iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?

04/24/2023
by   Anand Agrawal, et al.
0

Evil twin attack on Wi-Fi network has been a challenging security problem and several solutions have been proposed to this problem. In general, evil twin attack aims to exfiltrate data, like Wi-Fi and service credentials, from the client devices and considered as a serious threat at MAC layer. IoT devices with its companion apps provides different pairing methods for provisioning. The "SmartConfig Mode", the one proposed by Texas Instrument (TI) and the "Access Point pairing mode (AP mode)" are the most common pairing modes provided by the application developer and vendor of the IoT devices. Especially, AP mode use Wi-Fi connectivity to setup IoT devices where a device activates an access point to which the mobile device running the corresponding mobile application is required to connect. In this paper, we have used evil twin attack as a weapon to test the security posture of IoT devices that use Wi-Fi network to set them up. We have designed, implemented and applied a system, called iTieProbe, that can be used in ethical hacking for discovering certain vulnerabilities during such setup. AP mode successfully completes when the mobile device is able to communicate with the IoT device via a home router over a Wi-Fi network. Our proposed system, iTieProbe, is capable of discovering several serious vulnerabilities in the commercial IoT devices that use AP mode or similar approach. We evaluated iTieProbe's efficacy on 9 IoT devices, like IoT cameras, smart plugs, Echo Dot and smart bulbs, and discovered that several of these IoT devices have certain serious threats, like leaking Wi-Fi credential of home router and creating fake IoT device, during the setup of the IoT devices.

READ FULL TEXT

page 6

page 8

page 9

page 10

research
05/21/2018

IoT2Vec: Identification of Similar IoT Devices via Activity Footprints

We consider a smart home or smart office environment with a number of Io...
research
01/06/2021

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Despite the surging development and utilization of IoT devices, the secu...
research
06/20/2021

TinyML: Analysis of Xtensa LX6 microprocessor for Neural Network Applications by ESP32 SoC

In recent decades, Machine Learning (ML) has become extremely important ...
research
08/06/2018

Piping Botnet - Turning Green Technology into a Water Disaster

The current generation of IoT devices is being used by clients and consu...
research
06/30/2020

CVE based classification of vulnerable IoT systems

Common Vulnerabilities and Exposures database (CVE) is one of the larges...
research
10/13/2022

A Tagging Solution to Discover IoT Devices in Apartments

The number of IoT devices in smart homes is increasing. This broad adopt...
research
02/09/2022

IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms

With the emergence and fast development of trigger-action platforms in I...

Please sign up or login with your details

Forgot password? Click here to reset