Nathaniel Bennett (Idaho National Laboratory and University of Florida), Arupjyoti Bhuyan (Idaho National Laboratory), Nicholas J. Kaminski (Idaho National Laboratory)

Within the past five years, countries globally have opened 6 GHz spectrum for Wi-Fi use to account for increased throughput demand. In order to safeguard incumbent services from interference, several countries have evaluated and adopted Automated Frequency Coordination (AFC) systems; such systems calculate and relay safe operating channels and power levels to devices based on their reported location. However, the recent design and deployment of these systems combined with the inherent trust relationships introduced (control over potentially hundreds of thousands of Wi-Fi device frequency/power decisions) points to a need to rigorously evaluate the security of AFC system design. In this work, we perform a holistic security analysis of the Wi-Fi Alliance AFC standards, comprising the AFC System Reference Model and the AFC System to AFC Device Interface Specification. We consider key security properties necessary for correct AFC operation in adversarial conditions, identify several gaps in specifications that undermine these properties, and point to vulnerabilities stemming from these specification weaknesses. Our analysis reveals five findings corresponding to seven vulnerabilities, including trivial authorization bypass weaknesses, practical resource exhaustion attacks and persistent poisoning of local AFC system data stores. Our discoveries underscore the need for spectrum-sharing systems to account for a variety of potentially malicious interactions in protocol design.

View More Papers

SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs

Ruiyi Zhang (CISPA Helmholtz Center for Information Security), Albert Cheu (Google), Adria Gascon (Google), Daniel Moghimi (Google), Phillipp Schoppmann (Google), Michael Schwarz (CISPA Helmholtz Center for Information Security), Octavian Suciu (Google)

Read More

WhiteCloak: How to Hold Anonymous Malicious Clients Accountable in...

Zhi Lu (Huazhong university of Science and Technology), Yongquan Cui (Huazhong university of Science and Technology), Songfeng Lu (Huazhong university of Science and Technology)

Read More

ABElity: Attribute Based Encryption for Securing RIC Communication in...

K Sowjanya (Indian Institute of Technology Delhi), Rahul Saini (Eindhoven University of Technology), Dhiman Saha (Indian Institute of Technology Bhilai), Kishor Joshi (Eindhoven University of Technology), Madhurima Das (Indian Institute of Technology Delhi)

Read More