Undoubtedly, mobile devices have become part of our daily lives. We carry our devices more or less everywhere, no matter if they are they are laptops, smartphones or tablets. And, more or less wherever we are, we connect to the first Wi-Fi network available. It does not really matter whether these Wi-Fi networks are trustworthy and/or secure. Often, indeed, our devices automatically connect to known Wi-Fi networks for us. But what really happens in the background and what are the security risks?
A standard Wi-Fi network is composed of an Access Point (AP) and one or more devices that connect to this Access Point, such as: computers, smartphones, tablets, game consoles, TVs and more. The Access Point, via its antenna, constantly sends signals, known as Beacon Frame, which contain several information about the Access Point itself, such as its SSID and MAC Address, as well as the mechanisms of encryption supported. The various devices, in turn, are perpetually sending signals, known as Probe Request Frame, to discover which Access Points are “in range” and/or whether a specific SSID is in range. The Access Point, then, responds to each of these signals via another signal, known as a Probe Response Frame, in which it specifies various information about himself. At this point, if a device wants to connect to a specific Access Point, it will send a signal known as Association Request Frame, to which the Access Point will respond with a signal known as the Association Response Frame. After that, the two devices determine whether they can communicate with each other via an Authentication Frame signal and, if that is the case, they can always stop the communication at any point by sending a Deauthentication Frame signal.
Now, the question is: what if a malicious Access Point claims to be a particular Access Point of a Wi-Fi network to which we connected in the past? Maybe, claiming to be the hotspot of the restaurant on our doorstep, or the one of a hotel chain in which we have been or even the one of our favorite coffee shop?
Device-1: [Probe Request Frame] “Hey! Who is out there? Is there AP-1?! Please, talk to me.“ Malicious-AP: [Probe Response Frame] “Hey! Here I'm! This is AP-1! Why don't we create a lovely WLAN?!” -------- AP-1: [out of range] … |
The necessary cookies help make the website usable by enabling basic functions such as page navigation. The website cannot function properly without these cookies.
Cookie necessary to make certain specific contents usable such as: access to protected areas of the site, sending requests or subscribing to newsletters. The specific features of these sections will not be usable without this cookie.