On the Reliability of Wireless Fingerprinting using Clock Skews
[arackaparambil:clock-skew-tr]Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz. On the Reliability of Wireless Fingerprinting using Clock Skews. Technical Report number TR2010-661, Dartmouth Computer Science, Hanover, NH, January 2010. ©Copyright the authors. Revision of arackaparambil:clock-skew.
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. But cryptographic exchange protocols are complex and therefore induce potential vulnerabilities in themselves. We show that measurement of clock skews of access points in an 802.11 network can be useful in this regard, since it provides fingerprints of the devices. Such fingerprints can be used to establish the first point of trust for client stations wishing to connect to an access point. Fingerprinting can also be used in the detection of fake access points. We demonstrate deficiencies of previously studied methods that measure clock skews in 802.11 networks by means of an attack that spoofs clock skews. We then provide means to overcome those deficiencies, thereby improving the reliability of fingerprinting. Finally, we show how to perform the clock-skew arithmetic that enables network providers to publish clock skews of their access points for use by clients.
Citable with [BibTeX]
Keywords: [security] [wifi]
Available from the publisher: [page]
Available from the author:
This pdf was produced by the publisher and its posting here is permitted by the publisher.