Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 5153265, 15 pages
https://doi.org/10.1155/2018/5153265
Research Article

SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists

1FESB, University of Split, Split, Croatia
2University Department of Forensic Sciences, University of Split, Split, Croatia

Correspondence should be addressed to Toni Perković; rh.tsinu@vokrepot

Received 15 March 2018; Revised 7 June 2018; Accepted 8 July 2018; Published 22 July 2018

Academic Editor: Mauro Femminella

Copyright © 2018 Ante Dagelić et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.

1. Introduction

Location privacy presents one of the most challenging problems in today’s mobile era. Modern mobile devices such as smartphones, tablets, or smart watches collect information from surrounding devices that can be used for Wi-Fi-based positioning systems [1]. In a similar fashion, these devices emit radio signals that can be used for localization and tracking by using, for example, cell tower trilateration [2]. Furthermore, Wi-Fi information transmitted from mobile devices can be used for indoor tracking and targeted services [36]. Many of these solutions base their services upon collecting a number of management frames (e.g., beacon, probe request, and probe response frames,) that are transmitted by devices, whose main purpose is to establish a fast and efficient connection during the authentication process.

A number of papers discuss various threats to user’s privacy based upon collected probe requests containing an Access Point’s (AP) Service Set Identifier-SSID [713]. Wi-Fi-enabled devices using Active Service Discovery broadcast these probe request frames aimed at the set of preferred APs to increase the connection speed. Such probe request packet contains an SSID of a previously associated AP stored in the device’s preferred network list-PNL (a complete list of previously associated APs), the MAC address of the mobile device, and some other information. Simply by observing these probe request packets, a potential attacker can learn a complete PNL, which raises serious privacy threats. As an example, we highlight SSID=Shelbourne Medical Clinic from a large amount of Wi-Fi traffic that we passively collected during a festival that attracts 50 000 people. This problem is highlighted by the fact that SSIDs can also be geolocated (e.g., by using a WIGLE service [14]) thus violating user’s location privacy.

To mitigate these privacy breaches made possible by active scanning (AS), the devices could use passive scanning (PS) technique whereby devices transmit no probe request packets but instead listen to beacon packets emitted from the APs. Unfortunately, compared to active scanning, this technique accomplishes slower connection times [15]. Besides direct probe mode, active scan also supports a broadcast probe mode where probe request packets hold an empty SSID field. All neighboring APs (including the ones in the device’s PNL) will answer the broadcast probe request. This mode is widely used in most of today’s Android-based mobile devices (Although a recent discovery showed that some Android devices transmit their PNL while being in low-power state with their screen turned off, it seems that Google was unaware of such vulnerability [16, 17]). Using this mode of operation, the attacker cannot learn more information about the user’s location history by simply observing broadcast probe request packets.

However, the mentioned broadcast probe mode does not protect the user from an active attack. One of the simplest methods to verify whether a user was connected to an AP in a specific location includes the creation of a rogue AP with that specific name (SSID) and identifier, i.e., by mounting a so-called Karma attack [18], verifying if the victim initiates a connection to it. In the recent work where Karma attack was performed, only a fraction of different SSIDs were considered, by using a dictionary containing a small number of the most popular APs that are found in the surrounding area (a popular café bar or a restaurant, etc.) [19]. Similarly, faking an AP has also been used in [20] by performing a simple dictionary attack on hidden SSID networks, using a Phyton library Scapy. However, as opposed to static environments in which users are at their homes and offices with laptops and desktop PCs, users with smartphones are usually mobile with their devices; hence the opportunity window for the attack can be very time limited. In contrast to existing work, in this paper we focus on greatly improving the attack’s performances. We want to find methods and techniques that will allow the attacker to query every SSID from as large as possible dictionary within the given opportunity window against a victim’s device. Moreover, we are interested in discovering nontrivial SSIDs, thus increasing the importance of disclosed SSIDs from user’s PNL.

Such form of a dictionary attack is universal to all devices that implement IEEE 802.11 standard, regardless of the active or passive scanning technique. The following contributions have been made:(i)We developed an analytical model for the SSID dictionary attack;(ii)We created a probing strategy that minimizes probing time of the complete SSID dictionary;(iii)We carried out extensive real-life tests and simulations to validate our model.

Additionally, an example SSID dictionary building algorithm is provided using a modified top-N recommendation algorithm [21] to reflect victim’s PNL.

The rest of the paper is organized as follows: in Section 2 we are defining the general attack setup and describing device behavior. Section 3 provides a comprehensive mathematical model for the attack strategy followed by Section 4, which provides an overview of the practical tests carried out on multiple devices alongside performed simulation and an example algorithm for building the dictionary. Finally, we cover related work and conclude in Sections 5 and 6.

2. System and Attacker Model

Regardless of the type of scanning technique (Active Service Discovery with or without an empty probe or Passive Service Discovery), in our model we assume that devices are periodically scanning for available APs as shown in Figure 1, whereby the scanning period is significantly shorter than the idle period when the device is not scanning for the available networks. The scan period depends on the device model, OS, settings controlled by the user, such as keeping Wi-Fi on/off during sleep mode [22], location services, and also general sensors’ activity (accelerometer, gyroscope), which might change the state of the device. Other features that can affect the periodic scanning behavior of Wi-Fi devices are determined by the activity of various services, such as if cellular data is turned on, or if the smartphone is in maintenance mode, or if the user is extensively using Internet. A comprehensive overview of measured scanning periods depending on the mentioned settings and scenarios can be found in [23].

Figure 1: SSID Oracle attack basic setup.
2.1. Periodic Wi-Fi Scan Intervals

Scanning periods in practice do change in length, either in fixed increases or exponentially. However, the scanning period tends towards repetition in the same length intervals, as can be seen from [23, 24]. The authors have tested various Apple and Android devices and the results have shown that all the devices end up scanning for Wi-Fi networks in fixed intervals. Periodic behavior was observed in various use cases for the victim (Wi-Fi settings screen, other screens, and display off). The authors in [23] have also concluded that these are fixed times depending on the victim’s device and operating system, which has also been observed in our tests. Furthermore, the periodical behavior can be actively provoked, and the required scanning/idle time durations can be measured by the attacker, as it will be described in the following subsection. Increasing the scanning frequency also increases the success rate of various Wi-Fi attacks/data analysis and has been noted by others before [25].

2.2. Increasing the Scanning Frequency

Although the model presented in this paper optimizes the performances for any given periodic scanning frequency, there are ways for the attacker to actively control the periodic behavior of Wi-Fi scanning intervals. For example, in our tests with smartphone devices, we showed that if the device is in sleep mode having cellular data enabled (e.g., with EDGE/3G/4G), simply by sending push notification to the victim (a WhatsApp/Viber message) we can induce the device to wake up and initiate a Wi-Fi scan. We have noticed that the device typically initiates the scan within from waking up. If cellular data is not enabled, we can also send an SMS to force the device to wake up from the sleep state.

We have observed that some devices, prior to going to sleep mode, scan for the neighboring APs with time periods that increase exponentially. Our initial brief analysis on iPhone 6s plus has shown another method to minimize the scan intervals for a device while being in sleep mode. By assuming that the device is connected to a known AP and continuously enabling iPhone to connect/force disconnect from the AP (e.g., by jamming a Wi-Fi channel), we can keep the device in a scan period, as opposed to double or triple values otherwise.

2.3. Threat Model

As depicted in Figure 1, two different timelines are present during the attack. The configuration of the device timeline is unknown to the attacker, and the attacker timeline is limited in length (the attack can be performed only within the Wi-Fi vicinity of the victim). The attacker is constantly faking APs using different SSIDs. The goal is to test as many unique SSIDs within the available time, using as much as possible of the match opportunity time during the device scan period. If the attacker gets a connection attempt from the device, for a fake AP, the attack is considered a success.

Although the basic idea seems quite straightforward, the attack presents a lot of different challenges. How does the attacker know when the match opportunity occurs? What is the scanning and idle period length? How good is the Wi-Fi communication channel? Which SSIDs should be tested? How do we maximize the number of unique SSIDs we can test?

In the following section, we will answer these questions and describe the SSID Oracle attack.

3. Modeling the Problem

This section introduces a comprehensive mathematical model that depicts a general SSID attack. We begin with modeling the problem, after which we introduce the SSID Oracle attack accompanied by various attack variations and optimization techniques.

The proposed general model depicts a simple question: how can an adversary recover (at least one) SSID from the user’s PNL and thus his previous whereabouts. The theoretical model comprises various SSID attacks scenarios, ranging from well-known passive sniffing to active attacks in which an adversary performs the attack with rogue access point or even advanced brute force attacks to user’s PNL.

Before we pursue the detailed description of the attack, let us denote the following notation used to describe the location privacy game. First, we denote a targeted user’s preferred network list (PNL) with , unknown by the adversary prior to the attack. denotes a dictionary list of (nontrivial) SSIDs prepared by to be tested. has a limited time period to execute the attack, so needs to contain SSIDs which are highly likely to be present in . A confirmation that an SSID from is successfully tested to be present in is denoted with a . has a goal of achieving a , under assumption that holds.

Definition 1. We define success probability   as the probability that the adversary performs a successful location privacy attack and learns at least one SSID from :

As can be seen, the success probability of the attacker can be denoted as a product of two probabilities. Conditional probability denotes the probability in which observes a hit (a successful query), meaning that condition holds. Probability is responsible for building a good quality dictionary for the targeted victim such that the condition holds. Since the available opportunity window for is time limited, potential attack’s performances need to be optimized alongside having a quality dictionary.

There is a wide range of different strategies for revealing user’s PNL (e.g., ranging from blind guessing to even physically reading off the user’s screen). Some devices in Active Service Discovery mode are transmitting the complete unencrypted PNL list to quickly establish a connection to a previously associated APs [17]. For gathering unencrypted probe request packets represents a trivial problem for revealing and will not be discussed any further in our work. Our model assumes that devices are periodically broadcasting empty probe requests or are passively scanning for APs. As we describe further in this paper, all Wi-Fi devices using active or passive service discovery are vulnerable to our attack.

3.1. Defining SSID Oracle

Recall, to verify that the victim’s device holds an within its preferred network list , that the adversary can mount a rogue access point holding that specific SSID (i.e., by using the Karma tool [18].). If confirms that the user initiated a connection, he concludes that the is a part of the victim’s PNL list ().

Definition 2 (SSID Oracle). We denote victim as a binary response SSID Oracle . When fakes an , he is querying for a binary outcome. If , then returns a positive outcome; otherwise does not respond. We denote the following notation:

In our attack responds to queries only during the scanning period (Figure 1, match opportunity) and will respond with a positive outcome only in the case that the queried SSID is within its . No response is considered to be a negative outcome. However, the success rate of querying is subject to channel quality, which can potentially cause false negatives. In case of a low channel quality, the attacker cannot tell whether the cause for no response is or the victim did not receive the query.

If would respond to every query and the match opportunity would span during the entire attack time uninterrupted, our work would be much simpler, as we would only have to manage the problem of building a good quality SSID dictionary and test every SSID from that list one by one. A similar approach has already been covered by many papers describing dictionary or brute force attempts on password cracking [19, 26].

Since in our model the attacker does not actually know when that match opportunity period occurs (we assume the worst case scenario in our model with passive scan, as measured for iOS 10) and is subject to channel quality, it is necessary to create a model/algorithm that will allow the attacker to test every SSID at least once with as high probability as possible, within the match opportunity window.

3.2. SSID Oracle Attack

Independently of the type of scanning technique (Active Service Discovery with or without an empty probe request or Passive Service Discovery) in our model the Wi-Fi scan occurs periodically every seconds (idle period in between scans) and lasts only for a short scanning period of , such that .

Figure 2 describes the general trade-offs that we face when executing SSID Oracle attack. As mentioned at the beginning of this section, to succeed in the location privacy game the adversary would have to create a dictionary of (nontrivial) SSIDs that hold at least one SSID from . A simplest solution would be to increase the dictionary size so that the probability of finding at least one SSID approaches 1. This can be clearly seen from Figure 2, where the shape of the curve depends on different approaches to building . Our goal is to test SSIDs having a higher chance of being in first, so will grow faster for small with tendency of becoming linear for large . One such example approach on building dictionaries based on recommendation algorithm is described in Section 3.5. However, dictionary size depends on the opportunity window , the time available for the attacker to execute the attack (Figure 1). If we take into account the fact that adversary sends SSIDs (e.g., beacons) at maximum rate , we can denote with slot a discrete time period in which one from is sent to the Oracle (victim’s device) within period. Since is the only valuable time period for to conduct the attack, the maximum available number of time slots for the attacker within opportunity window equals . For this reason, the dictionary size tested on satisfies the following condition: . As the dictionary size increases, the required time for the attacker to test all SSIDs increases, so the conditional probability drastically decreases.

Figure 2: Conditional chance and dictionary quality in comparison to the size of dictionary .

Another observation shows just how big of an impact has on the attack. If we assume that idle time is zero (), the victim’s device would be constantly scanning the Wi-Fi channel. can then create such that the dictionary size equals the maximum number of time slots available in (). could easily test many more SSIDs from the dictionary against the victim’s device within (by taking into account the fact that all queries arrive to the Oracle (there are no collisions in Wi-Fi channel) and that there are no retransmissions.).

In our model, we do not know when or occurs, just a measurement of their lengths. To be able to execute the attack, despite not knowing when a new scanning period starts, a logical solution (intuition) would be to create small chunks of size testable slots, fill them with SSIDs from , and retransmit chunks for the duration of time period until we are convinced that received all queries from the chunk at least once. After the chunk retransmission time , sends the following chunk containing another slots. The proposed method is described in detail in Figure 3.

Figure 3: Attacker and victim timelines.

The attacker strategy can be described by using the following triplet , , and :

Our goal is to find the optimal strategy which will result, given the available time period (opportunity window), in the best SSID Oracle attack execution:

The following sections focus on defining . We start by discussing and defining and parameters which affect the efficiency of attack execution. Later in Section 3.5 an example method for defining and building a good quality is presented.

3.3. Finding Optimal Parameters and

As we mentioned in the previous section, chances of making Oracle respond to a query with a positive answer depend on multiple parameters, out of which some are predetermined by the Oracle (smartphone) implementation (i.e., periods , ), while some are controlled by the adversary (i.e., dictionaries , , and ). In this section, our goal is to find the optimal parameters for the chunk size and chunk retransmission time period . Recall from Figure 3 that it is necessary to find a strategy that guarantees (with high probability) that every from the chunk of size hits the scanning interval .

Let us consider the scenario in which the attacker is omniscient; i.e., knows the exact moment at which initiates the search for neighboring SSIDs. Since knows when scan initiates and also its duration , he can adapt the attack transmission start time towards at maximum rate , as can be seen in Figure 4-I. Now we can easily conclude that the maximum number of unique slots that can fit into equals to (recall that denotes a rate at which chunks are transmitted). Due to the fact that during the period the Oracle cannot receive any query from , we can denote as a single chunk , i.e., . Now, referring back to our attacking model (Section 2), is not omniscient and cannot actually know when starts; therefore it is necessary to find such a strategy that the complete finds period.

Figure 4: Choosing optimal chunk transmission time T.

Please observe from Figure 4 that since the intervals are periodically repeating, the easiest solution for would be to retransmit chunks towards left and right (Figure 4-II) and expand them until it reaches the expansion of chunk on the left and chunk on the right (Figure 4-III). How does this help the attacker? Figure 4-IV shows that since chunk retransmission period equals and , regardless of when period actually occurs, the complete chunk is still going to hit the appropriate scanning period , with . The zoomed sections in Figure 4, A (in case of all-knowing scenario) and B (in case of any other scenario), show that the same unique SSIDs contained in chunk will overlap the scanning period in both cases.

For this reason the optimal chunk size equals the number of slots that can fit in the scanning period :

whereas the optimal time interval to retransmit chunk equals the sum of and :

Given the attacker’s opportunity window , we can calculate the maximum number of unique testable slots for our strategy :

We have shown that by using optimal we can achieve the same number of slots compared to the omniscient we started this discussion from, although the actual attacker cannot tell the exact moment at which initiates .

The following conclusion sums up our observations so far: when defining , execution of SSID Oracle attack with parameters (5) and (6) will maximize the available number of unique slots  .

However, in low channel quality conditions there is always a chance that query sent from does not get to . If we have a hit ( responds to a query with positive outcome), there is a chance that the response does not get to , so we are introducing a new parameter-probability that SSID Oracle successfully receives and responds to a query.

For this reason it may not be optimal to fill all the slots with unique SSIDs; thus the size of the dictionary might have to decrease even further.

3.4. Matching Dictionary to Slots

In previous sections we carried out the analysis of proposed model in good quality channel environments (). We have shown that the optimal chunk retransmission time is the period , while the chunk size equals the number of queries that can fit the scan interval . In this scenario, was equal to the maximum number of testable slots within .

However, what can be done in scenarios of low quality channel ? In such scenarios, not all slots that attacker sends within scan period will be received by , the same way the responses sent by (in case we have a hit) will not be received by (all these parameters depend on attacker’s Wi-Fi card quality, victim’s Wi-Fi card quality, channel quality, distance from the attacker and the victim, etc.). To be more precise, in low quality channel conditions it could be better to retransmit SSIDs that have a larger probability of occurrence in the victim’s PNL list, rather than to transmit different SSIDs for a given .

Let us use to denote the set of all SSIDs known by , whereas not all s from have the same probability of being part of the victim’s PNL list . Our goal is to maximize thus finding the optimal to be tested within window of opportunity . The event of a successful test, with a positive result, is denoted by . To find the best , has to use different tools (such as the example recommender system found in Section 3.5) to assign a chance that an SSID contained in is also contained in the victim’s PNL. For this purpose, we are introducing a new subjective probability parameter assigned to every SSID in and calculated by .

Recall that we denote with slot a discrete time period in which one is sent to the victim’s device within period. It is our goal to determine the number of slots every SSID in should take:

In order to characterize , we proceed as follows:

The dictionary quality equation part of (11) resolves to

Attack execution equation part of (11) resolves to

where (1) follows from , whereas latter part of the equation in our case is equal to 0 () and (2) comes the under assumption that Oracle queries are mutually independent of each other (sum of probabilities). Please note that due to burst effects in Wi-Fi channel [27] we may not always face such scenario, since there is a chance that consecutive Wi-Fi packets are more likely to fail to transmit if previous packets also failed. Given the premises and we can see that different slots are being tested couple of seconds apart, meaning that different chunks are not subject to the same error burst. In case of retransmitting SSIDs, we use interleaving to tackle the error burstiness.

We are now ready to set the optimization problem, whose solution will give the required parameters . Please note that the SSID Oracle attack requires , but we are using linear optimization to solve the optimization problem. To execute an attack, it is required to round calculated from our model, as will be shown in simulations later.

We approach the optimization problem (14) using Lagrange multipliers method. Objective function has unique solutions based on its concave nature.

Lemma 3. The relation between SSID subjective correctness probability , channel quality , and number of testing attempts for every SSID is

As can be seen from (15) and Figure 5, for good channel (), the attacker does not significantly increase his hit chance by retransmitting SSIDs with higher probability of occurrence. On the other hand, a bad channel () brings up the importance of having a good SSID dictionary generator algorithm.

Figure 5: Transmission attempts difference as a function of channel and SSID quality (based on Lemma 3).

Theorem 4. SSID Oracle attack execution strategy should be achieved by picking and parameters. The optimal execution strategy maximizes the number of unique testable slots . When matching to , the condition must be fulfilled to achieve the best attack performance in case of a poor quality channel .

In the next subsection, we will introduce an example dictionary creation method, based on top-N recommendation algorithm, which can provide us with the required SSID importance parameters .

3.5. Building a Dictionary

In this subsection we introduce an example dictionary generation algorithm, based on a recommendation algorithm. We will only briefly cover the approach and later provide the experimental results in Section 4.3. Please note that there can be multiple different dictionary creation approaches, depending on the information the attacker has on the potential victim. One goal could be to gather as many pairs of Wi-Fi MAC address and SSID to do statistical analysis of a crowd (similar work to many papers mentioned in our related work). In that case, having a more general dictionary is the best approach. Another goal could be the deanonymization of a specific person or a group by linking the victim to his MAC address. In that case, the dictionary should be prepared for that specific scenario, containing related SSIDs from victims neighborhood. Nevertheless, our SSID Oracle attack strategy will maximize the potential successful outcome for any provided dictionary.

In order for the attack to be successful, the dictionary has to be(i)compact: the size of the dictionary should be small enough so that performing the attack is feasible in reasonable time(ii)precise: the dictionary should reflect victim’s PNL as much as possible (contain as many SSIDs that are in the user’s PNL as possible)

The method we used for building a dictionary for the attack is based on collaborative filtering, namely, a modified version of Item-based top-N recommendation algorithm as seen in [21, 28]. It outputs a list of recommended items that user might prefer/consume/buy/visit based on the current knowledge of user’s preferences/history and the knowledge of preferences/history of other users (training dataset). Cosine based similarity has shown to produce the best results.

After building a list of recommended SSIDs for each test user, it is compared with the original PNL and the hit-rate (HR) is calculated:

An HR value of indicates that the algorithm was always able to recommend the hidden item, whereas an HR value of indicates that the algorithm was not able to recommend any of the hidden items [21].

Our algorithm uses two parameters which affect the effectiveness of the modified recommender system. The number of similar SSIDs we want to store for each SSID in the learning process is denoted by . The growth of the exponential equation used for calculating the importance of SSID repetition in the training set data is controlled by parameter .

In the next section we will perform various SSID Oracle attacks using our setup.

4. Practical Tests and Simulations

In this section we present the performed practical tests, simulations, and an example dictionary creation algorithm based on top-N recommendation algorithm. The achieved results have been compared with the appropriate parts of our model.

4.1. Experimental Analysis of Chunk Size and Retransmission Time

Extensive tests have been carried out to show the effectiveness of SSID Oracle attack and correctness of chunk size and retransmission time period optimal parameters on tests with real devices and in real-world scenarios. To be more precise, our tests were based on a modified Airbase-ng tool on Ubuntu machine equipped with D-Link DWA-556 Wireless N PCI-E Desktop Adapter placed in monitoring mode used to “… encourage clients to associate with the fake AP”[29]. We slightly modified Airbase-ng in a way that sends beacon packets from a predefined chunk of fixed size , while it does not reply to any authentication request packets (nor probe request packets). Beacon packets were sent only on a single Wi-Fi channel (Wi-Fi channel 1 on in our scenario). To accomplish focusing on a specific Wi-Fi channel, in parallel with Airbase-ng we used Airodump-ng tool. On the other hand, to capture authentication requests, we also ran tshark, filtering out sought authentication request packets. Every test chunk holds one SSID from , i.e., . For different chunk sizes () performed in our tests we transmit beacon packets from chunk for consecutive seconds (). Interestingly, a similar test with multiple APs was implemented using Airbase-ng tool in [19], but the authors had problems with handling large number of SSIDs, so they limited their attack to a smaller number of SSIDs, i.e., 5 SSIDs, which is significantly smaller than our SSID Oracle attack with chunk sizes up to 100 APs (and even more). We repeated this test times for each fixed period and chunk size . It is also important to note that since can appear uniformly at random within (Figure 3), a random delay between two consecutive tests was induced. To enable shorter periodic scanning behavior (periods ), smartphone’s screen is powered ON and the default Wi-Fi finder program is opened in every test. This was done solely for practical reasons since running experiments for higher scanning intervals, e.g., “Display off" as mentioned in Section 2.1, would take too long (Figure 7 experiments alone had been running for a month).

Figure 6 shows the test results were carried out at Samsung Galaxy 3, Sony Xperia X8, LG P350, and Samsung S5 Mini devices. The dotted lines present success rate of response reception to query for various parameters of chunk retransmission period and a fixed chunk size . It is interesting to observe that for small transmission periods there is a small chance that the Oracle responds with a success (a ). Since idle period is larger than and given that the start of transmission period starts uniformly at random within , for small there is a high probability that attacker transmits a query within idle period. By increasing the chunk retransmission period the success rate increases rapidly up to a point . Note that this period is not equal for all devices; i.e., for Samsung Galaxy 3 it was and for Sony Xperia X8 it was approximately , while LG P350 was . Indeed, in an additional study the time period between two consecutive probe packets corresponded to these intervals (in Active Service Discovery, when devices initiate the scan for neighboring APs on a specific Wi-Fi channel, they send a burst of probe request packets [30]). Moreover, it is important to note that chunks were sent on a single Wi-Fi channel (Wi-Fi channel 1 in our case). Therefore, the effective scanning interval corresponds to the scanning interval of a single channel (if we eliminate the possibility of capturing communication on non-overlapping channels), which approximates to . Interestingly, we can see in Figure 6 that the best results for success rate were indeed achieved for chunks sizes of . Please note that since in our tests every beacon packet was sent approximately every (), sending the complete chunk will take the exact amount of time that corresponds to the scan interval of of a smartphone device (). We can also observe the impact of imperfect Wi-Fi channel where Oracle does not reply to all queries successfully, although and ; i.e., the success rate is not but instead approximates to . In Table 1 we give detailed results for periods , , and the probability for every tested device.

Table 1: Scanning and idle intervals for test devices.
Figure 6: Model comparison with test results for different devices and chunk sizes, using .
Figure 7: Comparison of our model with experimental results on Sony Xperia miro for .

To verify the correctness of experimental results we also developed a mathematical model depicting the hitting probability for SSID Oracle attack—the probability that the attacker observes a , given that the observed chunk holds at least one from (). We evaluate this probability as a function of parameters and and rate controlled by the , and parameters and given by Oracle’s specification, as well as the channel quality . Our model also assumes that the chunk transmission time starts uniformly at random within the period and that the sought is also placed uniformly at random within the observed chunk . In our analysis (see Appendix A) we obtain the expression for probability which is solved numerically.

The experimental results, along with the numerical ones, are shown in Figure 6. As we can see from the figure, the model quite accurately predicts the probability for parameters given in Table 1. We also carried out extensive tests with Sony Xperia miro device and presented them with confidence interval. For every chunk transmission period we carried out 10000 tests, while the chunk size was . The experiments give us the values for , while . By plugging these values into our model (Appendix) we can see that our model quite accurately predicts the probability (Figure 7).

As mentioned before, our experiments were conducted in an area where other Wi-Fi devices were also transmitting, so there has been some interference present. To try to get almost perfect Wi-Fi conditions () we did another test in a controlled and clean environment with no other devices transmitting in Wi-Fi band. The success rate of almost a 100% has been achieved on the device for , as can be seen from Figure 8.

Figure 8: Achieved results for channel quality .
4.2. Retransmission Simulations for Low Quality Channel Conditions ()

In order to show the effectiveness of SSID Oracle attack in low quality channel conditions (), we implemented a simulator in MATLAB. The simulator gives us a good understanding about SSID retransmissions (testings) under low quality channel conditions, thus allowing us to manipulate various parameters, from the quality of the dictionary (the probability of every being part of victim’s PNL list), up to the number of testings of a single SSID (SSID retransmissions in different chunks). For the purpose of our simulator we used the following variables: , , , , and . Every point in the results was simulated 200 000 times.

Example 5. In this example we verify the effect of retransmitting (testing) SSIDs multiple times. By retesting an SSID multiple times, th SSID from fits more than one slot (has more than one chance of a ) within the Oracle’s period. Since the number of available is limited in , this also means that testing one SSID more than once results in not having available slots intended to test all SSIDs in . Simulator test dictionary contains SSIDs assigned with corresponding probabilities contained within user’s PNL list (normalized to ). Please note that SSIDs in are ordered according to the descending probabilities (), such that SSID with higher probability will be tested first. In our example, dictionary contains 6000 SSIDs. Figure 9 shows the cumulative probability distribution of SSIDs within . We can observe that , whereas if we observe the complete dictionary of 6000 SSID we will have . Therefore, with a quality dictionary, in scenarios with low channel quality, an attacker will test those SSIDs having a higher probability of occurrence in at the cost of not testing SSIDs having a lower probability of occurrence.

Figure 9: Cumulative probability distribution in test dictionary.

Figure 10 presents the achieved test success rate for various channel qualities . The available transmission time allows us to attempt tests for 6000 slots (). Simulation will test the first SSIDs twice (), which have a higher probability of occurrence in , at the cost of not testing the least significant SSIDs. The goal is to observe how this exchange affects the overall hit success rate for different channel qualities. The following holds:

Figure 10: Success rate for different channel quality when swapping SSIDs in test dictionary.

The importance of finding a method/algorithm for building a quality dictionary for targeted users was pointed out in Figure 10 and Table 2, especially in the scenarios with low channel quality. More precisely, by reducing the dictionary by and giving the opportunity to (re)test first SSIDs twice (), we achieve an overall increase in probability of hit of up to 35.07% and 20.29% for channel qualities and , respectively. On the other hand, by incrementing for good quality channels, the overall success rate decreases, since the actual dictionary to be tested now decreases to the size of , thus not giving an opportunity to test SSIDs with lower probability within the initial dictionary .

Table 2: Achieved increases in Simulation 1.

Example 6. In the following example we verify, both through simulations and theoretically, the optimal number of slots assigned to the first SSIDs in scenarios with different channel quality that would maximize the probability of hit. We use the following properties for our model: , , , and . Simulation is performed for values.

The results can be found in Figure 11 and Table 3. Indeed, from the results we can see that the estimated maximum number of slots assigned to the first SSIDs corresponds to the ones obtained through simulations. We also show that it pays off for to re-test SSIDs with high probability of occurrence at the expense of not testing the ones with low probability of occurrence. As expected, the highest increase in the hit probability will be obtained during the lowest channel quality .

Table 3: Optimal values for Simulation 2.
Figure 11: Success rate for different channel quality and SSID repetitions .

In the next section, we approach the problem of building a good quality dictionary for the targeted user, i.e., a dictionary in which a probability of occurrence of the first SSIDs within victim’s PNL list will be high.

4.3. Dictionary Creation Results

In this section we will present the achieved results based on the top-N recommender system algorithm we discussed in Section 3.5. For testing the performance of the system we collected users’ PNLs from Apple devices, mainly from the visitors of a big music festival in our country. users (different MAC addresses) were collected and SSIDs, with total of MAC-SSID pairs (average PNL size of ). Another interesting starting dataset is also provided by the authors of [31] where SSIDs were gathered on multiple locations in Rome, Italy.

To get more accurate and statistically valid results, instead of doing one test experiment, a 10-fold cross-validation method is used where the dataset is divided into partitions and in each of 10 folds (reruns of the experiment) one partition is used as test set and the rest as training set. The final hit-rate (HR) is calculated as the average of hit-rates for all folds.

It is also possible to optimize the performance of the system by running cross-validation with different parameters of the system and pick the set of parameters which produce the best result [32]. Different similarity functions are also tested (cosine based or conditional probability based). The results are shown in Table 4.

Table 4: Cross-validation hit-rate for different parameters for .

We see that the best results can be obtained by setting and , even though the system is quite stable on parameters variations. To show how well the system performs on our dataset in comparison with other (benchmark) datasets, we have compared the results of our experiments with the ones done in [21] (which are modified to fit the classical recommender scenario), and showed the results in Table 5.

Table 5: Performance comparison with other datasets.

Clearly the performance is comparable with datasets from the classical scenario of recommender system usage (despite the fact that the density of our dataset is quite low), which justifies its application here as well. There are other possibilities of making and improving dictionary which can be taken into consideration in future work, like including human knowledge, categorizing people by their preferences/life habits, or applying additional rules for specific scenarios.

5. Related Work

A lot of work covers the location privacy problem for devices disclosing their PNL. Numerous papers focus on the IEEE 802.11 connection scanning and initialization protocols: AS, AS with broadcast, or PS [16, 24, 33, 34]. Those papers are relevant for our research as it covers scanning and idle times and showcases the tendency for the periodical Wi-Fi scans. LAPWiN proposes a location based protection mechanism to protect one from privacy leaks [30]. Such protection mechanism would directly mitigate the kind of privacy attack we are attempting; however that standard has not been implemented by the Wi-Fi card manufacturers yet. The authors in [23] are using Wi-Fi behavior to do aerial search and rescue operations. The authors are monitoring probe request packets using equipment mounted on drones in order to detect the location of a user during the search and rescue operation.

Others focus on making conclusions about a user from their PNL. Signals from the crowd [7] uses gathered SSIDs to discover user’s country of origin, device manufacturer, and other, as is [8, 9, 35]. SSIDs in the Wild [36] are mapping SSIDs to real-world locations, and [10] finds social relation between users by matching PNL. WiFiPi [11] tracks user movement at mass events using a combination of MAC address and SSIDs, using a deployed sensor network.

Linking a MAC address gathered from a Wi-Fi packet to an actual person (MAC de-anonymization) appears to be challenging. Reference [26] uses beacon reply attack and fakes user’s known SSIDs to trigger his phone to connect, thus doing a MAC address matching. Beam me up, Scotty [37] has an interesting approach to Wi-Fi assisted geo location where they fake an AP from another location causing services like Twitter to display the fake location as the origin of a tweet. The authors in [38, 39] showcase an entire network of sensors doing location privacy attack in the city of London gathering data on users movements and whereabouts.

To complicate tracking and privacy leaks, user equipment manufacturers have started using MAC address randomization. However, the authors in [19, 40, 41] showed that randomizing MAC address does not increase privacy, as the devices are sending probe requests that contain APs from the PNL, proving that privacy protection is indeed a considerate issue for the manufacturers.

The related work mentioned in this section so far focuses on passive monitoring of probe requests and various conclusions one can deduce from gathered PNLs. The devices using active scanning with broadcast packets or passive scanning are not vulnerable to passive monitoring, so an active attack is needed.

The attempt at actively faking an AP and thus revealing user’s PNL has not been researched in detail, to the best of our knowledge. Active attacks on user’s PNL have been mentioned in some previous work [19, 26] where the authors are mounting fake APs containing user’s known SSID in order to provoke connection initiation from the victim with the goal of revealing their real MAC address. Considering that such active attack was not the main focus of their work, the authors have concluded from their experiments that in practice one can test only a small number of different SSIDs. Our work however was focused on optimizing the active attack, where we have shown that depending on scanning and idle periods of the Wi-Fi enabled device and the size of the opportunity window, it is possible to test dictionaries more than 10 times bigger in size.

6. Conclusion

In this paper we propose an attacking strategy to extract victim’s preferred network list from a mobile device while the device is in Active Service Discovery mode with broadcast scan, or passive scan mode. We introduced the SSID Oracle attack that queries a set of SSIDs from a dictionary against the victim’s device by faking APs. We calculated the optimal parameters for the attack execution and proposed a detailed mathematical model depicting the attack.

The model has been confirmed by running extensive tests on different smartphone devices. Furthermore, we also created a simulator to cover more complex attack scenarios with low Wi-Fi channel quality.

Since users are mobile with their devices, the attacker’s opportunity window is quite small and the attack depends on having SSIDs which are highly likely to be present in victim’s PNL. For that reason we also proposed an example recommender system based algorithm for building a high quality dictionary. We have concluded that by choosing the right dictionary and by executing the attack using our model, it is possible to achieve high probability of success when attempting to disclose an SSID from victim’s PNL.

For future work we plan to work on finding solutions that can protect against SSID Oracle attacks. One solution would be to use Geofencing technique in which the device will only respond to probes for APs which are both known and geographically nearby. We plan to further research dynamic tracking and other aspects of Wi-Fi network traffic.

Appendix

A. Mathematical Excerpt

A.1. Hit Chance as a Function of and

The goal of this subsection is to find a mathematical model describing in order to compare it with performed tests, given that the observed chunk holds at least one from . We will be breaking the chunk retrasmission interval to multiple smaller intervals and each of those intervals to multiple smaller intervals so that they are easily solvable. Dictated by the fact , parts of the equation can then be ignored.

Separate interval solutions follow the general expression for a negated probability that none of tracked SSID’s transmitted during period is caught: . Since one chunk contains one tracked SSID, also corresponds to the number of fully transmitted chunks during active scanning.

For each interval the following holds:

Note that having means that during the interval no slots will be tested. Also note that having means that . We will now move to solving each interval:

(1)  

(2)  

(3)  

(4)  

(5)  

Data Availability

In the manuscript, we have described the algorithms as well as the methods we used for collecting and testing the dataset. However, the collected data would violate the privacy of end users and should not be made publicly available.

Disclosure

Bojan Vujatović is now at Google DeepMind, London, UK.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. “Hybrid positioning,” accessed: 2017-02-28 https://en.wikipedia.org/wiki/Hybrid_positioning_system.
  2. “Cell tower trilateration,” accessed: 2017-02-19 https://wrongfulconvictionsblog.org/2012/06/01/cell-tower-triangulation-how-it-works/.
  3. N. Marques, F. Meneses, and A. Moreira, “Combining similarity functions and majority rules for multi-building, multi-floor, WiFi positioning,” in Proceedings of the International Conference on Indoor Positioning and Indoor Navigation (IPIN '12), pp. 1–9, Sydney, Australia, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. R. F. Brena, J. P. García-Vázquez, C. E. Galván-Tejada, D. Muñoz-Rodriguez, C. Vargas-Rosales, and J. Fangmeyer Jr., “Evolution of Indoor Positioning Technologies: A Survey,” Journal of Sensors, vol. 2017, Article ID 2630413, 21 pages, 2017. View at Publisher · View at Google Scholar
  5. J. Duque Domingo, C. Cerrada, E. Valero, and J. A. Cerrada, “Indoor Positioning System Using Depth Maps and Wireless Networks,” Journal of Sensors, vol. 2016, Article ID 2107872, 8 pages, 2016. View at Publisher · View at Google Scholar
  6. L. Sun, S. Chen, Z. Zheng, and L. Xu, “Mobile Device Passive Localization Based on IEEE 802.11 Probe Request Frames,” Mobile Information Systems, vol. 2017, Article ID 7821585, 10 pages, 2017. View at Publisher · View at Google Scholar
  7. M. V. Barbera, A. Epasto, A. Mei, V. C. Perta, and J. Stefa, “Signals from the crowd: Uncovering social relationships through smartphone probes,” in Proceedings of the 13th ACM Internet Measurement Conference, IMC 2013, pp. 265–276, Spain, October 2013. View at Scopus
  8. A. Di Luzio, A. Mei, and J. Stefa, “Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, San Francisco, CA, USA, April 2016. View at Scopus
  9. M. Cunche, M.-A. Kaafar, and R. Boreli, “Linking wireless devices using information contained in Wi-Fi probe requests,” Pervasive and Mobile Computing, vol. 11, pp. 56–69, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Cunche, . Mohamed Ali Kaafar, and R. Boreli, “I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests,” in Proceedings of the 2012 IEEE Thirteenth International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), pp. 1–9, San Francisco, CA, USA, June 2012. View at Publisher · View at Google Scholar
  11. B. Bonné, A. Barzan, P. Quax, and W. Lamotte, “WiFiPi: involuntary tracking of visitors at mass events,” in Proceedings of the IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '13), pp. 1–6, Madrid, Spain, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Chernyshev, C. Valli, and P. Hannay, “On 802.11 access point locatability and named entity recognition in service set identifiers,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 584–593, 2016. View at Publisher · View at Google Scholar
  13. F. Zhao, W. Shi, Y. Gan, Z. Peng, and X. Luo, “A localization and tracking scheme for target gangs based on big data of Wi-Fi locations,” Cluster Computing, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  14. “Wireless Geographic Logging Engine,” accessed: 2017-02-28, https://wigle.net/.
  15. “What are Active and Passive scanning,” accessed: 2017-02-28, http://www.wi-fi.org/knowledge-center/faq/what-are-passive-and-active-scanning.
  16. J. Freudiger, “Short: How talkative is your mobile device? An experimental study of Wi-Fi probe requests,” in Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015, June 2015. View at Scopus
  17. N. Sidiropoulos, M. Mioduszewski, P. Oljasz, and E. Schaap, “Open Wifi SSID Broadcast vulnerability,” SSN Project Assessment, 2012. View at Google Scholar
  18. “Karma tool,” accessed: 2017-02-19, https://www.offensive-security.com/kali-linux/kali-linux-evil-wireless-access-point/.
  19. M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, “Why MAC address randomization is not enough: an analysis of Wi-Fi network discovery mechanisms,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 413–424, ACM, Xi'an, China, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. V. Ramachandran, “Scapy: Dictionary Attacks on Hidden SSID Networks,” accessed: 2017-02-19, http://www.pentesteracademy.com/video?id=471.
  21. M. Deshpande and G. Karypis, “Item-based top-N recommendation algorithms,” ACM Transactions on Information and System Security, vol. 22, no. 1, pp. 143–177, 2004. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Jamil, A. Basalamah, S. Khan, and A. Lbath, “Classifying smartphone screen ON/OFF State Based on WiFi probe patterns,” in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, pp. 301–304, Germany, September 2016. View at Scopus
  23. W. Wang, R. Joshi, A. Kulkarni, W. K. Leong, and B. Leong, “Feasibility study of mobile phone WiFi detection in aerial search and rescue operations,” in Proceedings of the 4th Asia-Pacific Workshop on Systems, APSys 2013, Singapore, July 2013. View at Scopus
  24. X. Hu, L. Song, D. Van Bruggen, and A. Striegel, “Is there WiFi yet? How aggressive probe requests deteriorate energy and throughput,” in Proceedings of the ACM Internet Measurement Conference, IMC 2015, pp. 317–323, Japan, October 2015. View at Scopus
  25. Pieter Robyns, Bram Bonné, Peter Quax, and Wim Lamotte, “Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices,” Security and Communication Networks, vol. 2017, Article ID 6235484, 21 pages, 2017. View at Publisher · View at Google Scholar
  26. M. Cunche, “I know your MAC address: targeted tracking of individual using Wi-Fi,” Journal of Computer Virology and Hacking Techniques, vol. 10, no. 4, pp. 219–227, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. G. Shi and K. Li, Signal Interference in WiFi and ZigBee networks, 2017, accessed: 2017-02-19, https://books.google.hr/books?id=rAFSDQAAQBAJ.
  28. B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Item-based collaborative filtering recommendation algorithms,” in Proceedings of the 10th International Conference on World Wide Web (WWW '01), pp. 285–295, ACM, New York, NY, USA, 2001. View at Publisher · View at Google Scholar
  29. Aircrack, “Aircrackng,” accessed: 2017-02-19, https://www.aircrack-ng.org/.
  30. Y. S. Kim, Y. Tian, L. T. Nguyen, and P. Tague, “LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks,” in Proceedings of the 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 427–435, USA, October 2014. View at Scopus
  31. M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa, “CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10),” Sep. 2013, Downloaded from https://crawdad.org/sapienza/probe-requests/20130910.
  32. Abu-Mostafa, S. Yaser, Magdon-Ismail, Malik, Lin, and Hsuan-Tien, “Learning From Data,” in AMLBook, 2012. View at Google Scholar
  33. N. Sidiropoulos, M. Mioduszewski, P. Oljasz, and E. Schaap, Open Wifi SSID Broadcast vulnerability, 2012.
  34. K. Sethom and H. Afifi, “Requirements and adaptation solutions for transparent handover between wifi and Bluetooth,” in Proceedings of the 2004 IEEE International Conference on Communications, pp. 3916–3920, France, June 2004. View at Scopus
  35. A. E. Redondi and M. Cesana, “Building up knowledge through passive WiFi probes,” Computer Communications, vol. 117, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  36. S. Seneviratne, F. Jiang, M. Cunche, and A. Seneviratne, “SSIDs in the wild: Extracting semantic information from WiFi SSIDs,” in Proceedings of the 2015 IEEE 40th Conference on Local Computer Networks, LCN 2015, pp. 494–497, USA, October 2015. View at Scopus
  37. C. Matte and M. Cunche, “Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoofing,” in Proceedings of the 1er Colloque sur la Confiance Numérique en Auvergne, 2014.
  38. D. Goodin, “No, this isn’t a scene from Minority Report. This trash can is stalking you,” accessed: 2017-02-28, http://arstechnica.com/security/2013/08/no-this-isnt-a-scene-from-minority-report-this-trash-can-is-stalking-you/.
  39. “DIY stalker boxes spy on Wi-Fi users cheaply and with maximum creep value,” accessed: 2017-02-28, http://arstechnica.com/security/2013/08/diy-stalker-boxes-spy-on-wi-fi-users-cheaply-and-with-maximum-creep-value/.
  40. T. Kropeit, Don’t Trust Open Hotspots: Wi-Fi Hacker Detection and Privacy Protection via Smartphone [Bachelor’s Thesis], Ruhr-Universität-Bochum, 2015.
  41. C. Matte, M. Cunche, F. Rousseau, and M. Vanhoef, “Defeating MAC address randomization through timing attacks,” in Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016, pp. 15–20, July 2016. View at Scopus