WiFi Says "Hi!" Back to Strangers!

被引:10
作者
Abedi, Ali [1 ]
Abari, Omid [2 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
[2] Univ Calif Los Angeles, Los Angeles, CA USA
来源
PROCEEDINGS OF THE 19TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2020 | 2020年
关键词
D O I
10.1145/3422604.3425951
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi networks employ authentication and encryption mechanisms to protect the network from being accessed by unauthorized devices. Therefore, WiFi communication should be possible only between devices inside the same network. However, we have found that all existing WiFi devices send back acknowledgments (ACK) to even fake packets received from WiFi devices outside of their network. We call this behavior Polite WiFi since WiFi devices respond to all packets even those coming from strangers! In this paper, we discover the Polite WiFi behavior for the first time. We also examine this behavior on over 5,000 WiFi devices from 186 vendors. We find that all existing WiFi devices respond to fake packets transmitted to them. We believe this behavior creates many threats as well as opportunities. For example, one can couple this behavior with WiFi sensing and localization techniques to create a new class of security threats. In particular, by continuously sending fake frames to a target device, and measuring the properties of the ACK signal, one can extract sensitive personal information. Similarly, an attacker may use this behavior to quickly drain the battery of WiFi devices by continuously sending fake packets to them. Despite these threats, we also believe that the Polite WiFi behavior can open up new opportunities to WiFi sensing applications by making them more practical and easier to deploy.
引用
收藏
页码:132 / 138
页数:7
相关论文
共 30 条
[1]   Wi-LE: Can WiFi Replace Bluetooth? [J].
Abedi, Ali ;
Abari, Omid ;
Brecht, Tim .
PROCEEDINGS OF THE EIGHTEENTH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '19), 2019, :117-124
[2]   Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization [J].
Agarwal, Mayank ;
Pasumarthi, Dileep ;
Biswas, Santosh ;
Nandi, Sukumar .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) :1035-1051
[3]   Keystroke Recognition Using WiFi Signals [J].
Ali, Kamran ;
Liu, Alex X. ;
Wang, Wei ;
Shahzad, Muhammad .
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, :90-102
[4]   Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions [J].
Alotaibi, Bandar ;
Elleithy, Khaled .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) :1261-1290
[5]  
[Anonymous], 2020, ESP8266 Datasheet
[6]  
Bellardo J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P15
[7]  
Biondi P., 2020, Scapy
[8]  
Blink, 2020, Blink XT2 security camera
[9]   Beacon-stuffing: Wi-Fi without associations [J].
Chandra, Ranveer ;
Padhye, Jitendra ;
Ravindranath, Lenin ;
Wolman, Alec .
EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, :53-+
[10]  
Combs G., 2020, Wireshark