Ranging and Location attacks on 802.11 FTM - IMT Atlantique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2021

Ranging and Location attacks on 802.11 FTM

Résumé

802.11 Fine Timing Measurement is an indoor ranging technique. Because it is unauthenticated and unprotected, our experiments indicate that an adversary can implement ranging and location attacks, by inserting one or more rogue responders and causing an unsuspecting client to incorporate forged values into its location computation. FTM clients tend to a small set of responders to range against (top 3 to 6 responders with strongest signal). Once ranges have been collected, the client can compute its location using various techniques, such as 3-sphere intersection, matrix error minimization techniques or Kalman filter. Regardless of the technique in use, we show in this paper that an attacker can cause a ranging client to deviate from its intended path. We also show that protection intended for attacks on comparable ranging techniques, like GPS, are ineffective in the case of FTM.
Fichier principal
Vignette du fichier
802_11az_GPS_attack_pimrc-6.pdf (381.58 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03265600 , version 1 (28-05-2021)
hal-03265600 , version 2 (21-06-2021)

Identifiants

  • HAL Id : hal-03265600 , version 1

Citer

Jerome Henry, Yann Busnel, Romaric Ludinard, Nicolas Montavont. Ranging and Location attacks on 802.11 FTM. 2021. ⟨hal-03265600v1⟩
176 Consultations
270 Téléchargements

Partager

Gmail Facebook X LinkedIn More