POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?

被引:1
|
作者
Agrawal, Anand [1 ]
Maiti, Rajib Ranjan [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Dept CSIS, Hyderabad Campus, Hyderabad, Telangana, India
关键词
Wi-Fi; IoT Device Provisioning; Replay Attacks;
D O I
10.1145/3634737.3659436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT device provisioning is the process of setting up headless IoT devices with their companion mobile apps. IoT vendors and manufacturers have the flexibility of different provisioning methods, one of them being the Access Point (AP) pairing mode over Wi-Fi, and hence, they can derive existing Wi-Fi threats and add new ones. AP pairing mode provisioning shares critical information about the Wi-Fi router or sends an authentication token associated with the user's cloud account, which may lead to vulnerabilities. In this paper, we have designed and developed a vulnerability testing tool called "iTieProbe". iTieProbe captures the Wi-Fi traffic to check the provisioning of commercial IoT devices and has the capability to extract critical security parameters. Further, iTieprobe selectively crafts the captured Wi-Fi packets and replays them to test three different vulnerabilities (V1- V3): i) In V1- iTieprobe replays the Wi-Fi packets outside the lifetime of the authentication token without any manipulation, ii) In V2 - iTieprobe replays within the lifetime of the authentication token without any manipulation in the Wi-Fi packets, iii) In V3- iTieprobe meticulously crafts the selected UDP packets and then replays it within the lifetime of the authentication token. The effect of these vulnerabilities ranges from a simple denial of service by a legitimate user not being able to provision the IoT device to a more severe one, where an adversary can set up the IoT devices. We have evaluated the efficacy of iTieprobe against two commercial IoT devices, IoT Haat Smart Plug and Wipro Smart Plug, that are using Tuya-based implementations for their provisioning. We believe this work will help the vendors to improve their provisioning methods.
引用
收藏
页码:1958 / 1960
页数:3
相关论文
共 4 条
  • [1] Shared authentication token secure against replay and weak key attacks
    Yen, SM
    Liao, KH
    [J]. INFORMATION PROCESSING LETTERS, 1997, 62 (02) : 77 - 80
  • [2] Poster: A Framework to Secure IoT Networks Against Network Layer Attacks
    Venkatnarayan, Raghav H.
    Adina, Prasesh
    Mahmood, Shakir
    Shahzad, Muhammad
    [J]. 2019 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2019,
  • [3] Two-Tier Device-Based Authentication Protocol Against PUEA Attacks for IoT Applications
    Lin, Shih-Chang
    Wen, Chih-Yu
    Sethares, William A.
    [J]. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 33 - 47
  • [4] Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks
    Babu, Erukala Suresh
    SrinivasaRao, B. K. M.
    Nayak, Soumya Ranjan
    Verma, Amit
    Alqahtani, Fayez
    Tolba, Amr
    Mukherjee, Amrit
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103