Ayat Al-Wraikat, Osama M. F. Abu-Sharkh, Haitham Ameen Noman
{"title":"Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation","authors":"Ayat Al-Wraikat, Osama M. F. Abu-Sharkh, Haitham Ameen Noman","doi":"10.1049/ntw2.70020","DOIUrl":null,"url":null,"abstract":"<p>This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing. The paper delves into the distributed coordination function (DCF) and examines how Ack spoofing attacks affect network performance by manipulating the Ack operation essential for successful data exchange between stations. This manipulation disrupts Ack-based rate control mechanisms and the backoff procedure of the standard, leading to decreased performance for legitimate receivers with lossy links to access points. The paper introduces strategies to perform Ack spoofing attacks. To counter these threats, a novel detection and mitigation technique is proposed that effectively detects and mitigates any of the proposed attack strategies. The introduced technique is simple to implement, compatible with all versions of the existing IEEE 802.11 standard and all rate control mechanisms that rely on Ack frames in their operations. It also requires no modifications to the existing IEEE 802.11 standard, facilitating easy adoption by manufacturers. Moreover, it leverages a unique approach that avoids a cross-layer design, maintaining the integrity of layer abstraction. Through detailed simulations and analysis, the effectiveness of the proposed attack strategies and the detection and mitigation technique is demonstrated under various scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70020","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Networks","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ntw2.70020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing. The paper delves into the distributed coordination function (DCF) and examines how Ack spoofing attacks affect network performance by manipulating the Ack operation essential for successful data exchange between stations. This manipulation disrupts Ack-based rate control mechanisms and the backoff procedure of the standard, leading to decreased performance for legitimate receivers with lossy links to access points. The paper introduces strategies to perform Ack spoofing attacks. To counter these threats, a novel detection and mitigation technique is proposed that effectively detects and mitigates any of the proposed attack strategies. The introduced technique is simple to implement, compatible with all versions of the existing IEEE 802.11 standard and all rate control mechanisms that rely on Ack frames in their operations. It also requires no modifications to the existing IEEE 802.11 standard, facilitating easy adoption by manufacturers. Moreover, it leverages a unique approach that avoids a cross-layer design, maintaining the integrity of layer abstraction. Through detailed simulations and analysis, the effectiveness of the proposed attack strategies and the detection and mitigation technique is demonstrated under various scenarios.
IET NetworksCOMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
5.00
自引率
0.00%
发文量
41
审稿时长
33 weeks
期刊介绍:
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services. Topics include, but are not limited to: Network Architecture, Design and Planning, Network Protocol, Software, Analysis, Simulation and Experiment, Network Technologies, Applications and Services, Network Security, Operation and Management.