Probe Request Based Device Identification Attack and Defense
Abstract
:1. Introduction
- The general structure and fields of 802.11ac probe request are analyzed. An explanation of fields in frame body which are closely related to the device is given. These fields are proved to be used as a device fingerprint.
- A device identification method based on deep learning to select features automatically is studied and designed. It is aimed at overcoming the challenges brought by the random changes and fixed feature selection in 802.11ac probe request frame fields.
- An efficient mechanism against the attack on the basis of device identification is proposed. The stream cipher is used to hide the content of probe request for the purpose of protecting device privacy. In order to decrease the possibility that the attacker may find encrypted probe request frames, we only encrypt the value parts in MAC frame body to reserve the MAC header construction with stream cipher.
- We conduct experiments to evaluate our attack method and defense mechanism respectively. As for the attack method, the results show that average precision, recall and f1-score of our proposed device identification method exceed 99%. For the defense method, our proposed protection mechanism against the attack reduces the average precision, recall and f1-score of device identification to about 36%, 30% and 25% respectively.
2. Related Works
2.1. Device Identification
2.2. Attack and Defense
3. Device Identification
3.1. Threat Model
3.2. 802.11ac Frame Analysis
3.3. Identification in Deep Learning
3.3.1. Data Pre-Processing
Algorithm 1: Probe request preprocessing |
3.3.2. The Construction of Neural Network
4. Evaluation of Device Identification
4.1. Experiment Setup
- 802.11ac Devices: 20 different types of devices are adopted as shown in Table 2. The uppercase letters O, D, C represent OS, driver and chipset types.
- Monitor: A Dell OptiPex 3600 mini workstation with usb wireless card Comfast CF-9391AC uses an open source tcpdump to capture 802.11ac probe request frames.
- Device Identification Server: A Dell desktop is adopted as a device identification server which preprocesses the packets, train device type neural network and identifies the corresponding type of a targeted device.
4.2. Performance Metrics
- Precision: For a certain device type, it represents the proportion of true positive samples among samples that are predicted to be positive.
- Recall: For a certain device type, it represents the proportion of true positive samples among all positive samples.
- F1-score: 2 × (precision × recall)/(precision + recall)
4.3. Approach Based on Deep Learning
4.4. Comparative Experiment
- Packet Loss: Some signals carrying messages can not be correctly demodulated by monitor sniffers because of the influence brought by random noise in the wireless channel. As a result, packet transmitting rate reflected in the monitoring point is lower than the actual packet transmitting rate of Wi-Fi devices.
- Device Status: The transmitting rate of packets is also affected by the current running status of Wi-Fi devices, such as antenna usage and bluetooth state [30].
- Users’ operation habits: On the basis of our findings, some mobile devices send probe request frames when users open the network selection interface of OS in practice. The Wi-Fi device also sends probe requests actively when the user chooses to connect to the AP. Undeniably, users have their own habits in using the Wi-Fi network, which will change the transmitting rate of original probe request.
5. Defense Mechanism
5.1. Security Requirements
- Anonymity: The proposed defense mechanism can conceal the implicit identifiers in the probe request frames for anonymity of the 802.11ac device type. 802.11ac device type can be identified with the above proposed identification method.
- Structure Identifiability: The proposed defense mechanism can ensure the identifiability of probe request frame structure. The structure identifiability indicates the structure of probe request frame is remained to avoid the awareness of adversaries.
- Usability: The proposed defense mechanism can ensure the availability of probe request frames, which is able to ensure the association and authentication operate normally between client and AP.
- Unlinkability: The proposed defense mechanism can make probe request frames unlinkable, which are sent out at different times. Although the linkability between probe request frames does not cause the privacy leakage of the 802.11ac device type itself, the adversary can track the targeted devices so as to choose a public region without security supervision. The targeted device is easily accessible so that the device type will be obtained offline.
5.2. Frame Encryption
5.3. Procedure of Defense Mechanism
- Client Side: When the client receives a beacon from AP which supports our proposed mechanism, it enters the key exchange phase and generates a secret integer a. Next, modulus p and base g are chosen to calculate public parameter A. As a matter of fact, the essential parameter A, p and g are sent to the AP for peer key negotiation. When the client received the public parameter B from AP, it can generate a key . In order to enhance the randomness of the key which acts as a seed in PRNG (Pseudorandom Number Generator), the key generation in TLS 1.2 protocol which exchanges individual random number is referred to. The client sends a random number and receives another number . Then the client uses , , , client mac address and AP mac address with [32] applied in TLS to generate which has a good randomness. As for encrypted probe request transmission, is used as the seed of PRNG, so the client and AP can generate same random numbers synchronously. Besides, there are different random numbers in different rounds as keys of probe request encryption. This ensures that the frame body of the probe request can be decrypted correctly by AP, and the encrypted probe requests varies in different round of different frame exchanges. represents that PRNG generates the nth key with seed and the round n. Here Mersenne Twister is used as PRNG which is widely used by many function libraries. Finally the client encrypts the probe request as described in Section 5.2. In addition, the sum of and as the parameter nonce of chacha20 is assigned. The implementation detail is shown in Procedure 1.
- AP Side: The AP sends beacon frames to announce its existence constantly. When it receives essential parameters and random number from the client, the pair key is generated. Similar to the sending and receiving process of the client, the AP also uses the same PRNG to generate the key in order to decrypt the encrypted probe request. The implementation detail is shown in Procedure 2.
Procedure 1: Frame interaction proceduce of client side |
Procedure 2: Frame interaction procedure of AP side |
6. Defense Evaluation
6.1. Experiment Setup
- Client and AP: Two Dell OptiPex 3600 mini Workstation is used as a client device and AP. The client device is equipped with a Wi-Fi card and the AP is equipped with two Wi-Fi cards. The three Wi-Fi cards are capable of packet sniffing and injection, which are supported by the RTL8812au driver. Specifically, two Wi-Fi cards are placed in client and AP respectively and they can realize half-duplex transmission and reception of commercial devices by switching from packet injection to sniffing. And the rest one constantly sends the beacon in AP. At the key exchange stage, the key exchange parameters of client and AP are encapsulated into assoication request and association response respectively.
6.2. Performance of Frame Encryption
6.3. Time Overhead of Defense Mechanism
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- IoT Device Market to Reach $5.1 billion by 2025: Report. Available online: https://www.fierceelectronics.com/iot-wireless/iot-device-market-to-reach-5-1-billion-by-2025-report (accessed on 17 June 2020).
- Common Vulnerabilities and Exposures. Available online: https://cve.mitre.org/ (accessed on 17 June 2020).
- Liu, P.; Yang, P.; Song, W.Z.; Yan, Y.; Li, X.Y. Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 190–198. [Google Scholar]
- Hua, J.; Sun, H.; Shen, Z.; Qian, Z.; Zhong, S. Accurate and efficient wireless device fingerprinting using channel state information. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1700–1708. [Google Scholar]
- Franklin, J.; McCoy, D.; Tabriz, P.; Neagoe, V.; Randwyk, J.V.; Sicker, D. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. USENIX Secur. Symp. 2006, 3, 16–89. [Google Scholar]
- Desmond, L.C.C.; Yuan, C.C.; Pheng, T.C.; Lee, R.S. Identifying unique devices through wireless fingerprinting. In Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, 31 March–2 April 2008; ACM: New York, NY, USA, 2008; pp. 46–55. [Google Scholar]
- Waltari, O.; Kangasharju, J. The wireless shark: Identifying wifi devices based on probe fingerprints. In Proceedings of the First Workshop on Mobile Data, Singapore, 25–30 June 2016; ACM: New York, NY, USA, 2016; pp. 1–6. [Google Scholar]
- Bratus, S.; Cornelius, C.; Kotz, D.; Peebles, D. Active behavioral fingerprinting of wireless devices. In Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, 31 March–2 April 2008; ACM: New York, NY, USA, 2008; pp. 56–61. [Google Scholar]
- Robyns, P.; Bonné, B.; Quax, P.; Lamotte, W. Noncooperative 802.11 mac layer fingerprinting and tracking of mobile devices. Secur. Commun. Netw. 2017, 2017, 6235484. [Google Scholar] [CrossRef]
- Pang, J.; Greenstein, B.; Gummadi, R.; Seshan, S.; Wetherall, D. 802.11 user fingerprinting. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montreal, QC, Canada, 9–14 September 2007; pp. 99–110. [Google Scholar]
- Vanhoef, M.; Matte, C.; Cunche, M.; Cardoso, L.S.; Piessens, F. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016; ACM: New York, NY, USA, 2016; pp. 413–424. [Google Scholar]
- Greenstein, B.; McCoy, D.; Pang, J.; Kohno, T.; Seshan, S.; Wetherall, D. Improving wireless privacy with an identifier-free link layer protocol. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA, 17–20 June 2008; pp. 40–53. [Google Scholar]
- Armknecht, F.; Girão, J.; Matos, A.; Rui, L.A. Who Said That? Privacy at Link Layer. In Proceedings of the INFOCOM 2007-IEEE Conference on Computer Communications, Anchorage, AA, USA, 6–12 May 2007. [Google Scholar]
- Zhang, J.; Beresford, A.R.; Sheret, I. SENSORID: Sensor Calibration Fingerprinting for Smartphones. In Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; IEEE: Piscataway, NJ, USA, 2019. [Google Scholar]
- Das, A.; Borisov, N.; Caesar, M. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; ACM: New York, NY, USA, 2014; pp. 441–452. [Google Scholar]
- Cheng, Y.; Ji, X.; Zhang, J.; Xu, W.; Chen, Y.C. Demicpu: Device fingerprinting with magnetic signals radiated by cpu. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 1149–1170. [Google Scholar]
- Li, Z.; Rathore, A.S.; Song, C.; Wei, S.; Wang, Y.; Xu, W. PrinTracker: Fingerprinting 3D printers using commodity scanners. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; ACM: New York, NY, USA, 2018; pp. 1306–1323. [Google Scholar]
- Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, A.R.; Tarkoma, S. IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 2177–2184. [Google Scholar]
- Eckersley, P. How unique is your web browser. In International Symposium on Privacy Enhancing Technologies Symposium; Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–18. [Google Scholar]
- Takei, N.; Saito, T.; Takasu, K.; Yamada, T. Web browser fingerprinting using only cascading style sheets. In Proceedings of the 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Krakow, Poland, 4–6 November 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 57–63. [Google Scholar]
- Jiang, T.; Wang, H.J.; Hu, Y.C. Preserving location privacy in wireless LANs. In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, San Juan, Puerto Rico, 11–13 June 2007; pp. 246–257. [Google Scholar]
- Fan, Y.; Lin, B.; Jiang, Y.; Shen, X. An efficient privacy-preserving scheme for wireless link layer security. In Proceedings of the IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, New Orleans, LO, USA, 30 November–4 December 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 1–5. [Google Scholar]
- Laboratory, I.T. National Vulnerability Database. Available online: https://nvd.nist.gov/ (accessed on 17 June 2020).
- Gast, M.S. 802.11 ac: A Survival Guide: Wi-Fi at Gigabit and Beyond; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2013. [Google Scholar]
- Eady, F. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers; Elsevier: Amsterdam, The Netherlands, 2005. [Google Scholar]
- Cunche, M.; Kaafar, M.A.; Boreli, R. Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive Mob. Comput. 2014, 11, 56–69. [Google Scholar] [CrossRef] [Green Version]
- Cunche, M.; Kaafar, M.A.; Boreli, R. I know who you will meet this evening! linking wireless devices using wi-fi probe requests. In Proceedings of the 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA, 25–28 June 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1–9. [Google Scholar]
- Heaton, J. Introduction to Neural Networks with Java; Heaton Research, Inc.: Chesterfield, MO, USA, 2008. [Google Scholar]
- Biometrics. Available online: https://en.wikipedia.org/wiki/Biometrics (accessed on 17 June 2020).
- Freudiger, J. How talkative is your mobile device?: An experimental study of Wi-Fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 22–26 June 2015; ACM: New York, NY, USA, 2015; p. 8. [Google Scholar]
- Bernstein, D.J. ChaCha, a variant of Salsa20. Workshop Rec. SASC 2008, 8, 3–5. [Google Scholar]
- IETF. The Transport Layer Security (TLS) Protocol Version 1.2. Available online: https://tools.ietf.org/html/rfc5246#section-5 (accessed on 17 June 2020).
Category | Physical Characteristic |
---|---|
Antenna | Antenna Pattern Consistency |
VHT Link Adaptation | |
Multi-User (MU) Beamformer and Beamformee | |
Number of Sounding Dimensions | |
Beamformee STS Capability | |
Single-User (SU) Beamformer and Beamformee | |
Rx/Tx MCS Map | |
Data Rate | VHT Supported MCS Set |
LDPC | |
STBC | |
Bandwidth | Short GI for 80 and Short GI for 160 & 80 + 80 |
Supported Channel Width set |
Index | MAC Address | Device Tuple |
---|---|---|
1 | 3c:37:86:1a:e8:a8 | O:windows 7, C:MT7612U |
2 | 9c:e3:3f:dc:fa:cc | O:ios 12.1.2, C:BCM4361 |
3 | 50:3e:aa:bb:d9:ce | O:windows 7, D:tp-link 1030.22.202.2018, C:RTL8812BU |
4 | f4:0f:24:1b:3c:37 | O:macos 10.14.3, C:BCM43602 |
5 | 90:8d:6c:f3:cc:44 | O:ios 12.1.2, C:BCM4345 |
6 | 74:da:38:ee:1e:32 | O:windows 7, D:realtek 1030.21.302.2017, C:RTL8814AU |
7 | e0:dc:ff:d0:87:b7 | O:miui 10.3.15, C:WCN3998 |
8 | 74:da:38:98:89:cd | O:windows 7, D:tp-link 1030.22.202.2018, C:RTL8812AU |
9 | 10:5b:ad:83:aa:f1 | O:ubuntu 16.04, D:ath10k, C:QCA9377 |
10 | b4:6b:fc:f6:4c:fd | O:windows 10, C:Intel Dual Band Wireless-AC 8265 |
11 | 94:b8:6d:f4:39:bd | O:windows 10, C:Intel Dual Band Wireless-AC 1550 |
12 | 28:7f:cf:75:d0:e1 | O:ubuntu 16.04, C:Intel Dual Band Wireless-AC 9260 |
13 | 08:be:ac:03:90:04 | O:windows 7, D:Realtek 1024.2.618.2013, C:RTL8811AU |
14 | 04:f0:21:48:6d:2a | O:ubuntu 16.04, C:QCA9880 |
15 | 2c:fd:a1:ce:c1:d3 | O:windows 7, D:Broadcom 1.558.48.8 C:BCM4366 |
16 | 04:f0:21:49:07:51 | O:ubuntu 16.04, C:QCA9882 |
17 | 80:19:34:6c:f2:b9 | O:ubuntu 16.04, C:Intel Dual Band Wireless-AC 7260 |
18 | a8:5e:45:46:5f:63 | O:windows 7, D:Realtek 2023.28.115.2016, C:RTL8812AE |
19 | f8:28:19:6a:28:73 | O:ubuntu 16.04, C:BCM4350 |
20 | f0:03:8c:9a:2b:6b | O:windows 7, D:Broadcom 7.12.39.11, C:BCM4352 |
Device True Type | Device Predicted Type |
---|---|
10 | 13 |
11 | 10 |
18 | 8 |
Index | Precision | Recall | F1-Score |
---|---|---|---|
1 | 1.0000 | 1.0000 | 1.0000 |
2 | 1.0000 | 1.0000 | 1.0000 |
3 | 1.0000 | 1.0000 | 1.0000 |
4 | 1.0000 | 1.0000 | 1.0000 |
5 | 1.0000 | 1.0000 | 1.0000 |
6 | 1.0000 | 1.0000 | 1.0000 |
7 | 1.0000 | 1.0000 | 1.0000 |
8 | 0.9988 | 1.0000 | 0.9994 |
9 | 1.0000 | 1.0000 | 1.0000 |
10 | 0.9988 | 0.9988 | 0.9988 |
11 | 1.0000 | 0.9988 | 0.9994 |
12 | 1.0000 | 1.0000 | 1.0000 |
13 | 0.9988 | 1.0000 | 0.9994 |
14 | 1.0000 | 1.0000 | 1.0000 |
15 | 1.0000 | 1.0000 | 1.0000 |
16 | 1.0000 | 1.0000 | 1.0000 |
17 | 1.0000 | 1.0000 | 1.0000 |
18 | 1.0000 | 0.9988 | 0.9994 |
19 | 1.0000 | 1.0000 | 1.0000 |
20 | 1.0000 | 1.0000 | 1.0000 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gu, X.; Wu, W.; Gu, X.; Ling, Z.; Yang, M.; Song, A. Probe Request Based Device Identification Attack and Defense. Sensors 2020, 20, 4620. https://doi.org/10.3390/s20164620
Gu X, Wu W, Gu X, Ling Z, Yang M, Song A. Probe Request Based Device Identification Attack and Defense. Sensors. 2020; 20(16):4620. https://doi.org/10.3390/s20164620
Chicago/Turabian StyleGu, Xiaolin, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang, and Aibo Song. 2020. "Probe Request Based Device Identification Attack and Defense" Sensors 20, no. 16: 4620. https://doi.org/10.3390/s20164620
APA StyleGu, X., Wu, W., Gu, X., Ling, Z., Yang, M., & Song, A. (2020). Probe Request Based Device Identification Attack and Defense. Sensors, 20(16), 4620. https://doi.org/10.3390/s20164620