skip to main content
10.1145/2897845.2897883acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms

Published:30 May 2016Publication History

ABSTRACT

We present several novel techniques to track (unassociated) mobile devices by abusing features of the Wi-Fi standard. This shows that using random MAC addresses, on its own, does not guarantee privacy. First, we show that information elements in probe requests can be used to fingerprint devices. We then combine these fingerprints with incremental sequence numbers, to create a tracking algorithm that does not rely on unique identifiers such as MAC addresses. Based on real-world datasets, we demonstrate that our algorithm can correctly track as much as 50% of devices for at least 20 minutes. We also show that commodity Wi-Fi devices use predictable scrambler seeds. These can be used to improve the performance of our tracking algorithm. Finally, we present two attacks that reveal the real MAC address of a device, even if MAC address randomization is used. In the first one, we create fake hotspots to induce clients to connect using their real MAC address. The second technique relies on the new 802.11u standard, commonly referred to as Hotspot 2.0, where we show that Linux and Windows send Access Network Query Protocol (ANQP) requests using their real MAC address.

References

  1. Tails - privacy for anyone anywhere. Retrieved from https://tails.boum.org.Google ScholarGoogle Scholar
  2. Android 6.0 changes. Retrieved from https://developer.android.com/about/versions/marshmallow/android-6.0-changes.html, 2015.Google ScholarGoogle Scholar
  3. O. Abukmail. Wifi Mac Changer. Retrieved from https://play.google.com/store/apps/details?id=com.wireless.macchanger.Google ScholarGoogle Scholar
  4. M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD dataset sapienza/probe-requests (v. 2013-09--10). Retrieved 10 November, 2015, from, http://crawdad.org/sapienza/probe-requests/20130910, Sept. 2013.Google ScholarGoogle Scholar
  5. B. Bloessl, M. Segata, C. Sommer, and F. Dressler. An IEEE 802.11 a/g/p OFDM receiver for GNU radio. In SRIF Workshop, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Bloessl, C. Sommer, F. Dressler, and D. Eckhoff. The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. In ICNC, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  7. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. O. Carlos J. Bernardos, Juan Carlos Zúniga. Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet. In IEEE CSCN, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. Chainfire. Pry-Fi. Retrieved from https://play.google.com/store/apps/details?id=eu.chainfire.pryfi.Google ScholarGoogle Scholar
  10. M. Cristea and B. Groza. Fingerprinting smartphones remotely via ICMP timestamps. Communications Letters, IEEE, 17(6):1081--1083, 2013.Google ScholarGoogle Scholar
  11. D. A. Dai Zovi, S. Macaulay, et al. Attacking automatic wireless network selection. In Proc. of the Sixth Annual SMC Inf. Assurance Workshop, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. B. Danev, D. Zanetti, and S. Capkun. On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Daniel and W. Glenn. Snoopy: Distributed tracking and profiling framework. In 44Con 2012, 2012.Google ScholarGoogle Scholar
  14. L. Demir, M. Cunche, and C. Lauradoux. Analysing the privacy policies of Wi-Fi trackers. In Proc. of the 2014 workshop on physical analytics, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In WiSec, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Freudiger. How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In WiSec, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Gellman and A. Soltani. NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post, 2013.Google ScholarGoogle Scholar
  20. M. X. Gong, B. Hart, L. Xia, and R. Want. Channel bounding and MAC protection mechanisms for 802.11ac. In GLOBECOM, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  21. F. Gont. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). RFC 7217, 2014.Google ScholarGoogle Scholar
  22. D. Goodin. No, this isn't a scene from minority report. This trash can is stalking you. Ars Technica, 2013.Google ScholarGoogle Scholar
  23. B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno, S. Seshan, and D. Wetherall. Can Ferris Bueller still have his day off? protecting privacy in the wireless era. In USENIX HotOS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Grumbach. iwlwifi: mvm: support random MAC address for scanning. Linux committexttteffd05ac479b.Google ScholarGoogle Scholar
  25. M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. Mobile Networks and Applications, 10(3):315--325, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F. Guo and T. Chiueh. Sequence number-based MAC address spoof detection. In RAID, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Huitema. Experience with MAC address randomization in Windows 10. In 93th Internet Engineering Task Force Meeting (IETF), July 2015.Google ScholarGoogle Scholar
  28. C. Huitema. Personal communication, Nov. 2015.Google ScholarGoogle Scholar
  29. M. Humbert, M. H. Manshaei, J. Freudiger, and J.-P. Hubaux. Tracking games in mobile networks. In Conf. on Decision and Game Theory for Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. N. Husted and S. Myers. Mobile location tracking in metro areas: Malnets and others. In CCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. IEEE Std 802.11--2012. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2012.Google ScholarGoogle Scholar
  32. IEEE Std 802.11u. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 9: Interworking with External Networks, 2011.Google ScholarGoogle Scholar
  33. S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In MobiCom, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. P. Leach, M. Mealling, and R. Salz. A universally unique identifier (UUID) URN namespace. RFC 4122 (Proposed Standard), July 2005.Google ScholarGoogle Scholar
  35. J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi, J. Maki, and M. Roe. Privacy-preserving 802.11 access-point discovery. In WiSec, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. B. Misra. iOS 8 MAC randomization -- analyzed! http://blog.airtightnetworks.com/ios8-mac-randomization-analyzed/.Google ScholarGoogle Scholar
  37. A. B. M. Musa and J. Eriksson. Tracking unmodified smartphones using Wi-Fi monitors. In SenSys, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. B. O'Connor. CreepyDOL: Cheap, distributed stalking. In BlackHat, 2013.Google ScholarGoogle Scholar
  39. J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. Pang, B. Greenstein, S. Seshan, and D. Wetherall. Tryst: The case for confidential service discovery. In HotNets, 2007.Google ScholarGoogle Scholar
  41. J. Scahill and G. Greenwald. The NSA's secret role in the U.S. assassination program. The Intercept, 2014.Google ScholarGoogle Scholar
  42. K. Skinner and J. Novak. Privacy and your app. In Apple Worldwide Dev. Conf. (WWDC), June 2015.Google ScholarGoogle Scholar
  43. T. Stöber, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: smartphone fingerprinting via application behaviour. In WiSec, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. L. Wang and C. Tellambura. An overview of peak-to-average power ratio reduction techniques for OFDM systems. In IEEE ISSPIT, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  45. W. Wang. Wireless networking in Windows 10. In Windows Hardware Engineering Community conference (WinHEC), Mar. 2015.Google ScholarGoogle Scholar
  46. Wi-Fi Alliance. Hotspot 2.0 (Release 2) Technical Specification v1.1.0, 2010.Google ScholarGoogle Scholar
  47. Wi-Fi Alliance. Wi-Fi Simple Configuration Protocol and Usability Best Practices for the Wi-Fi Protected Setup Program, v2.0.1, April 2011.Google ScholarGoogle Scholar

Index Terms

  1. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
          May 2016
          958 pages
          ISBN:9781450342339
          DOI:10.1145/2897845

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 May 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ASIA CCS '16 Paper Acceptance Rate73of350submissions,21%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader