injection and those capable of neither, as we believe
these are the two most common cases in practice.
The token-to-PC forward channel does not require
any special modes of Wi-Fi and may therefore be im-
plemented on any device. To construct the forward
channel, we exploit the methods by which 802.11
clients determine which wireless networks in range
offer service. Both APs and ad-hoc network partici-
pants advertise their existence by sending out beacon
frames, which are unsolicited management frames
sent to the broadcast address; and probe response
frames, which are sent in response to probe frames
sent out by stations seeking access points.
These two data paths define two different meth-
ods for a PC to obtain information about nearby APs:
passive scanning, wherein a station merely listens for
beacons, and active scanning where a station sends
probe requests and listens for probe responses. Pas-
sive scanning is used in the popular Kismet wireless
network-detection software (Kershaw, 2004). Like
Kismet, our experiments confirmed that few network
adapters are capable of passive scanning on Win-
dows, with most only supporting active scanning, and
none supporting only passive scanning. Building a
widely-usable forward channel thus requires using ac-
tive scanning on the PC. We wrote a simple user-mode
PC application that scans for APs, sending out probe
requests and listening for probe responses.
A probe response frame contains the 32-byte
SSID field, which typically indicates the natural lan-
guage name of a network. The SSID field can be
given an arbitrary value and still be propagated un-
molested up the protocol stack by commodity 802.11
hardware and Windows drivers.
After testing different Wi-Fi PC adapters (from
Linksys, D-Link, Belkin, Hawking, Netgear, and
Intel) with different chipsets (from Prism, Ralink,
Atheros, Broadcom, and Intel), we found that only
the SSID field can be reliably received by the PC in
this way. Other fields we tested were unsuccessful.
Vendor specific fields of up to 255 bytes can also be
appended to probe response frames and used to carry
authentication data. Unfortunately, one adapter only
reported the first 240 bytes and others did not report
these other fields at all.
Because of these limitations, our authentication
token thus sends messages by essentially advertising
itself as an ad-hoc network participant, sending out
beacon frames and probe response frames upon acti-
vation with the SSID field set to the base-64 ASCII
encoding of the cryptographic message. The SSID
field identifies the frame as part of the authentication
protocol using the “;” character (an arbitrary choice)
and carries the cryptographic payload necessary to au-
thenticate the token to the PC. Software on the PC
continuously searches for access points and ad-hoc
network participants; when one is found whose SSID
begins with the “;” character, it delivers the crypto-
graphic payload to security applications. The delay
from when the prototype begins to advertise the ad-
hoc network to the time the payload is passed to ap-
plication software on the mobile varies depending on
what 802.11 chipset and driver is used on the mobile.
We experimented the most with a Belkin F5D7050
ver. 3; using it, the delay is around three seconds.
The SSID field is at most 32 bytes long; the “;”
character consumes one byte leaving 31 bytes. This
is a very small payload, but much larger than user-
transcribed OTPs which amount to around 33 bits.
For fragmented messages, the token can masquerade
as multiple access points simultaneously.
6 THE PC-TOKEN “BACK
CHANNEL”
Once associated with an AP using MAC-layer encryp-
tion, the operating system does not offer an API to
enable or disable encryption on a frame-by-frame ba-
sis. For this reason, application software running on
the PC cannot directly send cryptographic challenges
or transaction details in data frames that can be read
by the token. Because the token does not have the
MAC-layer encryption keys, even if its drivers sup-
port monitor mode, the best the token can hope for is
to intercept encrypted frames, shown in Figure 2.
Regardless of the type of MAC-layer encryption
in use, the token can expect to observe some prop-
erties of the encrypted data frames. In particular,
the size of data frames can be seen by an adapter in
monitor mode. In addition, Wi-Fi encryption is ap-
plied only to the data payload of a frame and not to
its headers. Fortunately, Wi-Fi interfaces provide the
ability to set certain unencrypted header fields from
application-layer software. In this section, we will
explore the use of these side-channels to construct
a back channel from the PC to the token to deliver
challenge or transaction details. The token must be
capable of monitor mode operation in order to use
one of these back channels. Personal wireless devices
including the Nokia Internet Tablet offer this feature
and naturally any purpose-built token would as well.
6.1 The MAC-Channel
Because the PC usually is already engaged in an in-
frastructure session – and most chipsets are single-
session only – its Wi-Fi stack is not able to di-
ONE-TOUCH FINANCIAL TRANSACTION AUTHENTICATION
9