DENIAL OF CONVENIENCE ATTACK TO SMARTPHONES USING A FAKE WI-FI ACCESS POINT by ERICH DONDYK
نویسنده
چکیده
In this paper, we consider a novel denial of service attack targeted at popular smartphone operating systems. This type of attack, which we call a Denial of Convenience (DoC) attack, prevents non-technical savvy victims from utilizing data services by exploiting the connectivity management protocol of smartphones' operating systems when encountered with a Wi-Fi access point. By setting up a fake Wi-Fi access point without Internet access (using simple devices such as a laptop), an adversary can prompt a smartphone with enabled Wi-Fi features to automatically terminate a valid mobile broadband connection and connect to this fake Wi-Fi access point. This, as a result, prevents the targeted smartphone from having any type of Internet connection unless the victim is capable of diagnosing the problem and disabling the Wi-Fi features manually. For the majority of smartphone users that have little networking knowledge, this can be a challenging task. We demonstrate that most current smartphones, including iPhone and Android phones, are vulnerable to this DoC attack. To address this attack, we propose implementing a novel Internet-access validation protocol to validate a Wi-Fi access point by taking advantage of the cellular network channel. It first uses the cellular network to send a secret to an Internet validation server, and tries to retrieve this secret via the newly established Wi-Fi channel to validate the connection of the Wi-Fi channel. iii ACKNOWLEDGEMENTS
منابع مشابه
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling
T-Mobile has a service called “Wi-Fi Calling”, which lets users make and receive calls even when without cellular service. This service is pre-installed on millions of TMobile Android smartphones. We analyze the security aspects of this service from a network perspective, and demonstrate a man-in-the-middle attack caused by a lack of TLS certificate validation, allowing an attacker to eavesdrop...
متن کاملWiFi-Direct Simulation for INET in OMNeT++
Wi-Fi Direct is a popular wireless technology which is integrated in most of today’s smartphones and tablets. This technology allows a set of devices to dynamically negotiate and select a group owner which plays the role access point. This important feature is the strength of Wi-Fi Direct and makes it more and more widely used in telecommunications networks. In this paper, we present the implem...
متن کاملPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Recently, smartphones are widely used due to the popularity of Internet, and they are equipped with both Wi-Fi and cellular radio interfaces generally. In smartphone, although Wi-Fi interface is generally used for supporting higher rate data session of the smartphone itself, it can be also used to support connectivity to other nearby wireless devices with Wi-Fi interface only, such as laptop. T...
متن کاملFalsification Attacks against WPA-TKIP in a Realistic Environment
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPATKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12–15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first ...
متن کاملWPA Totem: Sharing temporaryWi-Fi Configuration Tokens using NFC
Joining a private Wi-Fi network is an intricate operation for end users, especially when they must type a long and complicated password in order to gain access. Moreover, it is often the case where users connect to multiple such hotspots, placed in public places visited in their daily routine, further exacerbating the issue. In this paper we present WPA-Totem: a small device that emits Wi-Fi co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012