of one of examples 1 to 12, where the first signal includes a round trip time (RTT) packet, the method further including: receiving, by a second device, the RTT packet; determining a distance between the first and second devices based on the received RTT packet; and unlocking a vehicle based on the determined distance.
- RTT round trip time
- Example 14 The method of one of examples 1 to 13, where determining the distance includes determining the distance based on a phase of a symbol of the RTT packet.
- Example 15 The method of one of examples 1 to 14, further including: receiving, by a second device, the first signal; detecting an attack based on a distortion of the received first signal; and refusing to take an action, by the second device, based on detecting the attack.
- Example 16 The method of one of examples 1 to 15, where the first signal includes a round trip time (RTT) packet, the method further including: receiving, by a second device, the RTT packet; detecting an attack based on a bit error rate (BER) of the received RTT packet; and refusing to take an action, by the second device, based on detecting the attack.
- RTT round trip time
- BER bit error rate
- Example 17 The method of one of examples 1 to 16, further including: receiving, by a second device, the first signal; detecting an attack based on a change in phase trajectory during reception of the first signal; and refusing to take an action, by the second device, based on detecting the attack.
- Example 18 The method of one of examples 1 to 17, where transmitting the first signal with a first signal quality includes transmitting the first signal using a phase-locked-loop (PLL) of the first device, the PLL having a first bandwidth, and where transmitting the second signal with the second signal quality includes transmitting the second signal with the PLL having a second bandwidth lower than the first bandwidth.
- PLL phase-locked-loop
- Example 19 The method of one of examples 1 to 18, where transmitting the first signal includes transmitting the first signal using Bluetooth.
- Example 20 The method of one of examples 1 to 19, where transmitting the first signal includes transmitting the first signal using Bluetooth-Low-Energy (BLE).
- BLE Bluetooth-Low-Energy
- Example 21 The method of one of examples 1 to 20, where the level of degradation includes a value at or above a predetermined first threshold value and at or below a predetermined second threshold value.
- Example 22 The method of one of examples 1 to 21, where the predetermined first threshold value is 18 dB and where the predetermined second threshold value is 30 dB.
- Example 23 The method of one of examples 1 to 22, where the first device is a key fob or a smartphone.
- Example 24 The method of one of examples 1 to 23, where transmitting the second signal includes transmitting the second signal after transmitting the first signal.
- Example 25 The method of one of examples 1 to 23. where transmitting the second signal includes transmitting the second signal before transmitting the first signal.
- Example 26 A device, including: a transmitter circuit; and a processor configured to: transmit, using the transmitter circuit during a first communication phase, a first packet with a first quality; and transmit, using the transmitter circuit during a second communication phase, a second packet with a second quality lower than the first quality.
- Example 27 The device of example 26, where the second communication phase occurs after the first communication phase.
- Example 28 The device of example 26, where the second communication phase occurs before the first communication phase.
- Example 29 The device of one of examples 26 to 28, where transmitting the first packet with the first uality includes transmitting the first packet with a first phase noise value, and where transmitting the second packet with the second quality includes transmitting the second packet with a second phase noise value that is higher than the first phase noise value.
- Example 30 The device of one of examples 26 to 29, further including a phase- locked-loop (PLL) having a filter with dynamic bandwidth, where transmitting the first packet with the first quality includes configuring the dynamic bandwidth to a first bandwidth, and where transmitting the second packet with the second quality includes configuring the dynamic bandwidth to a second bandwidth higher than the first bandwidth.
- PLL phase- locked-loop
- Example 31 The device of one of examples 26 to 30, where transmitting the first packet with the first quality includes transmitting the first packet with a first signal-to-noise ratio (SNR) value, and where transmitting the second packet with the second quality includes transmitting the second packet with a second SNR value that is lower than the first SNR value.
- SNR signal-to-noise ratio
- Example 32 The device of one of examples 26 to 31, where the processor is further configured to identify a level of degradation, and where the second quality is based on the level of degradation.
- Example 33 A device, including: a transceiver; and a processor configured to: identify' a level of degradation; identify a reference signal based on the level of degradation; receive a first signal; perform a comparison between the first signal and the reference signal to produce a comparison result; and determine whether the first signal is authentic or not authentic based on the comparison result.
- Example 34 The device of example 33, where to determine that the received first signal is not authentic, the processor is configured to determine that the received first signal deviates from the reference signal by more than a predetermined threshold.
- Example 35 The device of one of examples 33 or 34. where: to perform the comparison between the received first signal and the reference signal, the processor is configured to perform a correlation between the received first signal and the reference signal to generate a correlation result, where the comparison result includes the correlation result; and to determine whether the received first signal is authentic or not authentic, the processor is configured to: determine that the received first signal is authentic when the correlation result is above a predetermined threshold; and determining that the received first signal is not authentic when the correlation result is below the predetermined threshold.
- Example 36 The device of one of examples 33 to 35. where the processor is further configured to, in response to determining that the first signal is not authentic, refuse to take an action indicated or triggered by the first signal.
- Example 37 The device of one of examples 33 to 36, where the processor is further configured to determine a distance based on the first signal.
- Example 38 The device of one of examples 33 to 37. where, in response to determining that the distance is below a predetermined distance, and that the received first signal is authentic, the processor is configured to unlock a vehicle.
- Example 39 The device of one of examples 33 to 38, where the predetermined distance is three meters.
- Example 40 The device of one of examples 33 to 39, where the level of degradation corresponds to a predetermined signal-to-noise ratio (SNR) value or a predetermined bit error rate (BER).
- SNR signal-to-noise ratio
- BER bit error rate
- Example 41 The device of one of examples 33 to 40, where the device is a vehicle or an electronic access control device.
- Example 42 A method including: transmitting, by a first device, an authentication packet during an authentication phase with a first phase noise value; and transmitting, by the first device, a data packet during a communication phase with a second phase noise value that is lower than the first phase noise value.
- Example 43 The method of example 42, further including: receiving, by a second device, the authentication packet; determining a distance between the first and second devices based on the authentication packet; and unlocking a vehicle based on the determined distance.
- Example 44 The method of one of examples 42 or 43, where determining the distance includes determining the distance based on a phase of a symbol of the authentication packet.
- Example 45 The method of one of examples 42 to 44, further including: receiving, by a second device, the authentication packet: detecting an attack based on a distortion of the received authentication packet; and refusing to take an action based on detecting the attack.
- Example 46 The method of one of examples 42 to 45, further including: receiving, by a second device, the authentication packet; detecting an attack based on a bit error rate (BER) of the received authentication packet; and refusing to take an action based on detecting the attack.
- BER bit error rate
- Example 47 The method of one of examples 42 to 46, further including: receiving, by a second device, the authentication packet; detecting an attack based on a change in phase trajectory during reception of the authentication packet; and refusing to take an action based on detecting the atack.
- Example 48 The method of one of examples 42 to 47, where transmiting the authentication packet with the first phase noise value includes transmiting the authentication packet with a phase-locked-loop (PLL) of the first device having a first bandwidth, and where transmiting the data packet with the second phase noise value includes transmiting the data packet with the PLL of the first device having a second bandwidth lower than the first bandwidth.
- PLL phase-locked-loop
- Example 49 The method of one of examples 42 to 48, where transmiting the authentication packet includes transmiting the authentication packet using Bluetooth.
- Example 50 The method of one of examples 42 to 49. where transmiting the authentication packet using Bluetooth includes transmiting the authentication packet using Bluetooth Low Energy (BLE).
- BLE Bluetooth Low Energy
- Example 51 The method of one of examples 42 to 50, where the first phase noise value corresponds to a signal-to-noise ratio (SNR) of a second device between a first predetermined SNR threshold value and a second predetermined SNR threshold value.
- SNR signal-to-noise ratio
- Example 52 The method of one of examples 42 to 51, where the first device is a key fob, or smartphone.
- Example 53 A method including: transmitting, by a first device, an authentication packet during an authentication phase, where: during a first portion of the authentication phase, the authentication packet is transmitted with a first phase noise value; and during a second portion of the authentication phase, the authentication packet is transmitted with a second phase noise value that is different from the first phase noise value.
- Example 54 A wireless device including: a phase-locked-loop (PLL) having a filter with dynamic bandwidth; and a transmitter circuit configured to: transmit an authentication packet using the filter with a first bandw idth, and transmit a data packet using the filter with a second bandwidth lower than the first bandwidth.
- PLL phase-locked-loop
- Example 55 A method including: transmitting, by a first device, an authentication packet with a first signal-to-noise ratio (SNR) value during an authentication phase; and transmitting, by the first device, a data packet with a second SNR value during a communication phase, where the second SNR value is higher than the first SNR value.
- SNR signal-to-noise ratio
- Example 56 The method of example 55. further including: receiving, by a second device, the authentication packet; determining a distance between the first and second devices based on the authentication packet; and unlocking a vehicle based on the determined distance.
- Example 57 The method of one of examples 55 or 56, where determining the distance includes determining the distance based on a phase of a symbol of the authentication packet.
- Example 58 The method of one of examples 55 to 57, further including: receiving, by a second device, the authentication packet; detecting an attack based on a distortion of the received authentication packet; and refusing to take an action based on detecting the attack.
- Example 59 The method of one of examples 55 to 58, further including: receiving, by a second device, the authentication packet; detecting an attack based on a bit error rate (BER) of the received authentication packet; and refusing to take an action based on detecting the attack.
- BER bit error rate
- Example 60 The method of one of examples 55 to 59, further including: receiving, by a second device, the authentication packet: detecting an attack based on a change in phase during reception of the authentication packet; and refusing to take an action based on detecting the attack.
- Example 61 The method of one of examples 55 to 60. where transmitting the authentication packet with the first SNR value includes transmitting the authentication packet with a phase-locked-loop (PLL) of the first device having a first bandwidth, and where transmitting the data packet with the second SNR value includes transmitting the data packet with the PLL of the first device having a second bandwidth lower than the first bandwidth.
- PLL phase-locked-loop
- Example 62 The method of one of examples 55 to 61. where transmitting the authentication packet includes transmitting the authentication packet using Bluetooth.
- Example 63 The method of one of examples 55 to 62, where transmitting the authentication packet includes transmitting the authentication packet using Bluetooth Low Energy (BLE).
- BLE Bluetooth Low Energy
- Example 64 The method of one of examples 55 to 63, where the first SNR value is between a first predetermined SNR threshold value and a second predetermined SNR threshold value.
- Example 65 The method of one of examples 55 to 64. where the first device is a key fob, or a smartphone.
- Example 66 A method, including: transmitting, by a first device, an authentication packet during an authentication phase, where: during a first portion of the authentication phase, the authentication packet is transmitted with a first signal-to-noise ratio (SNR) value; and during a second portion of the authentication phase, the authentication packet is transmitted with a second SNR value that is different from the first SNR value.
- SNR signal-to-noise ratio
- Example 67 A method, including: identifying, by a first device, a level of degradation based on a predetermined set of levels of degradation; transmitting, by the first device during a first communication phase, a first signal with a first signal qualify based on the identified level of degradation; and transmitting, by the first device during a second communication phase, a second signal with a second signal qualify corresponding to another level of degradation of the predetermined set, where the second signal qualify 7 is greater than the first signal qualify 7 .
- Example 68 The method of example 67. where the predetermined set of levels of degradation includes: a first level of degradation corresponding to a signal-to-noise ratio (SNR) of 18 dB; a second level of degradation corresponding to an SNR of 20 dB; a third level of degradation corresponding to an SNR of 22 dB; a fourth level of degradation corresponding to an SNR of 24 dB; a fifth level of degradation corresponding to an SNR of 26 dB; a sixth level of degradation corresponding to an SNR of 28 dB; and a seventh level of degradation corresponding to an SNR of 30 dB.
- SNR signal-to-noise ratio
- Example 69 The method of one of examples 67 or 68, where the first signal quality corresponds to a signal-to-noise ratio (SNR) of 24 dB.
- SNR signal-to-noise ratio
- Example 70 The method of one of examples 67 to 68, where the second signal quality corresponds to a signal-to-noise ratio (SNR) of 24 dB.
- SNR signal-to-noise ratio
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202480027307.2A CN121080013A (en) | 2023-05-08 | 2024-05-01 | Early submission, late detection, attack prevention |
| KR1020257037190A KR20260005914A (en) | 2023-05-08 | 2024-05-01 | Preventing early commit and late detection attacks |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202363500748P | 2023-05-08 | 2023-05-08 | |
| US63/500,748 | 2023-05-08 | ||
| US202363520510P | 2023-08-18 | 2023-08-18 | |
| US63/520,510 | 2023-08-18 | ||
| US18/544,089 | 2023-12-18 | ||
| US18/544,089 US20240378930A1 (en) | 2023-05-08 | 2023-12-18 | Early commit late detect attack prevention |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024233221A1 true WO2024233221A1 (en) | 2024-11-14 |
Family
ID=91274652
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2024/027225 Pending WO2024233221A1 (en) | 2023-05-08 | 2024-05-01 | Early commit late detect attack prevention |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2024233221A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160234684A1 (en) * | 2015-02-06 | 2016-08-11 | Nxp B.V. | Communications with distance authentication |
| WO2018186950A1 (en) * | 2017-04-07 | 2018-10-11 | Qualcomm Incorporated | Secure range determination protocol |
| US20200114875A1 (en) * | 2018-10-12 | 2020-04-16 | Denso International America, Inc. | Passive entry/passive start access systems including round trip time sniffing |
| US20210099884A1 (en) * | 2019-09-27 | 2021-04-01 | Apple Inc. | Signal validation for secure ranging |
| US20220379845A1 (en) * | 2018-10-12 | 2022-12-01 | Denso International America, Inc. | Up-sampling and cross-correlation for time of arrival determinations in passive entry/passive start systems |
-
2024
- 2024-05-01 WO PCT/US2024/027225 patent/WO2024233221A1/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160234684A1 (en) * | 2015-02-06 | 2016-08-11 | Nxp B.V. | Communications with distance authentication |
| WO2018186950A1 (en) * | 2017-04-07 | 2018-10-11 | Qualcomm Incorporated | Secure range determination protocol |
| US20200114875A1 (en) * | 2018-10-12 | 2020-04-16 | Denso International America, Inc. | Passive entry/passive start access systems including round trip time sniffing |
| US20220379845A1 (en) * | 2018-10-12 | 2022-12-01 | Denso International America, Inc. | Up-sampling and cross-correlation for time of arrival determinations in passive entry/passive start systems |
| US20210099884A1 (en) * | 2019-09-27 | 2021-04-01 | Apple Inc. | Signal validation for secure ranging |
Non-Patent Citations (2)
| Title |
|---|
| ARSLAN HÜSEYIN ET AL: "Physical Layer Security for Wireless Sensing and Communication", IET SECURITY SERIES, 31 December 2022 (2022-12-31), pages 1 - 359, XP093179568, Retrieved from the Internet <URL:https://digital-library.theiet.org/content/books/sc/pbse018e;jsessionid=30pawjjuj5igh.x-iet-live-01> [retrieved on 20240730] * |
| OMAR CHOUDARY ET AL: "Make Noise and Whisper: A Solution to Relay Attacks", 28 March 2011, SAT 2015 18TH INTERNATIONAL CONFERENCE, AUSTIN, TX, USA, SEPTEMBER 24-27, 2015; [LECTURE NOTES IN COMPUTER SCIENCE; LECT.NOTES COMPUTER], SPRINGER, BERLIN, HEIDELBERG, PAGE(S) 271 - 283, ISBN: 978-3-540-74549-5, XP019171638 * |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8320439B2 (en) | Methods and apparatus for adaptive link partner transmitter equalization | |
| CN114223179B (en) | Secure ultra-wideband ranging | |
| KR20110091041A (en) | Authentication for secure wireless communication | |
| Poturalski et al. | Distance bounding with IEEE 802.15. 4a: Attacks and countermeasures | |
| CN109600222B (en) | Key generation method based on channel characteristics | |
| JP2014158252A (en) | Pattern-based loss-of-signal detector | |
| US11489680B2 (en) | Method, device and system for secure distance measurement | |
| Giustiniano et al. | Detection of reactive jamming in DSSS-based wireless networks | |
| CN109511116A (en) | Consider the safety detecting method of the physical layer Verification System of hostile end computing capability | |
| TWI493888B (en) | Extension of ethernet phy to channels with bridged tap wires | |
| CN102710563A (en) | Frequency offset estimation method and signal transceiver | |
| US12375915B2 (en) | Authentication method and device, and related products | |
| US20220302942A1 (en) | System and method for continuous sampler calibration | |
| Subramani et al. | ACE: Adaptive channel estimation for detecting analog/RF trojans in WLAN transceivers | |
| KR100339661B1 (en) | Apparatus for compensating channel distortion in bluetooth system | |
| US8787844B2 (en) | Signal transceiving method, signal transceiver utilizing the signal transceiving method, network connection method and network device utilizing the network connection method | |
| US20240378930A1 (en) | Early commit late detect attack prevention | |
| WO2024233221A1 (en) | Early commit late detect attack prevention | |
| CN106998243A (en) | The delay auto-correlation frame arrival detection method aided in based on matched filtering | |
| CN113271119B (en) | Anti-interference cooperative frequency hopping method based on transmission scheduling | |
| US11821978B2 (en) | Secure ranging | |
| US20250016566A1 (en) | Early commit late detect attack detection | |
| US12363538B2 (en) | Frame synch detection with intrusion detection | |
| WO2023100488A1 (en) | Wireless apparatus and method for controlling wireless apparatus | |
| WO2024012170A1 (en) | Psfch signal detection method and device, storage medium, and electronic device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24728803 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2024728803 Country of ref document: EP Effective date: 20251208 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2024728803 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2024728803 Country of ref document: EP Effective date: 20251208 |