3.8 Proceedings Paper

Wi-attack: Cross-technology Impersonation Attack against iBeacon Services

Publisher

IEEE
DOI: 10.1109/SECON52354.2021.9491605

Keywords

-

Funding

  1. National Key R&D Program of China [2017YFB1003000]
  2. National Science Fund of China [61772306]
  3. R&D Project of Key Core Technology and Generic Technology in Shanxi Province [2020XXX007]

Ask authors/readers for more resources

This paper discusses the feasibility and execution of using WiFi devices to impersonate iBeacon services. Wi-attack, using digital emulation technology, can simulate multiple iBeacons for attacks simultaneously. Attack results show an average distance error of over 20 meters in fingerprint-based localization.
iBeacon protocol is widely deployed to provide location-based services. By receiving its BLE advertisements, nearby devices can estimate the proximity to the iBeacon or calculate indoor positions. However, the open nature of these advertisements brings vulnerability to impersonation attacks. Such attacks could lead to spam, unreliable positioning, and even security breaches. In this paper, we propose Wi-attack, revealing the feasibility of using WiFi devices to conduct impersonation attacks on iBeacon services. Different from impersonation attacks using BLE compatible hardware, Wi-attack is not restricted by broadcasting intervals and is able to impersonate multiple iBeacons at the same time. Effective attacks can be launched on iBeacon services without modifications to WiFi hardware or firmware. To enable direct communication from WiFi to BLE, we use the digital emulation technique of cross technology communication. To enhance the packet reception along with its stability, we add redundant packets to eliminate cyclic prefix error entirely. The emulation provides an iBeacon packet reception rate up to 66.2%. We conduct attacks on three iBeacon services scenarios, point deployment, multilateration, and fingerprint-based localization. The evaluation results show that Wi-attack can bring an average distance error of more than 20 meters on fingerprint-based localization using only 3 APs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available