Re: [6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt
Hi Yatch, Thanks for your comments! The attack as such abstracts away from the specific approach that the adversary adopts to previously acquire node addresses. This can possibly rely, for example, on traffic analysis to correlate with physical position and observable events/outcomes triggered by (legitimate) traffic. In the context of the Minimal Security Framework, the usage of short addresses described at [1] can surely complicate this task, by stripping away information useful to build such correlation (e.g. vendor-related). Given the ability to track a victim through its address in use, the attack enables the adversary to always discover the full victim's schedule and to severely jam all its communications, in a stealthy and (energy-)efficient way. Best, /Marco [1] https://tools.ietf.org/html/draft-ietf-6tisch-minimal-security-09#section-10 On 3/21/19 5:29 PM, Yasuyuki Tanaka wrote: > Hi Marco, > > I'd like to ask you to help me understand the attack (>_<) > > https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01#section-3.2 > > > 3.2. Attack Example > > > > (snip) > > > > 2. The adversary picks a channel 'f*' at random, and monitors it > for > > N_C consecutive slotframes to determine the timeslots in which > > the victim node communicates on that channel. Due to the usage > > property, the number of such timeslots is equal to the number of > > cells assigned to the victim node. > > How does the adversary identify communication of the victim? It > assumes the adversary knows the EUI-64 address of the victim in > advance, or the adversary randomly picks out a victim node? > > If the adversary attacks based on a target EUI-64 address, it seems > using EUI-16 (short) address which can be assigned through the join > process could mitigate the attack. > > > https://tools.ietf.org/html/draft-ietf-6tisch-minimal-security-09#section-10 > > > I'm wondering how severe the attack is... > > Best, > Yatch > > On 12/17/2018 12:38 PM, Marco Tiloca wrote: >> Hi all, >> >> We have just submitted a new version of our draft describing how to >> alter the communication pattern of network nodes to counteract >> selective jamming. >> >> https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 >> >> This update especially addresses the comments from IETF 103, by >> clarifying the attack importance and the adversary model. Also, the >> draft is now aligned with the CoJP Join Response from the latest >> minimal security framework. >> >> Comments are welcome! >> >> Thanks, >> /Marco >> >> >> Forwarded Message >> Subject: New Version Notification for >> draft-tiloca-6tisch-robust-scheduling-01.txt >> Date: Mon, 17 Dec 2018 03:27:31 -0800 >> From: internet-dra...@ietf.org >> To: Marco Tiloca , Gianluca Dini >> , Simon Duquennoy >> >> >> >> >> >> A new version of I-D, draft-tiloca-6tisch-robust-scheduling-01.txt >> has been successfully submitted by Marco Tiloca and posted to the >> IETF repository. >> >> Name: draft-tiloca-6tisch-robust-scheduling >> Revision: 01 >> Title: Robust Scheduling against Selective Jamming in 6TiSCH Networks >> Document date: 2018-12-17 >> Group: Individual Submission >> Pages: 15 >> URL: >> https://www.ietf.org/internet-drafts/draft-tiloca-6tisch-robust-scheduling-01.txt >> Status: >> https://datatracker.ietf.org/doc/draft-tiloca-6tisch-robust-scheduling/ >> Htmlized: >> https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 >> Htmlized: >> https://datatracker.ietf.org/doc/html/draft-tiloca-6tisch-robust-scheduling >> Diff: >> https://www.ietf.org/rfcdiff?url2=draft-tiloca-6tisch-robust-scheduling-01 >> >> Abstract: >> This document defines a method to generate robust TSCH schedules in a >> 6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4-2015) network, so as >> to protect network nodes against selective jamming attack. Network >> nodes independently compute the new schedule at each slotframe, by >> altering the one originally available from 6top or alternative >> protocols, while preserving a consistent and collision-free >> communication pattern. This method can be added on top of the >> minimal security framework for 6TiSCH. >> >> >> >> Please note that it may take a couple of minutes from the time of >> submission >> until the htmlized version and diff are available at tools.ietf.org. >> >> The IETF Secretariat >> >> >> ___ >> 6tisch mailing list >> 6tisch@ietf.org >> https://www.ietf.org/mailman/listinfo/6tisch >> -- Marco Tiloca Ph.D., Senior Researcher RISE Research Institutes of Sweden Division ICT Isafjordsgatan 22 / Kistagången 16 SE-164 40 Kista (Sweden) Phone: +46 (0)70 60 46 501 https://www.ri.se signature.asc Description: OpenPGP digital signature ___ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch
Re: [6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt
Hi Marco, I'd like to ask you to help me understand the attack (>_<) https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01#section-3.2 > 3.2. Attack Example > > (snip) > >2. The adversary picks a channel 'f*' at random, and monitors it for >N_C consecutive slotframes to determine the timeslots in which >the victim node communicates on that channel. Due to the usage >property, the number of such timeslots is equal to the number of >cells assigned to the victim node. How does the adversary identify communication of the victim? It assumes the adversary knows the EUI-64 address of the victim in advance, or the adversary randomly picks out a victim node? If the adversary attacks based on a target EUI-64 address, it seems using EUI-16 (short) address which can be assigned through the join process could mitigate the attack. https://tools.ietf.org/html/draft-ietf-6tisch-minimal-security-09#section-10 I'm wondering how severe the attack is... Best, Yatch On 12/17/2018 12:38 PM, Marco Tiloca wrote: Hi all, We have just submitted a new version of our draft describing how to alter the communication pattern of network nodes to counteract selective jamming. https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 This update especially addresses the comments from IETF 103, by clarifying the attack importance and the adversary model. Also, the draft is now aligned with the CoJP Join Response from the latest minimal security framework. Comments are welcome! Thanks, /Marco Forwarded Message Subject: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt Date: Mon, 17 Dec 2018 03:27:31 -0800 From: internet-dra...@ietf.org To: Marco Tiloca , Gianluca Dini , Simon Duquennoy A new version of I-D, draft-tiloca-6tisch-robust-scheduling-01.txt has been successfully submitted by Marco Tiloca and posted to the IETF repository. Name: draft-tiloca-6tisch-robust-scheduling Revision: 01 Title: Robust Scheduling against Selective Jamming in 6TiSCH Networks Document date: 2018-12-17 Group: Individual Submission Pages: 15 URL: https://www.ietf.org/internet-drafts/draft-tiloca-6tisch-robust-scheduling-01.txt Status: https://datatracker.ietf.org/doc/draft-tiloca-6tisch-robust-scheduling/ Htmlized: https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 Htmlized: https://datatracker.ietf.org/doc/html/draft-tiloca-6tisch-robust-scheduling Diff: https://www.ietf.org/rfcdiff?url2=draft-tiloca-6tisch-robust-scheduling-01 Abstract: This document defines a method to generate robust TSCH schedules in a 6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4-2015) network, so as to protect network nodes against selective jamming attack. Network nodes independently compute the new schedule at each slotframe, by altering the one originally available from 6top or alternative protocols, while preserving a consistent and collision-free communication pattern. This method can be added on top of the minimal security framework for 6TiSCH. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat ___ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch ___ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch
[6tisch] Fwd: New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt
Hi all, We have just submitted a new version of our draft describing how to alter the communication pattern of network nodes to counteract selective jamming. https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 This update especially addresses the comments from IETF 103, by clarifying the attack importance and the adversary model. Also, the draft is now aligned with the CoJP Join Response from the latest minimal security framework. Comments are welcome! Thanks, /Marco Forwarded Message Subject:New Version Notification for draft-tiloca-6tisch-robust-scheduling-01.txt Date: Mon, 17 Dec 2018 03:27:31 -0800 From: internet-dra...@ietf.org To: Marco Tiloca , Gianluca Dini , Simon Duquennoy A new version of I-D, draft-tiloca-6tisch-robust-scheduling-01.txt has been successfully submitted by Marco Tiloca and posted to the IETF repository. Name: draft-tiloca-6tisch-robust-scheduling Revision: 01 Title: Robust Scheduling against Selective Jamming in 6TiSCH Networks Document date: 2018-12-17 Group: Individual Submission Pages: 15 URL: https://www.ietf.org/internet-drafts/draft-tiloca-6tisch-robust-scheduling-01.txt Status: https://datatracker.ietf.org/doc/draft-tiloca-6tisch-robust-scheduling/ Htmlized: https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-01 Htmlized: https://datatracker.ietf.org/doc/html/draft-tiloca-6tisch-robust-scheduling Diff: https://www.ietf.org/rfcdiff?url2=draft-tiloca-6tisch-robust-scheduling-01 Abstract: This document defines a method to generate robust TSCH schedules in a 6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4-2015) network, so as to protect network nodes against selective jamming attack. Network nodes independently compute the new schedule at each slotframe, by altering the one originally available from 6top or alternative protocols, while preserving a consistent and collision-free communication pattern. This method can be added on top of the minimal security framework for 6TiSCH. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat signature.asc Description: OpenPGP digital signature ___ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch