One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

by   Milan Stute, et al.

Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protocol. Apple first introduced AWDL around 2014 and has since integrated it into its entire product line, including iPhone and Mac. While we have found that AWDL drives popular applications such as AirPlay and AirDrop on more than one billion end-user devices, neither the protocol itself nor potential security and Wi-Fi coexistence issues have been studied. In this paper, we present the operation of the protocol as the result of binary and runtime analysis. In short, each AWDL node announces a sequence of Availability Windows (AWs) indicating its readiness to communicate with other AWDL nodes. An elected master node synchronizes these sequences. Outside the AWs, nodes can tune their Wi-Fi radio to a different channel to communicate with an access point, or could turn it off to save energy. Based on our analysis, we conduct experiments to study the master election process, synchronization accuracy, channel hopping dynamics, and achievable throughput. We conduct a preliminary security assessment and publish an open source Wireshark dissector for AWDL to nourish future work.


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

Apple Wireless Direct Link (AWDL) is a proprietary and undocumented wire...

Information Gathering in Ad-Hoc Radio Networks

In the ad-hoc radio network model, nodes communicate with their neighbor...

An Adaptive Channel Reservation MAC Protocol Based on Forwarding Traffic of Key Nodes

Ad Hoc networks with multi-hop topology are widely used in military and ...

Mobility-Assisted Covert Communication over Wireless Ad Hoc Networks

We study the effect of node mobility on the throughput scaling of the co...

Federated Graph Learning for Low Probability of Detection in Wireless Ad-Hoc Networks

Low probability of detection (LPD) has recently emerged as a means to en...

A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices

Embedded devices are becoming popular. Meanwhile, researchers are active...

Network-Decomposed Hierarchical Cooperation in Ad Hoc Networks With Social Relationships

In this paper, we introduce a network-decomposed hierarchical cooperatio...

Please sign up or login with your details

Forgot password? Click here to reset