
attacks. As pointed out before [13, 14], the attacker may
also attempt to avoid detection of the fake AP by either
operating on a channel different from the real AP, or by
providing a higher signal strength to the client.
2. THE ROLE OF FINGERPRINTING IN SE-
CURING WIRELESS INFRASTRUCTURE
Initially, 802.11 link layer security measures concentrated on
preventing access of unauthorized clients to the network’s
APs. The entire concept of 802.11 authentication, associa-
tion, and in particular the design of the 802.11 client state
machine, proceeded from the apparent assumption that the
primary goal of the security mechanisms was to protect the
infrastructure of the network from rogue clients that would
seek to obtain access to the infrastructure. The APs were
apparently thought of as the “perimeter” of the network,
vested with the role of protecting it against rogue clients.
However, subsequent experience showed that the threat model
underlying this design was inherently flawed. Clients (with
their stored representations of trust relationships) turned to
be a much more important piece of the holistic security puz-
zle than previously thought. In fact, they emerged as the
weakest link in the so-called perimeter.
In ISO Layer 3, attacking clients of a network and through
them gaining access to the presumably well-protected inter-
nal network resources (by exploiting existing trust relation-
ships between these resources and the clients) has emerged
as an efficient attack strategy. In fact, exploiting clients by
tricking them into establishing connections to rogue services
became a leading strategy for both exploitation and penetra-
tion testing as evidenced by an entire BlackHat 2009 track
(e.g., [18]) devoted to client exploitation functionality in the
popular Metasploit penetration testing tool [3].
It did not take long till the same attack approach was re-
alized in 802.11 Layer 2: trusted clients were tricked into
interaction with fake access points, pretending to be a part
of the trusted infrastructure. The trend towards exploiting
the clients was amplified by the complex nature of the 802.11
link establishment. Empirically, vulnerabilities are associ-
ated with complexity of processing diversely structured in-
puts. 802.11 link layer driver code is exemplary of just such
complexity. In particular, even beacon and probe response
frames—to be processed by clients before any trust in the
sender can be established—contain many variable-length op-
tional Information Element structures, some of which are
also vendor-specific. It is hardly surprising that crafting
malformed inputs in these fields quickly emerged as an ex-
tremely efficient attack methodology in [9]. This methodol-
ogy yielded such achievements as “hijacking a Macbook in 60
seconds” [8] (by way of a crafted probe response leading to
attack code execution within the ring zero driver kernel con-
text) and the subsequent automation and refinement of this
technique that revealed other 802.11 driver vulnerabilities—
the so-called “Month of kernel bugs” (see, e.g., [7]). As we
explained above, wireless clients became a prominent part
of the network’s attacked perimeter even before they at-
tempted to establish association with a trusted infrastruc-
ture! We remark that potential vulnerabilities in processing
of complex data structures required for cryptographic au-
thentication of the access points by the client are still largely
unexplored and might provide another efficient attack vec-
tor.
In the light of the clients becoming the forefront of network
exploitation, identifying the tools of such exploitation—fake
access points— delivering crafted link layer inputs to the
clients becomes very important. Rogue access points have
long been seen as security threats; for example, non-security-
minded employees may introduce unauthorized access points
into organizations’ networks for convenience and thus create
a weak link in the network perimeter, or attackers may set
up fake (or the so-called “evil-twin”) access points to capture
communications and conduct man-in-the-middle attacks be-
tween the unwitting client and the user. Popular exploita-
tion tools, such as Karma [20], were developed to meet pen-
etration testers’ demand. Such early attacks were described
by wireless security researchers in [13, 19]. However, all of
these traditional fake AP scenarios assume successful estab-
lishment and maintenance of a layer 3 connection, whereas a
new class of attacks is based on compromising the client at a
much earlier point: either during scanning for available net-
works or during authentication or association attempts. As
such, strong cryptographic schemes for authenticating ac-
cess points, such as WPA2-Enterprise, cannot mitigate this
threat. Fake access points thus become a tool of delivering
link layer exploits.
Thus the problem of protecting 802.11 clients at their most
vulnerable— in the early stages of establishing authentica-
tion/association —becomes paramount to the new client-
centric view of network security. We note that at these
stages the clients are most susceptible to deception, because
they must make their decision to join a network based on
easily fakeable data, such as the AP’s MAC address, ESSID,
and various Information Elements in the beacon and probe
response frames, as well as physical layer characteristics,
such as signal strength. (Creating superior signal strength
is generally not a hard problem for an attacker.) Detect-
ing such deceptions thus becomes important for both clients
(where it needs to be easily and quickly accomplished as
a pre-authentication step) and wireless intrusion detection
systems (WIDS).
As we have seen, establishing trust for an AP can be a tricky
issue for a client attempting to associate with it. Traditional
approaches to such trust-relationship problems most often
find solutions in cryptographic exchange protocols. With
respect to wireless security, the 802.11i RSNA (Robust Se-
curity Network Association) provides such a functionality.
Importantly however, such protocols that are dependent on
cryptography are complex and therefore induce potential
vulnerabilities in themselves. These protocols must be im-
plemented with great care. Before involving in complex
cryptographic exchange protocols with an untrusted entity,
we propose using clock-skew fingerprinting as a means of
providing a first point of trust for clients. Once the fin-
gerprint of the AP is verified, the clients can proceed with
such protocols to reaffirm their trust. As such, we propose
our methods as a complement to the existing authentication
methods.
Unlike Jana and Kasera’s proposal [14], where the fake AP
detection procedure was meant to be implemented in a WIDS
2