Introduction
Ultra-wideband (UWB) communication enables precise distance measurement between two devices by leveraging a short-duration pulse (ranging from 1 to 2 ns). This short-duration pulse provides a highly accurate Time-of-Arrival (ToA) measurement that is used to compute Time of Flight (ToF) [1], [2] or Time Difference of Arrival (TDoA) [3], which in turn enable centimeter-level distance measurement or localization. Because of its precise distance measurement capability, UWB communication is being recognized as a promising technology for preventing signal-relaying attacks in proximity-based verification systems, such as NFC-based payment systems [4], [5], [6] and passive keyless entry and start (PKES) systems [7].
The IEEE standard for UWB communication defines two operational modes that define the number of transmitted pulses and modulation schemes: 1) low-rate pulse repetition frequency (LRP) and 2) high-rate pulse repetition frequency (HRP) [8], [9]. In recent years, smartphone manufacturers have incorporated UWB communication into their devices based on the HRP mode. For example, Samsung and Apple have introduced UWB-enabled applications in their products. Furthermore, the car connectivity consortium (CCC) introduced Digital Key technology to replace traditional key fobs in PKES with UWB-enabled smartphones [10].
To precisely measure ToA, a UWB device conducts a cross-correlation operation between a received signal with its expected signal template (i.e., local template). In the HRP mode, a UWB frame includes a scrambled timestamp sequence (STS) field designed for secure ToA measurement. Prior to distance measurement, the initiator and responder share a symmetric key via another communication channel (e.g., Bluetooth). Using this symmetric key, they generate identical pseudo-random numbers using the advanced encryption standard (AES) algorithm. The initiator then transmits a UWB frame that contains the STS field filled with a pseudo-random number to the responder. Upon receiving the UWB frame, the responder utilizes cross-correlation to determine the ToA of the UWB frame. When identical pseudo-random numbers are given to the initiator and the responder, a distinct peak should be observable in the cross-correlation. Thus, the ToA is determined based on the position of this distinct peak.
It is crucial to note that the cross-correlation method does not allow for individual bit-wise comparisons between two values. Consequently, even if the STS field contains an incorrect pseudo-random number, the responder can still identify a peak in the cross-correlation. Furthermore, the magnitude of this peak, which signifies the level of similarity, could exceed a certain threshold. This implies that the ToA can be manipulated and reduced without requiring knowledge of a valid symmetric key, by simply overshadowing the STS field with invalid random pulses. Accordingly, the distance derived from the manipulated ToA measurement can also be reduced intentionally. Singh et al. [11] highlighted the fundamental vulnerability of the cross-correlation method in a ToA measurement, emphasizing the tradeoff between security and ranging accuracy. Notably, Leu et al. [12] successfully demonstrated manipulation of distance measurements in the HRP UWB system employed by off-the-shelf devices. By injecting strong pulses that overshadowed and replaced the legitimate STS field with an invalid value, the attacker could elicit a peak in the cross-correlation at an earlier position, compared to the correlation between identical bit sequences. By doing so, the attacker can deceive a victim device into measuring a manipulated ToA.
For a secure ToA measurement, Leu et al. [13] introduced the message time of arrival code (MTAC) framework as a means of achieving a secure ToA measurement. The hidden encoding scheme [11] and residual analysis [13] applied to physical-layer pulses are examples of the MTAC framework. However, these existing methods are limited to the LRP mode and cannot be directly employed in the HRP mode. The identification of individual pulses, which is necessary for these methods, becomes challenging in the HRP mode due to the lower power of individual pulses. Therefore, the existing methods are not applicable in the HRP mode. To address this security concern in the HRP mode, the IEEE 802.15.4z task group has introduced the concept of consistency checks using multiple segments within the STS field to achieve a secure ToA measurement. However, there is currently no concrete method proposed for to implement the result [14]. Although implementation of this concept is expected to enable a secure and accurate ToA measurement, most commercial off-the-shelf (COTS) devices, including those conforming to the Digital Key standard, utilize a single segment containing a 4096-bit pseudo-random number [12]. This choice is primarily motivated by backward compatibility requirements with legacy UWB frames that do not employ the STS field [9]. Additionally, the use of a single segment helps mitigate potential interference with other communication systems, such as WiFi 6E. Increasing the number of segments would extend the transmission duration of the STS field, thereby increasing the likelihood of interference with other communications [15].
Potentially, it would be possible to divide an STS field of a single segment into multiple subfields and cross-correlate it with corresponding subtemplates. This approach allows the receiver to verify the consistency between multiple cross-correlation results. However, to compute the multiple cross-correlations, it is required to modify current HRP UWB chipsets [16]. In addition, one of the most notable countermeasures against physical-layer attack is a radio frequency (RF) fingerprinting techniques [17], [18], [19], [20], [21], [22] which exploits hardware imperfection of an RF device caused by manufacturing. An attacker in the HRP UWB ranging system, however, does not manipulate a preamble region where hardware imperfection features, such as a carrier frequency offset (CFO) or sampling clock offset, are extracted. Furthermore, those approaches are prone to feature variation caused by environmental changes, such as temperature and device aging.
In this article, we present UWB with channel analysis (UWB-CA), a novel approach for achieving a secure ToA measurement in the HRP UWB ranging system. UWB-CA analyzes the channel impulse response (CIR) distribution at the receiver, and by analyzing the channel characteristics from the CIR, UWB-CA can effectively differentiate between a signal overshadowing attack and a legitimate channel with only a software implementation. Detailed contributions are listed as follows.
We propose the UWB-CA that detects a practical distance reduction attack on the current HRP UWB ranging system. UWB-CA can be directly implemented on COTS devices with software implementation. Compared to the concept of employing multiple segments, which was discussed in the IEEE 802.15.4z task group [9], [14], UWB-CA does not require multiple segments to be employed in STS fields, which allows compatibility with COTS devices.
We comprehensively evaluate UWB-CA in two steps. First, we conduct simulations considering a total of 16 different channel conditions between a victim and an attacker through the simulation. Especially, considering the Digital Key service that is a UWB-enabled application, we show that UWB-CA has an average attack detection rate of 98.34% under a Line-of-Sight (LoS) outdoor environment.
In addition to the simulation-based evaluation, we collect real-world data using COTS devices to evaluate attack detection performance. We implement a current state-of-the-art attack (i.e., ghost peak attack) and collect actual CIRs from an indoor office, underground parking lot, and outdoor parking lot. Employing the actual CIRs, we show that UWB-CA can detect a ghost peak attack with an average 99.61% attack detection rate.
We measure computational overhead and energy consumption caused by the operations of UWB-CA. On the Nordic nRF52840-DK board with a DWM3000 module, we show that it takes an additional 3 ms to verify the incoming STS field and induces 1.72% of additional power consumption. When it comes to a ranging cycle and its hardware specifications of the COTS HRP UWB devices, this computational overhead and energy consumption is reasonably acceptable.
Related Works
A. UWB Security
1) Distance Reduction Attacks:
Poturalski et al. [23] introduced the first systematic attack against UWB ranging systems (the so-called cicada attack). The attacker transmits attack pulses with a constant amplitude to overshadow the preamble or start of frame delimiter (SFD) field to reduce the ToA measurement. The coded cicada attack [24] is an enhanced version of a cicada attack, in which the attacker varies the amplitudes of the attack pulses. Both attacks showed that the algorithm used for leading edge detection in UWB systems can be exploited as an attack surface to reduce ToA measurements. Building upon the cicada attack, Singh et al. [25] introduced a new variant called cicada attack++, which manipulated the STS field to reduce ToA measurements, and investigated the tradeoff between security and ranging precision. This research shed light on the fundamental challenges in achieving both secure and accurate distance measurements in UWB systems. Furthermore, Leu et al. [12] demonstrated a practical distance reduction attack against commercial HRP UWB devices (the so-called ghost peak attack). They showed that an attacker can decrease the distance measurement by up to 8 m when a legitimate device is located 10 m away. The ghost peak attack highlights the vulnerability of UWB devices to distance manipulation attacks. More recently, Anliker et al. [26] introduced a new type of physical-layer attack that exploits clock imperfections in transceivers, which are used to manipulate distance measurements in the IEEE 802.15.4z and upcoming IEEE 802.15.4ab standards. This attack leverages the manipulation of the CFO and sampling frequency offset (SFO) measurements in the physical layer.
2) Countermeasures:
Several countermeasures have been proposed to ensure the integrity of ToA measurements in UWB ranging systems. One effective approach is the utilization of a power-independent detection (PID) filter, which performs binary or ternary quantization based on a predefined threshold [24]. However, it is important to note that the feasibility of a PID filter relies on the receiver’s ability to detect individual pulses in the preamble, specifically in the LRP mode. In addition, the early data detection (EDD) technique reduces the data detection window, which has a tradeoff relationship between communication performance and security [24]. A variance-based countermeasure also has been proposed. This detects attacks by analyzing the variance of ToA measurements [24]. Inspired by message authentication codes (MACs), researchers have also introduced MTACs aimed at preserving the integrity of ToA measurements in UWB ranging systems [13]. MTACs incorporate cryptographic checks to ensure modulation at the receiver is consistent. The MTAC comprises a code-generation algorithm (Mtac) that calculates a real-valued MTAC (c) and a verification algorithm (Vrfy) that confirms the received MTAC (c’). The authors denote the STS as MTAC based on a correlation sequence. It is worth noting that MTACs, except for the STS, rely on the receiver’s ability to detect and recover individual pulses, which is well suited for the LRP mode.
B. Distance Bounding Protocols
Distance-bounding protocols belong to a category of protocols that cope with attacks against distance-based authentication systems. The concept of utilizing distance-bounding protocols to mitigate relay attacks, also known as mafia fraud, was first introduced by Brands and Chaum [27]. The idea has since evolved in the past decades [28], [29], [30], [31], [32], [33], [34]. The underlying principle of the protocols involves measuring the duration between the transmission of challenge bits by the verifier (V) and the receipt of response bits from the prover (P). The verifier can determine an upper bound on a physical distance, computing the ratio between the round trip delay time and the speed of light. In the context of an attacker involved in mafia fraud, any action taken to relay or transmit messages will inevitably increase the ToF between the prover and verifier. UWB communication emerged as a prominent technology that effectively implements distance-bounding protocols. The LRP mode in particular can detect individual pulses and is an affordable solution to implement a distance-bounding protocol [11]. We refer readers to [35] for a comprehensive analysis of the evolution and security of the distance-bounding protocol.
Background
A. IEEE 802.15.4
The IEEE 802.15.4 task group sequentially released standards for UWB communication as IEEE 802.15.4a [36], 802.15.4f [37], and 802.15.4z [9]. The standards establish the channel bandwidth of 500 MHz within the frequency range of approximately 3–10 GHz for UWB communication. The latest standard, IEEE 802.15.4z [9] introduces the LRP mode and the HRP mode, employing distinct pulse repetition frequencies (PRFs) and modulation schemes. Due to its wide channel bandwidth, the maximum transmitted energy of UWB communication is strictly regulated as -41.3 dBm MHz to mitigate potential interference from concurrent radio communications [9]. The LRP mode utilizes a smaller number of high-power pulses; individual pulses can be easily detected/decoded by receivers, which allows cost-effective implementation. Conversely, the HRP mode employs a large number of low-power pulses, supporting higher data rates. However, due to its low-power individual pulses, multiple pulses must be aggregated to ensure a certain energy level to decode information without error.
An HRP UWB frame comprises several fields, including the preamble, SFD, physical-layer header, and data payload. Each employs distinct modulation schemes to represent physical-layer symbols. Specifically, the physical-layer header and data payload fields leverage a burst position modulation and binary phase-shift keying (BPM-BPSK), the combination of pulse position, and pulse polarity. On the other hand, the STS field employs a binary phase-shift keying (BPSK) modulation, representing “1” and “0” bits as positive and negative polarity pulses, respectively. The STS field incorporates a pseudo-random number derived from a random number generator based on AES-128, as illustrated in Fig. 1. An STS key is securely exchanged between the initiator and responder via alternative communication interfaces (e.g., Bluetooth) and employed as an input to the AES-128 algorithm together with STS data that consists of a 96-bit constant value and a 32-bit counter. This process is repeated 32 times, resulting in the generation of a 4096-bit pseudo-random number. The IEEE standard allows a frame to incorporate multiple STS segments (i.e., long STS field) to enhance the security and processing gain of the ranging system. However, when a transceiver is configured to employ multiple segments, it is not compatible with a legacy UWB frame that does not contain the STS field due to its different configuration parameters. As a result, the COTS devices employ a single segment to provide backward compatibility with the legacy UWB frame.
B. Two-Way Ranging
In the IEEE 802.15.4z standard, HRP UWB ranging incorporates three distinct methods: 1) single-sided two-way ranging (SS-TWR); 2) double-sided two-way ranging (DS-TWR); and 3) TDoA. In this article, we focus specifically on SS-TWR and DS-TWR, which enable distance measurement between two nodes without requiring time synchronization. In both SS-TWR and DS-TWR, the distance estimation is derived by determining the ToF, denoted as \begin{equation*} \widehat {d} = c{\cdot }\widehat {T}_{\text {prop}}= \frac {c}{2}\left ({{T_{\text {round}} - T_{\text {reply}}}}\right). \tag {1}\end{equation*}
\begin{equation*} \widehat {d} = c{\cdot }\widehat {T}_{\text {prop}}= \frac {c}{4}\left ({{T_{\text {round1}} + T_{\text {round2}} - T_{\text {reply1}} - T_{\text {reply2}}}}\right) \tag {2}\end{equation*}
1) ToA Measurement:
The ToA indicates the exact moment when a receiver captures a UWB frame. In general, the receiver cross-correlates the received signal with its local template, which contains the identical sequence as the transmitted one. This cross-correlation operation allows the receiver to estimate wireless channel conditions, with the output often referred to as the CIR. Before the IEEE 802.15.4z standard, ToA was determined upon the reception of the SFD field. However, because the SFD field contains a public value, an attacker can easily predict the remaining structure by only observing partial structure. Specifically, the attacker can transmit a valid SFD field earlier than the legitimate SFD field to reduce the ToA measurement (i.e., early detect and late commit (ED/LC) attack) [38]. To enhance the security of the ToA measurement, the standard introduces the STS field that contains unpredictable binary information. In the rest of this article, we consider a receiver that employs the STS field as the designated field for a ToA measurement. In HRP mode, the receiver computes the cross-correlation between the received STS field and its local template as expressed by the following equation [39]:\begin{equation*} \text { CIR}\left [{{\tau }}\right ] = \left ({{{g}_{\text {loc}}\star s}}\right)\left [{{\tau }}\right ] = \sum _{n=0}^{|{g}_{\text {loc}}|-1}\overline {{g}_{\text {loc}}[n]}{\cdot } s\left [{{n+\tau }}\right ] \tag {3}\end{equation*}
\begin{equation*} \frac {P_{\max }}{P_{i}}\lt \text { MPEP}\wedge \frac {P_{i}}{P_{\text {rms}}}\gt \text { PAPR} \tag {4}\end{equation*}
Back-search scenario: the reflected signal is stronger than the direct signal. (a) Signal propagation path under an NLoS channel. (b) CIR under NLoS channel.
Threat Model
In this section, we describe attacker model, including attacker’s capabilities and how attack pulses are generated according to the attack parameters.
A. Attacker Model
Attackers are assumed to have the ability to conduct a distance reduction attack by manipulating the STS field of an HRP UWB frame. The fundamental security flaw in verifying the STS is that the cross-correlation method does not verify individual pulses (i.e., bits). A receiver detects a leading edge without integrity verification only if its magnitude exceeds a predefined threshold. As a result, an attacker can generate a fake leading edge in the CIR even when they transmit incorrect bits (i.e., pulses). This fabricated leading edge causes the measured ToA to register earlier than the original ToA from the legitimate leading edge or the maximum peak.
To create this fake leading edge, an attacker needs to be time-synchronized with a legitimate device that is transmitting the targeted UWB frame. The attacker may transmit the preamble field and the SFD field with low power to avoid triggering a new receive event. However, the STS field, which includes an incorrect pseudo-random number
Synchronization with a legitimate frame to overshadow the STS field with high power.
B. Attack Parameters
We assume the attacker is able to control both power and repetition frequency of attack pulses to overshadow legitimate pulses. Inspired by the Cicada++ attack [25], which introduced the first systematic distance-reduction attack against the HRP UWB ranging system, we consider attack parameter R and k to determine the structure of attack pulses. The parameter, k, represents the relative power of the attack pulse compared to the legitimate pulse. The power of the attack pulses is given by
Attack Detection Principles
A. Probabilistic Model for CIR
Employing discrete random variables, we build a probabilistic model for CIR. This model provides a rationale for attack detection by demonstrating how the attack signal manipulates the distribution of CIR. To simplify understanding of the probabilistic model, we assume that one sample represents one pulse in the STS field. A sample with a positive value is mapped to 1, while a sample with a negative value is mapped to −1. This approach aligns with the mapping of each bit in the STS field to either a positive or negative pulse, as described in Section III. Therefore, elements of
With this assumption, CIR (denoted by \begin{equation*} \text { CIR}\left [{{\tau }}\right ] = n_{+1} - n_{-1} \tag {5}\end{equation*}
In the Ghost Peak attack scenario, however, attack pulses are modeled as stronger ones amplified by \begin{align*} \text { CIR}\left [{{\tau }}\right ]=& \left ({{\sqrt {k}+1}}\right){\cdot } n_{\sqrt {k}+1} + \left ({{\sqrt {k}-1}}\right){\cdot } n_{\sqrt {k}-1} \\& {}- \left ({{\sqrt {k}-1}}\right){\cdot } n_{-\sqrt {k}+1} - \left ({{\sqrt {k}+1}}\right){\cdot } n_{-\sqrt {k}-1} \tag {6}\end{align*}
B. Analysis
In this section, we demonstrate how UWB-CA is able to detect a distance reduction attack based on the probabilistic model in Section V-A. We build a probability density function (PDF) for
Distribution of
Propose Method: UWB-CA
In this section, we demonstrate how UWB-CA verifies legitimate STS fields and detects distance-reduction attacks. Fig. 6 shows the overall procedure of UWB-CA from preprocessing to verification procedure of the newly received UWB frame.
A. Preprocessing
In general, an RF signal propagates through the wireless channel and is processed by analog RF hardware, such as an antenna, low-noise amplifier, or filters. We consider an in-phase/quadrature (I/Q) receiver, which is widely used in modern digital communication systems for receiving and processing HRP UWB signals. As depicted in Fig. 7, the real component of a received signal is extracted by mixing the sinusoidal signal (i.e., cosine wave) with a carrier frequency
B. Feature Extraction
1) CIR-Specific Features:
We extract CIR-specific features that are available during the leading edge detection procedure. First, we extract threshold parameters used to find a leading edge. Since the back-search algorithm finds the leading edge based on the parameters determined by the distribution of CIR, UWB-CA can extract meaningful features that represent channel characteristics from the threshold parameters. In addition, UWB-CA extracts the magnitude of the maximum peak and corresponding leading edge detected by a back-search algorithm. The first four rows in Table I show the CIR-specific features and its description.
2) Statistical Features:
To enhance the attack detection performance, we additionally employ statistical features to support the CIR-specific feature set. These represent the statistical characteristics of distribution of
C. Training and Verification
The core concept of UWB-CA is to train a model based on legitimate signals, which would detect any anomalies or deviations from the established model. In many studies on anomaly and intrusion detection, classification is typically performed using both normal and abnormal class data during the training process. However, considering real-world implementation, generating attack signals that cover all possible attack scenarios and channel environments is impractical. Therefore, we focus on building a model trained exclusively with legitimate signals. Among the various approaches to anomaly detection, we employ one-class classification algorithms. These techniques assume that all training instances belong to a single (i.e., normal) class [58], [59], [60], [61]. This approach allows us to identify data points, such as attack signals, that significantly deviate from the majority of the data, which consists of legitimate signals collected in nonadversarial scenarios. We employ well-known algorithms, such as the one-class support vector machine (OC-SVM) and local outlier factor (LOF). The OC-SVM aims to find a hyperplane in the feature space that maximizes the margin between the data and the legitimate class. On the other hand, the LOF utilizes the concept of local density, meaning the density estimation is based on the distances to the k nearest neighbors. Using a trained model, UWB-CA verifies a newly received STS field by determining whether the output score of model exceeds the threshold or not. When the output score exceeds the threshold, UWB-CA sounds the alarm and the receiver discards the ToA measurement.
Simulated Environments
In this section, we first conduct MATLAB-implemented simulations to evaluate the attack detection performance of UWB-CA. The victim receiver is configured following the physical-layer parameters specified in IEEE standard [62] and measures the ToA using the back-search algorithm described in Section III. For realistic simulations, we simulate 16 different channel conditions between the attacker and the victim device while employing the IEEE channel model [63].
A. Pulse Generation
As described in Section VI-A, we consider the I/Q receiver for processing the received HRP UWB signal. The receiver is configured with the default parameters for the simulation with default parameters for an HRP UWB device, as specified in the IEEE 802.15.4z standard [9]. To generate individual pulses, an eighth-order Butterworth filter with a cutoff frequency of 500 MHz is employed. Within the STS field, 4096 BPSK-modulated pulses are included with the PRF of 62.4 MHz. We also consider a clock offset that represents clock difference between the victim and attack devices of up to ±20 parts per million (ppm) as suggested by the IEEE standard [8], [9]. Finally, we assume the sample rate of the receiver’s ADC is 1 GHz, a commonly found value in COTS devices [64].
B. Channel Simulation and ToA Estimation
In the real-world channel, a transmitted RF signal reaches the receiver’s antenna via two or more paths (the so-called multipath effect). When the signals are superimposed due to the multipath effect, the amplitude and phase of the original signal can be distorted. To generate UWB pulses affected by the channel, we employ the IEEE channel model [63] that provides CIRs under LoS and Non-LoS (NLoS) channel conditions in the four different environments. Specifically, the channel model provides eight distinct impulse responses for both LoS and NLoS channels in residential, office, outdoor, and industrial environments. Table II shows the mean and standard deviation of time difference between the maximum peak and corresponding leading edge for each environment. The NLoS channel conditions exhibit larger time differences compared to the LoS channel conditions.
To configure the back-search algorithm, we investigate the combinations of the MPEP and PAPR parameter set that yields the highest precision in ToA measurement. Since the channel model also provides a reference ToA value for each CIR, which allows for accurate evaluation of the ToA measurement. We vary the MPEP from 10 to 25 in increments of 5 and the PAPR from 4 to 10 in increments of 2. We consider it a ranging error case when the time difference exceeded 7 ns, compared to the reference ToA provided by the IEEE channel model. According to (1) and (2), this timing error in the ToA by 7 ns corresponds to a distance reduction of 1.05 and 0.5 m for SS-TWR and DS-TWR, respectively. Considering that commercial HRP UWB devices exhibit a measurement error of approximately 1.5 m under NLoS channel conditions [25], [55], [65], we assume a ToA reduction of less than 7 ns was a tolerable ranging error. Table III presents the ranging error rates for different channel environments. Among the tested parameter combinations (MPEP, PAPR), we identify (10, 4), (10, 6), (10, 8), (15, 8), (20, 8), and (25, 8) as suitable choices for a ToA measurement, exhibiting average ranging error rates of 1.09%, 1.09%, 1.49%, 1.53%, 1.53%, and 1.74%, respectively.
C. ML Algorithm
UWB-CA is designed to detect distance reduction attacks by building a classifier that employs features collected under nonadversarial scenarios. By doing so, UWB-CA can cope with potential distance reduction attacks, which manipulate the CIR. For this purpose, we employ the OC-SVM and LOF algorithm provided by the MATLAB package. In our evaluation, a radial basis function (RBF) is used as a kernel function of OC-SVM. For the LOF, we set the distance metric to Mahalanobis and the number of neighbors to 20, which is also a default value of the MATLAB implementation. To simulate a legitimate STS field under various channel environments, we collect 1000 STS fields for each channel condition while varying the SNR as −10, 0, 10, and 20 dB. During the training phase, we set the number of outliers mixed with the legitimate feature to 1%. As a result, the threshold is set to a value such that there is false alarm rate of 1% in each model. Real-world experiments evaluating the ranging accuracy of the COTS HRP UWB device have shown that a 1% ranging error occurred due to NLoS channel conditions [57].
D. Performance Metrics
An HRP UWB ranging system configured with a maximum communication range, according to the relevant application scenarios—such as the PKES system, indoor positioning, and asset tracking. Usually, the HRP UWB transceivers have a maximum communication range of 100 m [66]. According to the (1), a distance is reduced by 100 m for SS-TWR when the attack reduces a ToA by 666 ns. As a result, an HRP UWB transceiver using SS-TWR may consider a measured distance as abnormal if the reduced amount of the ToA is larger than 666 ns due to the attack. In this case, we do not classify this a successful attack because it causes a denial-of-ranging. At the same time, we assume that a distance reduction attack succeeds if the ToA is reduced by at least 7 ns compared to the nonadversarial scenario (i.e.,
Distance Reduction Rate: A rate at which the attacker reduces a ToA larger than 7 ns but less than 666 ns.
Attack Detection Rate: A rate at which attacks are detected by UWB-CA only when the attacker successfully accomplishes distance reduction. Therefore, if the attacker fails to reduce the distance, the attack detection rate is not computed.
E. Feature Selection
Excluding inadequate features is essential to enhance the performance of UWB-CA in terms of the attack detection rate, computational overhead, and energy consumption. However, because the feature selection problem is NP-hard, we consider a suboptimal search strategy: we employ the sequential forward feature selection algorithm, in which features are sequentially added to an empty candidate set until the addition of more features does not decrease the criterion [67]. In UWB-CA, we use the criterion as the attack detection rate. Table IV shows the order of selected features. We select the four common features from the results as follows:
F. Ghost Peak Attack Detection
1) Digital Key Application Scenarios:
We consider an attacker who aims to reduce the distance measurement between a car and a smartphone paired with the “Digital Key” service. We create a realistic attack scenario in which the attacker overshadows the legitimate STS field under the outdoor LoS channel conditions with one of the victim devices (car or smartphone). The attacker’s goal is to deceive the car and make it think the smartphone is in close proximity. When the attack succeeds, then he/she can unlock and steal the car. Figs. 8 and 9 show the attack success rate before and after applying UWB-CA according to the ML algorithm as a function of attack parameter k. It can be seen that different rates for distance reduction depends on the (MPEP, PAPR) parameter set. For instance, in Fig. 8(a), the distance reduction rate increases up to
Success rate of distance reduction before and after applying the LOF, including the attack detection rate (%) as a function of attack pulse power: (10, 4) indicates MPEP and PAPR are set to 10 and 4, respectively. (a) (10, 4). (b) (10, 6). (c) (10, 8). (d) (15, 8). (e) (20, 8). (f) (25, 8).
Success rate of distance reduction before and after applying OC-SVM, including the attack detection rate (%) as a function of attack pulse power: (10, 4) indicates MPEP and PAPR are set to 10 and 4, respectively. (a) (10, 4). (b) (10, 6). (c) (10, 8). (d) (15, 8). (e) (20, 8). (f) (25, 8).
On the other hand, as can be seen in Fig. 8(c) and (f), a receiver with a higher PAPR (i.e., PAPR of 8) is less likely to detect a fake leading edge. However, when the k is around 30 dB, the distance reduction rate increases up to 8% in all (MPEP, PAPR) parameter sets. In terms of attack detection, the LOF had a higher attack detection rate compared to the OC-SVM. When the attack parameter k is less than 10 dB, the attack success rate is much smaller after applying UWB-CA. This is because when the weak attack pulses create a fake leading edge, the distribution of manipulated CIR is not distinct enough to be considered an attack compared to the legitimate CIR. However, when the attack parameter k is larger than 15 dB, both models begin to effectively detect the attack. For a PAPR of higher value (i.e., PAPR of 8), the best case results in the attack success rate decreasing to
2) Various Channels:
For the stealthiness of attack, an attacker may prefer to inject attack pulses under NLoS channels with victim devices, especially when attempting something like stealing a car. To extend the performance evaluation under various channel conditions, we further consider the channel conditions between the victim devices (i.e., initiator or responder) as well as the channel conditions between the victim devices and the attack device. Using the IEEE channel model, we consider both the LoS and NLoS channels in four different environments described in Table II. As a result, there are four possible channel conditions between the victim device and the attack device in each environment: LoS-LoS, LoS-NLoS, NLoS-LoS, and NLoS-NLoS. As noted in Section VII-C, we generate attack pulses 1000 times per channel and parameter k. For each iteration, we randomly select the CIR from the channel model. Additionally, we set the SNR between the initiator and responder to 10 dB. Tables V and VI show the distance reduction rate before and after applying UWB-CA with the attack detection rate (%). For example, each row indicates the channel condition between the victim device (i.e., initiator) and the attacker. In addition, the corresponding column indicates the channel condition between two victim devices (i.e., initiator and responder). As can be seen in Tables V and VI, the attacker achieves a lower distance reduction rate when he/she mounts the attack under an NLoS channel with a victim device, compared to a LoS channel. In other words, the attacker can inject attack pulses outside the victim’s line of sight but faces a disadvantage in terms of successful distance reduction.
3) Feature Importance:
We conduct the forward feature selection procedure again according to the attack parameter k. Different from the feature selection procedure conducted in Section VII-E, we limit the feature set to selected features and conduct the forward feature selection again. Tables VII and VIII show the rank of individual features by attack parameter k. For the OC-SVM, the PAPR feature shows the highest contribution regardless of k.
Real-World Experiments
In this section, to show the feasibility of UWB-CA, we evaluate the attack detection performance of UWB-CA with actual CIRs from COTS device. Also, we collect CIRs from various channels conditions by which UWB-CA is able to construct the attack detection model. Next, we implement a ghost peak attack to collect manipulated CIRs from the victim device to evaluate the attack detection performance. To build the attack detection models, We employ the identical features and parameters used in Section VII-E.
A. CIR Collection
We employ two nRF52840-DK boards with Qorvo DWM3000 modules to implement an initiator and responder. The Qorvo DWM3000 provide the API software, which enables users to collect diagnostic information during the ranging. Unlike previous studies [12], [26], [55], [65], [68], in which DWM3000 was employed to evaluate the performance in terms of ranging accuracy, energy consumption, and reliability, UWB-CA analyzes the raw CIR samples to verify a received STS field. We employ the
Real-world channel environment for collecting actual CIRs. (a) Indoor office. (b) Underground parking lot. (c) Outdoor parking lot.
Distributions of distance measurements by channel environment. (a) Indoor office. (b) Underground parking lot. (c) Outdoor parking lot.
B. Ghost Peak Attack Detection
Besides the initiator and responder, another NUCLEO-Z429 board with the Qorvo DWM3000 module is employed to implement the attack device. Following the attack procedure described in [12], we implement the attack device to overshadow a legitimate STS field transmitted by the responder. The distance between the attack device and the initiator is set to 1 m. We then configure the initiator to collect both CIRs and diagnostic data to determine the success of the attack. We consider the attack as successful when the index of the leading edge is less than 7 ns in comparison to the legitimate case. In addition, we only consider an attack as successful when the
C. Computational Overhead and Power Consumption
We implement feature extraction and attack detection model on the nRF52840-DK board. The board is integrated with the 32-bit ARM Cortex-M4 processor with a 64-MHz clock cycle. Table IX shows the execution time for feature extraction and verification on the nRF52840-DK board. Through our evaluation, we repeat each execution 100 times and calculate the average time. In the results, the preprocessing procedure causes the most processing delay. This is because the
To understand how much power UWB-CA requires, we employ a power monitoring device [74] to measure the average power before and after implementing UWB-CA on the nRF52840-DK board with Qorvo DWM3000 module. The power monitor measures the average current and voltage with the sample rate of 500 Hz. Since UWB-CA is implemented in the initiator in the SS-TWR scenario, we power the initiator using the power monitoring device and measured the power consumption. Before applying UWB-CA, during the SS-TWR, the average power consumption of the nRF52840-DK board was 689.34 mW. After applying UWB-CA, the average power consumption of the nRF52840-DK board was 701.19 mW. This result shows that UWB-CA increases can induce a power consumption of 1.72% during the SS-TWR.
Discussion
UWB-CA mainly exploits the features that are related to the signal power (i.e.,
Conclusion
In this article, we have presented a novel method called UWB-CA to detect distance reduction attacks in HRP UWB ranging systems. The key idea of UWB-CA is to analyze the distribution of the CIR to extract features that can differentiate legitimate CIRs from CIRs manipulated by an attacker. Based on the output score of the anomaly detection model, UWB-CA verifies a newly received STS field and corresponding ToA measurement. Since it is difficult for the attack to preserve the distribution of the CIR while the STS field is also manipulated, UWB-CA effectively detects distance reduction attacks. Including both simulations and real-world experiments, we comprehensively evaluated the attack detection performance of UWB-CA. Furthermore, we measured the additional processing delay and power consumption caused by UWB-CA.