Skip to main content

An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard

  • Conference paper
  • First Online:
  • 1324 Accesses

Abstract

The paper shows detailed analysis of the effects of the AuthRF (Authentication Request Flooding) and AssRF (Association Request Flooding) MAC Layer DoS (Denial of Service) attacks on 802.11e wireless standard based on a proposed queuing model. More specific, the paper analyzes the Access Point (AP) behavior under AuthRF DoS attacks with different frequency of the requests arrival, i.e. Low Level (LL), Medium Level (ML) and High Level (HL), at the same time considering different traffic priorities. The proposed queuing model and the developed analytical approach can be also used on each protocol layer, especially if the attacks are seen in terms of the flooding influence over AP with too many requests (ICMP, TCP SYN, UDP etc.).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59–73 (2013)

    Google Scholar 

  2. Cisco Systems, Inc., Cisco Wireless Control System Configuration Guide, Software Re- lease 7.0.172.0 (2011)

    Google Scholar 

  3. IEEE Standard for Information Technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 4: Protected Management Frames. IEEE Std. 802.11w-2009 (2009)

    Google Scholar 

  4. Liu C., Yu J., Brewster G.: Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs. In: IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, Canada (2010)

    Google Scholar 

  5. Liu, C., Yu, J.: A solution to WLAN authentication and association DoS attacks. IAENG Int. J. Comput. Sci. 34, 31 (2007)

    Google Scholar 

  6. Liu, C., Yu, J.: Detail derivations of Tr, Ta, t2, and t5 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mitko Bogdanoski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Bogdanoski, M., Latkoski, P., Risteski, A. (2015). An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard. In: Atanasovski, V., Leon-Garcia, A. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 159. Springer, Cham. https://doi.org/10.1007/978-3-319-27072-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27072-2_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27071-5

  • Online ISBN: 978-3-319-27072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics