Reducing FTM Ranging and Location Attack Exposure With Crowd-Wisdom
Reducing FTM Ranging and Location Attack Exposure With Crowd-Wisdom
Reducing FTM Ranging and Location Attack Exposure With Crowd-Wisdom
Abstract
802.11 Fine Timing Measurement is an indoor ranging technique. Because it is unauthenticated and
unprotected, an adversary can implement ranging and location attacks, by inserting one or more rogue
responders and causing an unsuspecting client to incorporate forged values into its location computa-
tion. We show in this paper that protection intended for attacks on comparable ranging techniques, like
GPS, are ineffective in the case of FTM. However, we also show that a crowd-sourcing technique that
confirms that one AP is known by the others can mitigate the attack exposure.
Keywords
802.11az, FTM, indoor location, ranging
1. Introduction
Outdoor location is commonly possible with methods leveraging GPS. Indoor however, GPS
signal is often not available and other techniques have been sought for decades. Among several
proposed methods, Fine Timing Measurement (FTM) specifies an indoor location procedure
based on Time of Flight (ToF). Defined in 802.11-2016 [1] and augmented in the 802.11az
amendment (planned for publication in 2022), FTM enables an initiating station (ISTA, typically
a mobile Wi-Fi client) to perform ranging exchanges with a responding station (RSTA, typically
a Wi-Fi system set at a fixed location, e.g., an access point) and also query the RSTA location.
Performing such exchange with multiple RSTAs allows the ISTA to compute its location.
FTM does not include an AP validation mechanism, and an attacker can send invalid range or
location information, driving the ISTA off course. Such attack could have dramatic consequences
in some environments, for example self-driving shuttles in convention centers and airports that
use FTM to assess their position. This paper shows that 1. an attacker can easily drive an FTM
station to the destination of the attacker’s choice 2. protection techniques intended for similar
ranging technologies (GPS) are mostly ineffective, because of FTM fundamental properties
and assumptions 3. 802.11 security techniques also provide only limited protection, but 4. a
crowd-sourcing technique that augments the Pre-Association Security Negotiation (PASN)
process (an unauthenticated 802.11 security procedure) to make it 802.11r, or Fast Transition
IPIN 2021 WiP Proceedings, November 29 – December 2, 2021, Lloret de Mar, Spain
" jerhenry@cisco.com (J. Henry); yann.busnel@imt-atlantique.fr (Y. Busnel);
romaric.ludinard@imt-atlantique.fr (R. Ludinard); nicolas.montavont@imt-atlantique.fr (N. Montavont)
0000-0001-8157-8530 (J. Henry); 0000-0001-6908-719X (Y. Busnel); 0000-0002-4997-4813 (R. Ludinard)
© 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
Workshop
Proceedings
http://ceur-ws.org
ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)
equivalent, coupled with a better AP sorting algorithm, can dramatically reduce the attack
surface.
The rest of this paper is organized as follows: Section 2 exposes how FTM computes range and
location and why it is vulnerable to attacks. Section 3 details why current protection techniques,
for GPS or 802.11, cannot protect FTM efficiently. Section 4 presents an improvement to 802.11
security that can limit FTM exposures to ranging and location attacks. Section 5 demonstrates
how this proposed method reduces exposure in various experimental scenarios, while Section 6
concludes this paper.
The STA can collect information from movement sensors (gyroscopes etc.), and the combined
information from these sources (Pedestrian Dead Reckoning, PDR) to compute the movement of
the object containing the sensor. PRD is a very promising direction for indoor positioning, and
provides good results in constrained scenarios e.g., for example when the sensors are attached
to the user’s foot [19]. In the cases addressed by FTM however, the trajectory can change
rapidly, causing the accuracy of the values returned by the sensors to dissolve with distance
[20]. For example, a user may have parked in the underground garage of a shopping mall, have
a smartphone in their hand, then their pocket, then hands again, while the user undergoes
a complex trajectory (stopping, moving aside to navigate through a crowd with constantly
changing speed, slowing down and turning near store windows etc.), each change introducing
errors into the positioning algorithm [21]. Without an additional reliable source of reference,
the STA cannot compensate for the continuous injection of invalid parameters. Wi-Fi commonly
cannot be the primary or the secondary source reliably. This difficulty is caused by the fact that
Wi-Fi ToF values are usually noisy. With obstacles and multipath, there is no good correlation
between the AP signal strength and the calculated distance, and the precision of measurement
is low. Therefore, fusion is not a sustainable solution for FTM.
Other GPS attack protection techniques that rely on signature and fingerprinting are also
not transferable. With billions of Wi-Fi APs on the planet, and the assumption that a core use
case for FTM is a human with a handheld device (e.g., a smartphone) in an unfamiliar venue,
the designers of FTM have not implemented any validation technique, and there is no global
database that the ISTA could use to verify the identity of each AP in range.
RAIM-like mechanisms are not widely implemented yet in FTM-based app. However, even
when they are, we have shown [5] that the progressive insertion of invalid parameters could
defeat the protection.
Therefore, although the attack exposure of FTM is similar to that of GPS attacks, the partic-
ularities of FTM makes that the solutions for GPS-attack mitigation cannot be transparently
transposed to the FTM case.
• The AP advertises a Mobility Domain Element (MDE), which is a string representing the
domain, i.e., the set of APs between which fast transition will be possible. The string is
commonly an arbitrary set of characters (it does not need to have a meaning, and just
needs to be common between APs participating to the same group). When roaming, the
STA selects APs that advertise the same MDE.
• 802.11r establishes a new key hierarchy. Upon a STA first association, the WLAN infras-
tructures establishes a first Pairwise Master Key (PMK-R0). This key is derived from the
Master Session Key (MSK), which is formed on the client side and the infrastructure side
through the regular authentication process defined for 802.11. In a non-FT mode, the PSK
is directly derived from the MSK (the PSK is the first 256 bits of the MSK). With FT, the
PMK-R0 is derived by also integrating other elements, such as the value of the domain
in the MDE, the SSID name, the STA MAC address and the identifier of the first entity
with which the client establishes this first keying material (this can be the first AP MAC
address, or a value for a centralized WLAN controller; this entity is later identified as the
holder of the PMK-R0, or R0KH-ID). Then, for each AP, a PMK-R1 is established, built
from the PMK-R0 value, the MAC address of the client and the MAC address of the target
AP. When a STA needs to establish a communication with a first AP, it is provided the
elements it needs to compute PMK-R0 from the MSK (that the client should be able to
derive during the authentication phase, from its credentials or a pre-shared key). The
client can then compute the PMK-R1 to associate with any AP in the domain, if the AP
MAC address is known. From the PMK-R1, other keys are derived (temporal unicast
keys).
This key hierarchy allows BSS-FT to enable a fast transition mode. When a STA needs to
roam to a neighboring AP, a non-FT mode would mean that the STA should deassociate from
the current AP, associate to the next AP, then undergo the full authentication exchange in order
to derive a new PMK. This process can take a long time, as detailed in Section 3. With FT, the
keying material required for association to the next AP can be derived while the STA is still
associated to the first AP. BSS-FT allows two modes for that process:
• With the Over-the-air mode (OTA), the STA sends to the next AP an FT authentication
request, that includes the PMK-R0 Name, the MDE, and a Fast Transition Information
Element that includes the R0KH-ID. These elements allow the next AP to determine
if it can build a PMK-R1. If the answer is positive, the next AP responds with an FT
authentication response, that includes the elements the STA needs to derive the PMK-R1
value for the next AP.
• With the Over the Distribution System method (Over-the-DS), the STA first identifies the
target next AP, then sends to its current AP an action frame requesting the establishment
of keying material with the target AP. The request also includes the PMK-R0 Name, the
MDE value and the R0KH-ID. The current AP should relay this request over the wire to
the target AP. Similar to above, the target AP should determine if it can build the PMK-R1,
and reply through the current AP (over the wire) if the answer is positive, with a frame
containing the elements the STA needs to derive the PMK-R1 value for the next AP.
In both cases, the STA is then ready to communicate securely with the next AP. At any time,
the STA can deassociate from the current AP, and send a reassociation request to the next AP,
mentioning the PMK-R1 Name, the MDE, the R0KH-ID and the MAC of the target AP. The STA
also mentions a message integrity check (MIC) that proves that the STA has the right keying
materiel. The next AP replies in kind, and data communication can resume immediately.
4.3. PASN FT
802.11 BSS-FT was intended for associated STAs. However, we propose to adapt FT principles
to the PASN case by adding to PASN exchanges the FT elements that do not strictly force the
STA to undergo an association.
Thus, in this method, all APs part of the same infrastructure include the MDE in their probe
responses and beacons. This informs the STA about which APs are claiming to be part of the
same domain.
In PASN, the STA seeking to establish a secure link sends a first PASN 802.11 authentication
frame to the first AP. The frame may include base Authentication and Key Management (AKM)
parameters (if there is a pre-existing keying material that the STA can use), but also includes
an ephemeral public key that the STA wishes to use (the STA also generates internally the
matching private key). We add the MDE value to this frame.
In PASN, the AP responds with a second PASN authentication frame that includes the AP
temporal public key (the AP also generates internally the matching private key), and optionally
base AKM parameters (if the STA included them). We also add the MDE value to this frame.
In PASN, the STA then responds with a third PASN 802.11 authentication frame, that serves
as an acknowledgment to the exchange. We reuse this frame unchanged.
At this point, the STA has established keying material with the AP and can undergo protected
exchanges. With PASN, the secure link is established with a single AP at a time (the AP with
which the STA wishes to communicate). We augment this procedure by allowing an Over-the-
DS key pre-establishment with other APs. An OTA mode would also be possible, but presents
limited added value. From an airtime consumption standpoint, the amount of frames to exchange
would be equivalent to a direct PASN exchange with the next AP (thus bringing no airtime
consumption, and no process time consumption, advantage). From a security standpoint, both
the Over-the-DS and OTA modes prove that that the first AP has a trusted backend relationship
with the second AP, thus that they belong to the same infrastructure. The OTA mode thus does
not surface specific advantages.
The Over-the-DS PASN FT is illustrated in Figure 2, and works as follows:
• When in need to communicate securely with a second AP, the STA sends to the current AP
a PASN FT authentication frame wrapped in a protected (robust) action frame. The frame
Figure 2: Proposed PASN-FT choreography. The elements that diverge from strict PASN are labelled
in boldface.
resembles the PASN first frame, but also includes the MDE, and a Fast Transition Element
(FTE) that includes the target AP BSSID (MAC address), and also the client intended MAC
address (called S0KH-ID) for exchanging with the next AP. This last element offers an
interesting additional protection. The STA can decide to use a different MAC address for
its dialog with the next AP (using locally administered MAC addresses). As the frame is
encrypted with the current AP public key, this value is obfuscated from an eavesdropper’s
view. This way, the infrastructure can keep track of the client queries while observers do
not see a single STA.
• The current AP forwards this frame over the backend to the next AP. The next AP responds
over the DS with a frame that resembles the PASN second frame, but also includes the
MDE, the second AP MAC address, the target STA current MAC address (used by the
STA to send the first PASN FT frame to the current AP) and the S0KH-ID. The frame also
includes the FTE that includes a timeout value. This value tells the STA the interval for
which the current keying material will be valid.
• The current AP relays the frame to the STA. The STA validates the frame components, and
returns an acknowledgement frame. The frame resembles the PASN third authentication
frame, but also includes the FTE that mentions the next AP MAC address, and the client
intended MAC address (S0KH-ID).
At this point, the STA is ready to communicate securely with the next AP. Within the timeout
interval specified by the next AP, the STA can switch to the next AP channel and directly send
protected data (using as a source MAC the S0KH-ID value). The STA can this way pre-establish
secure links with a multiplicity of APs, then switch to their respective channel in turn to proceed
to protected FTM exchanges.
This process does not guarantee that no attacker will insert in the exchange. However, this
methods greatly limits the risks, as four permutations and scenarios are possible:
Next AP
Legitimate Attacker
Current AP
Legitimate (1) (2)
Attacker (3) (4)
1. The APs can communicate over the backend and the STA can successfully establish a
secure connection to the next AP.
2. The legitimate AP does not have a trusted relationship to the attacker AP, and rejects the
PASN-FT request from the STA.
3. The attacker AP may attempt to pass the PASN FT request to the legitimate AP, but they
do not have a backend trusted relationship. The attempt fails and the STA does not receive
a response from the next AP.
4. The APs may communicate over the backend, and the STA may be able to successfully
establish a secure connection with the next AP.
It should be noted that, because the STA merges RSTAs with the same RSSI as indicated above,
scenario (4) only succeeds if the attacker has positioned 2 different physical APs. Scenarios
(2) and (3) do not directly allow the STA to determine that one AP is illegitimate. From the
STA viewpoint, the PASN FT process failed, possibly because one of the APs is illegitimate, or
because both APs are legitimate but in disjoint systems (a less common, but possible case).
However, as the process repeats with more APs, the STA surfaces groups of APs that have a
backend trusted relationship, and outliers APs (𝐴𝑃𝑂 ) that are not trusted by others (because
requests made to an 𝐴𝑃𝑂 to PASN FT toward other APs will usually fail, and requests made
to other APs to PASN FT toward an 𝐴𝑃𝑂 will also usually fail, unless the other AP is also an
𝐴𝑃𝑂 ). The STA can then use these groups of largest APs having a trusted relationship as the set
of RSTA from which location is computed. These are likely to be legitimate, unless the attacker
is the dominant system in the venue.
5. Experimental Validation
We tested this method in two different environments. The first setting is similar to the attack
test setup described earlier (5 legitimate APs, and the attacker emulating one to three APs), and
leads to the following observations:
1. The attack fails in 100% of cases where the attacker presents a single AP. This is likely
because that AP cannot form a group large enough to be usable (and of course the AP
also fails to establish PASN-FT with the other APs).
2. When the attacker emulates three APs, the attack fails if the APs are all emulated from
the same physical system (e.g. virtual APs on the same laptop, or physical APs at the same
location). Despite RF signal stochasticity, all APs then present an RSSI in the same range
and get merged by the filtering procedure (thus leading the STA to the same conclusion
as above).
3. When the attacker deploys 3 non-co-located APs, the attack fails for any location method
using 4 APs or more (e.g., least square or Kalman filter with 4 or more RSTAs, Figure 1
bottom center). This outcome is expected. For location method using 3 APs, the attacker
system becomes self-sufficient and may partially succeed. The STA temporarily follows the
attacker’s data, then suddenly jumps back to the correct trajectory as soon as contributors
from the valid system are introduced (Figure 1 bottom left). When using Kalman filtering,
the slide toward the correct path is progressive, as the system arbitrates between the
observed and the computed values (Figure 1 bottom right).
4. The above attack succeeds only if the attacker system is within the first 3 APs to be
attempted by the STA, and if the attacker system is large enough to be entirely sufficient
for the STA calculations (i.e., 3 APs for the 3-sphere methods, and up to 6 APs for other
methods). The STA then forms 2 groups of non-compatible sets (the legitimate APs, and
the attacker’s APs) and can then randomly consider the location by the valid AP set, or
the attacker’s AP set.
The second setting is a shopping mall with 4 major store anchors and a multiplicity of smaller
stores, each with an individual SSID. The mall is set on two floors, and Figure 3 represents the
ground floor. A user walks along the main corridor path, from bottom to top (represented by a
dashed line).
In this environment, without changes, the attack fails in all attempts. One likely reason is
that, at any point of the path, 9 to 11 APs can be heard that form groups larger than 4 APs,
from a combination of the main mall Wi-Fi and one of the anchors’. In such environment, the
attacker is unable to establish a system large (and distributed) enough to compete with one of
the valid groups.
Forcing the ISTA to ignore the main mall Wi-Fi (supposing a targeted denial of service) does
not allow for an attack vector either, because at least one of the anchors’ Wi-Fi can be detected
from any location along the path (commonly with 4 APs or more). In some areas (mid-point on
the walking path), only one anchor’s SSID is detectable, and its APs are all in the same direction
(to the right). Location precision dilution occurs in this zone if only the anchor’s SSID is used.
Adding the smaller stores RSTAs restores the precision. Even when an individual store does
not allow for PASN-FT with others, the anchor’s RSTAs serve as a reference and the attacker is
also identified as an outlier (when injecting forged LCI or (𝑡1 , 𝑡4 ) values causing an error larger
than that resulting from computing location with valid RSTAs).
Forcing the ISTA to also ignore the anchors’ Wi-Fi systems provides only a mild attack
vector. Although each store display a specific SSID, in effect, many of the smaller stores use APs
managed by the mall (and therefore would be displaying the same MDE value), even as most
stores complement the system with home or small-business grade APs. These other APs may
not communicate with one another over the wire. It is only when removing all small store APs
Figure 3: Attack attempts with PASN-FT.
that communicate over the wire that the attack succeeds. However, such a dramatic scenario (all
major stores, and the entire shopping mall main WLANs are disabled, only isolated single-AP
SSIDs remain) is unlikely in a real environment.