Auto-fryingPANAuto-fryingPAN : 무선 개인 영역 네트워크의 개인화된 프로토콜의 분석론과 자동화 방식

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 479
  • Download : 0
A spoofing attack for a wireless communication system is the most common attack method for unauthorized access and control. IEEE 802.15.4 is a standard that defines only physical and medium access control layers for low rate, low power, and low cost wireless systems. This standard is widely used as lower layers for not only several wireless communication standards but also customized protocols by manufacturers. However, security has not been considered seriously in customized protocols because of implementation convenience, scalability in deploying, and cost. Their security only relies on confidentiality of customized protocol. This thesis develops methods for manual as well as automatic analysis of these customized protocols. Before developing automatic analysis methodology, we chose three real world targets for manual analysis first: smart plug, center-controlled door lock, and platform screen door system. We then manually analyzed custom protocols on those systems. Spoofing attack based on these results against two targets except platform screen door system were successful. For the last target, we chose not to run the experiment due to significant safety reasons. Analyzed results are converted to generic analysis methodology against customized wireless protocols and typical security vulnerabilities. From generic analysis methodology and vulnerabilities, I implemented prototype of Auto-FryingPAN, an automated custom protocol reverse engineering tool. Auto-FryingPAN automates two main phases of suggested manual analysis methodology. First of all, it groups packets following key information from header. For each packet group, the tool evaluates MAC address field similarity, byte column entropy, byte column range, and CRC possibility. Finally, it combines calculated results and makes final reports for every different message format. By comparing manual analysis, we conclude that Auto-FryingPAN can be extended to a fine-grained automatic protocol reverse-engineering tool or automatic spoofing packet generator.
Advisors
Kim, Yongdaeresearcher김용대researcher
Description
한국과학기술원 :전기및전자공학부,
Publisher
한국과학기술원
Issue Date
2016
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2016.2 ,[v, 42 p. :]

Keywords

wireless security; Wireless Personal Area Network (WPAN); protocol reverse engineering; Automatic protocol analysis; IEEE 802.15.4; Custom protocol; 무선 보안; 무선 개인 영역 네트워크; 프로토콜 역공학; 프로토콜 자동화 분석; 개인화 프로토콜

URI
http://hdl.handle.net/10203/221678
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=649645&flag=dissertation
Appears in Collection
EE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0