Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation

IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
IET Networks Pub Date : 2025-10-24 DOI:10.1049/ntw2.70020
Ayat Al-Wraikat, Osama M. F. Abu-Sharkh, Haitham Ameen Noman
{"title":"Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation","authors":"Ayat Al-Wraikat,&nbsp;Osama M. F. Abu-Sharkh,&nbsp;Haitham Ameen Noman","doi":"10.1049/ntw2.70020","DOIUrl":null,"url":null,"abstract":"<p>This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing. The paper delves into the distributed coordination function (DCF) and examines how Ack spoofing attacks affect network performance by manipulating the Ack operation essential for successful data exchange between stations. This manipulation disrupts Ack-based rate control mechanisms and the backoff procedure of the standard, leading to decreased performance for legitimate receivers with lossy links to access points. The paper introduces strategies to perform Ack spoofing attacks. To counter these threats, a novel detection and mitigation technique is proposed that effectively detects and mitigates any of the proposed attack strategies. The introduced technique is simple to implement, compatible with all versions of the existing IEEE 802.11 standard and all rate control mechanisms that rely on Ack frames in their operations. It also requires no modifications to the existing IEEE 802.11 standard, facilitating easy adoption by manufacturers. Moreover, it leverages a unique approach that avoids a cross-layer design, maintaining the integrity of layer abstraction. Through detailed simulations and analysis, the effectiveness of the proposed attack strategies and the detection and mitigation technique is demonstrated under various scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70020","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Networks","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ntw2.70020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing. The paper delves into the distributed coordination function (DCF) and examines how Ack spoofing attacks affect network performance by manipulating the Ack operation essential for successful data exchange between stations. This manipulation disrupts Ack-based rate control mechanisms and the backoff procedure of the standard, leading to decreased performance for legitimate receivers with lossy links to access points. The paper introduces strategies to perform Ack spoofing attacks. To counter these threats, a novel detection and mitigation technique is proposed that effectively detects and mitigates any of the proposed attack strategies. The introduced technique is simple to implement, compatible with all versions of the existing IEEE 802.11 standard and all rate control mechanisms that rely on Ack frames in their operations. It also requires no modifications to the existing IEEE 802.11 standard, facilitating easy adoption by manufacturers. Moreover, it leverages a unique approach that avoids a cross-layer design, maintaining the integrity of layer abstraction. Through detailed simulations and analysis, the effectiveness of the proposed attack strategies and the detection and mitigation technique is demonstrated under various scenarios.

Abstract Image

IEEE 802.11基础架构wlan中的Ack欺骗攻击:策略、检测和缓解
本文研究了IEEE 802.11无线局域网中的一个漏洞,重点研究了被称为确认(Ack)欺骗的MAC子层攻击。本文深入研究了分布式协调函数(DCF),并研究了Ack欺骗攻击如何通过操纵Ack操作来影响网络性能,而Ack操作对于站之间成功的数据交换至关重要。这种操作破坏了基于ack的速率控制机制和标准的后退程序,导致具有到接入点的有损链路的合法接收器的性能下降。本文介绍了实施Ack欺骗攻击的策略。为了应对这些威胁,提出了一种新的检测和缓解技术,可以有效地检测和缓解任何提出的攻击策略。所介绍的技术实现简单,兼容现有IEEE 802.11标准的所有版本和所有依赖Ack帧的速率控制机制。它也不需要修改现有的IEEE 802.11标准,便于制造商采用。此外,它利用了一种独特的方法,避免了跨层设计,保持了层抽象的完整性。通过详细的仿真和分析,验证了所提出的攻击策略以及检测和缓解技术在各种场景下的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Networks
IET Networks COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
5.00
自引率
0.00%
发文量
41
审稿时长
33 weeks
期刊介绍: IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services. Topics include, but are not limited to: Network Architecture, Design and Planning, Network Protocol, Software, Analysis, Simulation and Experiment, Network Technologies, Applications and Services, Network Security, Operation and Management.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书