Man in the middle attackFrom the picture you can see that mounting a man-in-the-middle attack against Ronja would require a crane to put a man into the beam. The man would have to set up a bulky optical device to receive data and retransmit their changed version. Mounting such high-profile attack would be witnessed by the whole neighbourhood. On the other hands, today's most widespread wireless technology, WiFi networks, can be hijacked very easily, as you can see from demonstration of "airpwn" tool. And built-in security protocols of WiFi don't remove this problem -- according to paper "Your Wireless Network Has No Clothes", all of them are flawed. |
Denial of Service (DoS) attackToday's most widespread technology, WiFi, is open to a jamming attack without workaround. The jammer can sit anywhere, concealed. On the other hand, to jam Ronja, the attacker would have to carry a modulated laser device with bulky tripod and fine-pointing mechanics. On top of that, he would have to seek certain small spot, where the beam is visible. This spot furthermore doesn't exist in all installations, and those that exist often aren't publicly accessible. Jamming would be then easily spotted by looking from the receiver - it's clear where the jammer has to be - and the jammer would be easily witnessed by public. |
WiFi networks can be hijacked (see chapter 4.2 of the paper). Ronja is immune to this attack because doesn't contain any state machines that could be confused by the adversary.
If someone mounts a successful distributed DoS against a wireless network, a flood of data will come that will overflow all available bandwidth.
Today's most popular wireless architecture, WiFi, has a distinct disadvantage of being half duplex. This results in a failure in such case:
On the other hand, Ronja will still maintain it's key properties: