WiFi Physical Layer Stays Awake and Responds When it Should Not

12/31/2022
by   Ali Abedi, et al.
0

WiFi communication should be possible only between devices inside the same network. However, we find that all existing WiFi devices send back acknowledgments (ACK) to even fake packets received from unauthorized WiFi devices outside of their network. Moreover, we find that an unauthorized device can manipulate the power-saving mechanism of WiFi radios and keep them continuously awake by sending specific fake beacon frames to them. Our evaluation of over 5,000 devices from 186 vendors confirms that these are widespread issues. We believe these loopholes cannot be prevented, and hence they create privacy and security concerns. Finally, to show the importance of these issues and their consequences, we implement and demonstrate two attacks where an adversary performs battery drain and WiFi sensing attacks just using a tiny WiFi module which costs less than ten dollars.

READ FULL TEXT

page 9

page 11

research
08/20/2018

Authenticating On-Body Backscatter by Exploiting Propagation Signatures

The vision of battery-free communication has made backscatter a compelli...
research
01/17/2023

Are Home Security Systems Reliable?

Home security systems have become increasingly popular since they provid...
research
03/11/2019

SECCS: SECure Context Saving for IoT Devices

Energy consumption of IoT devices is a very important issue. For this re...
research
06/28/2019

A DTLS Abstraction Layer for the Recursive Networking Architecture in RIOT

On the Internet of Things (IoT), devices continuously communicate with e...
research
08/05/2021

Selective privacy in IoT smart-farms for battery-powered device longevity

This paper presents a payload security model to maintain the standards o...
research
09/24/2020

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy

The Bluetooth standard specifies two incompatible wireless transports: B...
research
03/26/2022

Human-centred home network security

This chapter draws from across the foregoing chapters discussing many co...

Please sign up or login with your details

Forgot password? Click here to reset