170 likes | 186 Views
This paper discusses Denial of Convenience (DoC) attacks on smartphones through the use of a fake Wi-Fi access point. It examines the vulnerabilities in Wi-Fi protocols and the potential for exploiting them. The paper also proposes several defense mechanisms to counteract these attacks.
E N D
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida
Background Cellular Channel (e.g. 3G) Wi-Fi Channel A smartphone can connect to the Internet through only one broadband channel at any particular time
Wi-Fi Advantages • It is usually faster • Does not consume the user’s data plan • Does not consume the cellular provider’s bandwidth Users are encouraged to use the Wi-Fi channel when available because:
Wi-Fi Protocol Vulnerability • Wi-Fi protocol automatically connects (or asks the user to connect) to an open Wi-Fi APs • Wi-Fi protocol never checks if a Wi-Fi access point has a functioning Internet connection or not • Could stop Internet access if the AP does not work • Users have to know how to disable WiFi to get back 3G broadband access The following two characteristics of the Android and iPhone Wi-Fi protocol allow for exploit:
Motivation • Currently, more than one third of all adults in the United States own a smartphone. • Many of these users are not technologically savvy to diagnose this type of attack and/or take corrective actions. • Mounting a successful Denial-of-Convinience (DoC) attack can be achieved with simple hardware device.
Attack 1: Simple Passive Wi-Fi Access Point • Implementations: • Wireless router without an Internet connection • - OR - • Laptop/smartphone configured as a Wi-Fi AP Setup a Wi-Fi AP without an internet connection
Prototype Fake AP implementation using a Linux netbook with an external ALFA network adapter costing less than $30 The adapter has a higher power (30dBm) than normal APs (20dBm): It could bury real AP that has the same SSID!
Experiment of Attack 1 The result of Attack 1 on an Android phone: (a) the connection status of the fake AP and (b) the smartphone does not have a working Internet connection because of its Wi-Fi connection with the fake AP.
Defense 1: Static Identifier Validation Sends a challenge to a validation server Receives a response from the validation server Compares a key in the validation response against a key stored in the device
Experiment of Defense 1 • The simple validation procedure can detect fake AP used in Attack 1 • If the AP is invalid, Wi-Fi stack shows that the fake AP has been disabled by Wi-Fi Authenticator
Attack 2: Fake Validation Response Setup a fake Wi-Fi AP Setup a local fake validation server (e.g., on the same laptop/smartphone) Forward all probing packages to local validation server Redirect validation challenge to a fake validation server
Defense 2: Dual Channel Validation Before connecting to a Wi-Fi AP, send a randomly generated validation key to the validation server through the cellular 3G network In WiFi channel: Send a challenge to the validation server Receive a response from validation server Compare the random key in the validation response against the key stored in the device
Attack 3: Selective Internet Traffic Throttling Allow probing packages to reach the validation server Block or throttle all other data traffic
Defense 3: Network Performance Monitoring After connecting to a Wi-Fi AP, measure the performance of the connection If below a predetermine threshold, transition back automatically to the cellular network
Conclusion • DoC attacks are a threat against the two most popular smartphone operating systems, Android and iOS. • There are several approaches to implement a DoC attacks. • Defenses can be implemented to counteract each type of DoC attack considered.