WiFi communication should be possible only between devices inside the same network. However, we find that all existing WiFi devices send back acknowledgments (ACK) to even fake packets received from unauthorized WiFi devices outside of their network. Moreover, we find that an unauthorized device can manipulate the power-saving mechanism of WiFi radios and keep them continuously awake by sending specific fake beacon frames to them. Our evaluation of over 5,000 devices from 186 vendors confirms that these are widespread issues. We believe these loopholes cannot be prevented, and hence they create privacy and security concerns. Finally, to show the importance of these issues and their consequences, we implement and demonstrate two attacks where an adversary performs battery drain and WiFi sensing attacks just using a tiny WiFi module which costs less than ten dollars.
翻译:WiFi通信应该只可能发生在同一网络内的设备之间。然而,我们发现所有现有的WiFi设备甚至会针对来自未经授权的WiFi设备发送的虚假数据包发送确认消息(ACK)。此外,我们发现未经授权的设备可以通过向WiFi无线电发送特定的虚假信标帧来操纵其省电机制并使其持续保持唤醒状态。我们对来自186个制造商的超过5,000个设备的评估证实这些是普遍存在的问题。我们认为这些漏洞是无法防止的,因此它们会带来隐私和安全上的问题。最后,为了展示这些问题的重要性及其后果,我们实现并展示了两种攻击方式,其中攻击者只需使用一款价值不到十美元的微型WiFi模块即可完成电池耗尽和WiFi感知攻击。