ReDECTed Building an SDR based DECT sniffer. May 27 th, 2015 HITB HAXPO Marc Newlin

Similar documents
The Open-Source SDR LTE Platform for First Responders. Software Radio Systems

Wireless Communication

PHY Link Channel Resource Allocation, Overhead, Impact on Procedures. Nicola Varanese (Qualcomm)

Abusing Calypso phones

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

Strengthening Unlicensed Band Wireless Backhaul

DECODIO. for TETRA. Air interface analysis Network traffic measurements and statistics Coverage tests Network monitoring DETECT DECODE VISUALIZE

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH?

Implementation of a Dual-Mode SDR Smart Antenna Base Station Supporting WiBro and TDD HSDPA

CS263: Wireless Communications and Sensor Networks

MULTICELL NETWORKS based on DECT and CAT-iq

Distributed Queue Dual Bus

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

Bluetooth: Short-range Wireless Communication

DECT in M2M communication

Guide to Wireless Communications, 3 rd Edition. Objectives

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Header Compression Capacity Calculations for Wireless Networks

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

Questions & Answers SC14CVMDECTDEVKT

WIRELESS TECHNOLOGIES

STA-MU-A0028S (MiniCard-USB version)

MSIT 413: Wireless Technologies Week 8

Evaluating GSM A5/1 security on hopping channels

STA-UI-A003D (USB version)

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

WiMOD LoRaWAN EndNode Modem HCI Specification

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Nighthawk AX8/8-stream AX6000 WiFi Router

Hands-on course Mobile Communications

Hacking UAVs: the integrity of Wi-Fi, Telemetry and RC links. Author: Mr. Xi Chen, Mr. Jeff Thomas

DECT ULTRA LOW ENERGY (ULE) Technology Overview The ETSI Approach to a Mid-range Wireless Technology for IoT

Wireless standards--home automation, energy, care and security

Introduction to Video Compression

Principles of Wireless Sensor Networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Case study: Performance-efficient Implementation of Robust Header Compression (ROHC) using an Application-Specific Processor

Parallelized Progressive Network Coding with Hardware Acceleration

Fundamentals of Networking Introduction to Networking Devices

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli

Unencrypted Mouse Packet

Simplifying FPGA Design for SDR with a Network on Chip Architecture

Error characteristics and their prediction in ZigBee transmission at coexistence conditions

Contents. 1 Addendum to LCOS version Routing and WAN connections WLAN Public Spot Voice over IP VoIP...

IEEE Testing Signal Compliance of ZigBee Standard

Flexible GFDM PHY Tutorial

CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

EPoC PHY and MAC proposal

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

EL2745 Principles of Wireless Sensor Networks

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Long Distance Wireless Communication. Principally satellite communication:

AllNet: Ubiquitous Interpersonal Communication

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

DA1220-B42 CAT-iq 2.0 FP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS

Exam : SCNS_EN. Title : SCNS SCNS Tactical Perimeter Defense. Version : Demo

Wireless Communication

Hardware Accelerated SDR Platform for Adaptive Air Interfaces Tarik Kazaz, Christophe Van Praet, Merima Kulin, Pieter Willemen, Ingrid Moerman

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011

Impact of Bluetooth on Direct Sequence Wireless LANs

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

osmo-gmr: Intro to receiving GMR-1 satphones

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

DA1220-B41 CAT-iq 2.0 PP ETSI TS ETSI TS ETSI EN Generic Access Profile ETSI TS

Cellular Communication

Cover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message

CIS 700/002 : Special Topics : Bluetooth: With Low Energy comes Low Security

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

WiMedia Media Access Control (MAC) Dan Froelich

Links. CS125 - mylinks 1 1/22/14

Investigation of WLAN

WIRELESS LANs: THE DECT APPROACH

e-pg Pathshala Quadrant 1 e-text

outline background & overview mac & phy wlan management security

RF69 Communication Example

Configuring Advanced Radio Settings on the WAP371

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

Hands-On Exercises: IEEE Standard

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.

An Experimental Study of Network Performance Impact of Increased Latency in SDR

Understanding Routers, Switches, and Network Hardware

SOFTWARE IMPLEMENTATION OF IEEE B WIRELESS LAN STANDARD. Suyog D. Deshpande (Sr. MTS: HelloSoft, Inc, San Jose, CA, USA;

3G Wireless. from an Operator s Perspective. David T. Shimozawa Technology Development. Page 1. June 2001

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Hacking the Fast Lane: security issues in p, DSRC and WAVE

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

GIGABIT ETHERNET XMVR LAN SERVICES MODULES

DA1150 DECT Examiner Installation & Usage Guide Version 1.1

Wireless Router at Home

BlueW-2310 Slim Dongle STA-UI-A005G WiFi & Bluetooth v2.1+edr Datasheets

Parallel Computing. Prof. Marco Bertini

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Transcription:

ReDECTed Building an SDR based DECT sniffer May 27 th, 2015 HITB HAXPO Marc Newlin

What is a DECT sniffer? DECT is the ubiquitous wireless protocol used by cordless phones A DECT sniffer uses an SDR to decode packets from nearby DECT devices

Why build a DECT sniffer? DECT has a high adoption rate worldwide Writing SDR protocol decoders is fun! Hacking on a sniffer is a great way to learn a new protocol Existing DECT sniffers rely on hardware that is no longer produced SDRs are highly available

Dedicated DECT hardware COM-ON-AIR cards from DOSCH-AMAND PCMCIA DECT transceiver Can be used as a generic DECT device No longer produced; increasingly difficult to find

Prior DECT sniffer work dedected Released open source firmware/driver for COM-ON-AIR cards Reverse engineered the DECT Standard Authentication Algorithm Osmocom DECT DECT stack for Linux Works with COM-ON-AIR cards to function as a DECT handset or basestation

Some Important Terms Acronym RFP PP Meaning Radio Fixed Part (basestation) Portable Part (handset) RFPI Radio Fixed Part Identifier (5- octet globally unique identifier) C-plane TDMA LSIG PMID Control Plane Time Division Multiple Access Link Signature Portable MAC Identifier

DECT Physical Layer 1.152 MHz sample rate per channel 1.728 MHz channel spacing 5 channels (8.64 MHz) in North America, and 10 channels everywhere else (17.28 MHz) DECT is called DECT 6.0 in North America, but this is for strictly marketing reasons Typically between 1880 MHz and 1930 MHz, but also found at 900 MHz, 2 GHz, and 2.4 GHz GFSK modulation (required) DQPSK, D8PSK, QAM16, QAM64 modulation (optional) TDMA channel access

Project goals Build a DECT sniffer that works on both a Linux computer and an Android phone Keep complexity to a minimum Signal processing is computationally expensive Lower complexity means lower power consumption Future self is not smart (keep code simple and well documented!!) Decode all 5 North American DECT channels simultaneously (requires a fancy SDR) Support single channel decoding with an inexpensive SDR Most importantly, learn something!

SDR hardware USRP B210 $1100 USD 56 MHz bandwidth 70 MHz 6 GHz 12-bit samples USB 3.0 RTL-SDR E400 $50 USD 3.2 MHz bandwidth 52 MHz 2.2 GHz 8-bit samples USB 2.0

What do we need to build? Channelizer In the case of 5 DECT channels, this will take the 8.64 MHz input, and split it into 5x 1.728 MHz streams FM Demodulator Turns the output of each channelized stream into bits Frame / slot / packet recovery Take the demodulated bits, and figure out what the DECT hardware is doing

Keep it simple SDR doesn t have to be complicated Things requiring a Ph.D to understand MS Word page formatting Other things Software Defined Radio

Host Environment Linux Host Intel C Compiler Intel Performance Primitives Intel Thread Building Blocks AVX2 and SSE4 SIMD intrinsics Any Intel Core processor Android Host Android NDK Project Ne10 ARM NEON SIMD intrinsics Quad core ARMv7a processor

Talking to the SDR What is required to get I/Q samples from the SDR s? USRP B210 UHD Boost libusb RTL-SDR E4000 librtlsdr libusb

PFB Channelizer 1. Generate low pass filter coefficients for one channel For N channels, the number of filter coefficients must be an integer multiple of N 2. Low pass filter each channel For N channels, each Nth sample belongs to the same channel Each channel is filtered by every Nth coefficient Given 5 channels, channel 2 s samples are 2, 7, 12, etc, which are filtered by coefficients 2, 7, 12, etc 3. Send the filtered samples through an N-bin FFT 4. Deinterleave the output (at which point each output stream contains samples from one channel)

PFB Channelizer Linux

PFB Channelizer - Android

FM Demodulator 1. Multiply a sample by the complex conjugate of the previous sample. 2. Compute the phase angle of the result. 3. Positive phase angle means bit 1, negative phase angle means bit 0.

FM Demodulator - Linux

FM Demodulator - Android

Timing Recovery The DECT device clock and SDR clock will typically be offset by a small amount. We need to correct this offset in order to produce accurate bits. 1. With no offset, the phase angle representing a 1 bit will be the absolute value of the phase angle representing a 0 bit. 2. Use the offset (error value) to determine the clock difference between the DECT device and the SDR. 3. Interpolate the output value based on the error value.

Timing Recovery Linux

Timing Recovery - Android

DECT TDMA Frames and Slots 1 frame = 24 time slots (10ms) 1 slot = 480 symbols (480 samples/bits with GFSK modulation) 12 downlink slots are followed by 12 uplink slots Slots are used in pairs: [0, 12], [1, 13], etc Full and double slots start at slot symbol offset 0 Half slots start at symbol offset 0 or 240

Fixed Capacity Packets Packet Type P0 96 symbols 1 timeslot Packet Type P32 420 or 424 symbols 1 timeslot Packet Type P80 900 or 904 symbols 2 timeslots

Variable Capacity Packets Packet Type P00j Variable length Half slot, full slot, or double slot

DECT TDMA Multiframe 1 multiframe = 16 frames RFP s transmit a multiframe marker in frame 8 of each multiframe Multiframes are used a unit of duration Multiframes are numbered when encryption is enabled

DECT Packet Structure Field S field D field A field B field X field Z field Description preamble and sync word payload MAC header and tail, protected by a 16 bit CRC, unencrypted data (voice, control data, etc), can be encrypted 32 bit CRC computed over the B field last 4 symbols from the D-field, used to detect interference from unsynchronized transmitters sliding into adjacent timeslots

S-field Detector RFP S-field: AA-AA-E9-8A PP S-field: 55-55-16-75 S-field begins with a preamble of alternating 1 s and 0 s, followed by a sync word Preamble can be optionally extended by an additional 16 bits The PP S-field is the inverse of the RFP S-field Packet detector maintains a ring buffer of incoming bits and bytes After each new bit, the ring buffer is checked against both the PP and RFP S- fields When a match is found, the potential packet is passed up to the MAC layer

S-field Detector

A-field Validator Detecting an S-field doesn t mean we have a valid packet A-field validator calculates the 16 bit CRC, and continues only if it matches If we have a valid A-field, we proceed to determine the slot and frame indexes of this packet

A-field Validator

Recovering TDMA Timing Not all packets contain unique identifiers Must achieve TDMA sync to infer transceiver state Multiframe markers transmit system information once per multiframe There are 12 multiframe marker types, transmitted at periodic intervals

C-plane Frames Frames are fragmented and sent in multiple A-field tails Protected by a 16-bit CRC CRC is XOR d with the LSIG (lower 16 bits of PMID) Common single-fragment C-plane messages allow us to reverse the LSIG Once we know the LSIG for a given connection (timeslot), we can CRC-validate and decode multiple fragment frames

Reversing the LSIG

Reassembling C-plane Frames

Cleartext A-Field Data Static System Information (RFP) TDMA timing details Supported frequencies Number of transceivers Supported and required encryption Voice codecs Lots of other fun stuff MAC Control (RFP, PP) Connection establishment MAC layer encryption setup Paging Tail (RFP) Timeslot availability details Supported modulation types Identity Information (RFP) RFPI (globally unique identifier) Type of basestation (residential, enterprise, etc) Identity Information (PP) RFPI of the associated RFP C-plane (Control Plane) (RFP, PP) Call control management Caller ID details

Conclusions SDR s are a viable platform for DECT research A low complexity DECT sniffer can decode 5 channels simultaneously with a modern Android phone or Linux computer Join me next time for more adventures with SDR and DECT!