Mobile Networks and Applications

, Volume 22, Issue 5, pp 834–843 | Cite as

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point

  • Mitko Bogdanoski
  • Pero Latkoski
  • Aleksandar Risteski


This paper analyzes several Denial of Service (DoS) attacks at Medium Access Control (MAC) level, with an emphasis on the attacks related to authentication and association mechanisms in WLANs. In particular, a detailed analytical model is presented based on IEEE 802.11e access point (AP) queuing model, which shows the impact of the authentication and association flooding attacks. Using the proposed queuing model, the paper discusses the differences in behavior of APs based on both IEEE 802.11 and IEEE 802.11e standards, under DoS attacks. The analytical model is further extended in order to tackle the 802.11e AP behavior, followed by appropriate quantitative results for different types of Authentication Request Flooding (AuthRF) and Association Request Flooding (AssRF) DoS attacks. More specific, the paper analyzes the AP behavior being under AuthRF DoS attacks with three different levels of attack intensity: Low Level (LL), Medium Level (ML) and High Level (HL), at the same time assuming different traffic priorities. The analysis reveals that during the attack, the implemented algorithm plays a significant role in the overall performance. Namely, if an appropriate model is applied during LL and ML DoS attacks, the high priority traffic will be less affected, providing it with an opportunity to be served with significantly lower losses compared to the low priority traffic. The proposed queuing model and the developed analytical approach can be also used for each protocol layer, especially if the attacks involve flooding with too many requests (ICMP, TCP SYN, UDP etc.). The last part of the paper provides a comprehensive survey of different mechanisms used to mitigate the effects of the DoS attacks on MAC sublayer.


Denial of service Flooding attack AuthRF AssRF 802.11e 


  1. 1.
    Cisco Systems, Inc. (2011) Cisco wireless control system configuration guide. Softw Release 7:172.0Google Scholar
  2. 2.
    Egli P (2006) Susceptibility of wireless devices to denial of service attacks. Netmodule, AGGoogle Scholar
  3. 3.
    Meiners LF (2009) But…my station is awake! Power save denial of service in 802.11 Networks, Ekoparty’09Google Scholar
  4. 4.
    Waliullah M, Moniruzzaman ABM, Rahman MS (2015) An experimental study analysis of security attacks at IEEE 802.11 wireless local area network. Int J Futur Gener Commun Netw 8(1):9–18CrossRefGoogle Scholar
  5. 5.
    Wadhwa U (2015) How to perform a DDOS attack on wireless access point., Mighty shouts. 03 Accessed Nov 2015
  6. 6.
    Fragkiadakis A, Askoxylakis I, Chatziadam P (2014) Denial-of-service attacks in wireless networks using off-the-shelf hardware. In: Lecture notes in computer science, Springer International Publishing, 8530: 427–438Google Scholar
  7. 7.
    Abdallah AE, Razak SA, Yahaya C (2015) Detection and prevention of denial of service attacks (DoS) in WLANs infrastructure. J Theor Appl Inf Technol 71(3):417–423Google Scholar
  8. 8.
    Arockiam L, Vani B (2012) Security algorithms to prevent Denial of Service (DoS) attacks in WLAN. Int J Wirel Commun Netw Technol 2:1–7Google Scholar
  9. 9.
    Liu C, Yu J (2007) A solution to WLAN authentication and association DoS Attacks. IAENG Int J Comput Sci 34:7–14Google Scholar
  10. 10.
    Liu C, Yu JT (2006) An analysis of dos attacks on wireless LAN, IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET2006). Canada, BanffGoogle Scholar
  11. 11.
    Liu C, Yu J (2008) Rogue access point based Denial of Service (DoS) Attacks against 802.11 WLANs, 4th Advanced International Conference on Telecommunications (AICT), Athens, GreeceGoogle Scholar
  12. 12.
    Liu C, Yu J, Brewster G, (2010) Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs, IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, CanadaGoogle Scholar
  13. 13.
    Nguyen TD, Nguyen DHM, Tran BN, Vu H, Mittal N (2008) A lightweight solution for defending against deauthentication/ disassociation attacks on 802.11 Networks. ICCCN 2008Google Scholar
  14. 14.
    Nguyen TD, Tran BN, Nguyen DHM, (2008) A solution for defending against denial of service attack on wireless LAN. Mobile and wireless networks security. Proceedings of the MWNS 2008 Workshop, Singapore. World Scientific Publishing Co. Pte. Ltd, pp 67–77Google Scholar
  15. 15.
    Lee YS, Chien HT, Tsai WN (2009) Using random bit authentication to Defend IEEE 802.11 DoS attacks. J Inf Sci Eng - JISE 25(5):1485–1500Google Scholar
  16. 16.
    LaRoche P, Zincir-Heywood AN (2006) 802.11 De-authentication attack detection using genetic programming, in Proc. EuroGP, pp.1–12Google Scholar
  17. 17.
    Arockiam L, Vani BA (2011) Comparative study of the available solutions to minimize denial of service attacks in wireless LAN. Int J Comput Technol Appl 2(3):619–625Google Scholar
  18. 18.
    802.11e-2005 (2005), IEEE standard for information technology--local and metropolitan area networks--Specific requirements--part 11: wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications - Amendment 8: Medium Access Control (MAC) Quality of Service EnhancementsGoogle Scholar
  19. 19.
    Tatlas NA, Floros A, Mourjopoulos J (2006) Wireless digital audio delivery analysisand evaluation. IEEE Int Conf Acoust Speech Sig Process 5:201–204Google Scholar
  20. 20.
    Andrew LLH, Hanly SV, Mukhtar RG (2008) Active queue management for fair resource allocation in wireless networks. IEEE Trans Mob Comput 7(2):231–246CrossRefGoogle Scholar
  21. 21.
    Liu C, Yu J (2009) Detail derivations of Tr, Ta, t2, and t5Google Scholar
  22. 22.
    Chee-Hock N, Boon-Hee S (2008) Queueing modelling fundamentals with applicationsin communication networks, 2nd edn. John Wiley and Sons Inc., ChichesterMATHGoogle Scholar
  23. 23.
    Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comp Stand Interfaces 31:931–941CrossRefGoogle Scholar
  24. 24.
    Daniel BF, David RC (2006) Detecting identity-based attacks in wireless networksusing signalprints, in Proceedings of the 5th ACM workshop on Wireless security, pp. 43–52Google Scholar
  25. 25.
    Martinovic I, Zdarsky FA, Wilhelm M, Wegmann C, Schmitt JB (2008) Wireless client puzzles in IEEE 802.11 networks: security by wireless, Proceedings of the first ACM conference on Wireless network securityGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Mitko Bogdanoski
    • 1
  • Pero Latkoski
    • 2
  • Aleksandar Risteski
    • 2
  1. 1.Military Academy General Mihailo ApostolskiSkopjeRepublic of Macedonia
  2. 2.Faculty of Electrical Engineering and Information TechnologiesSs. Cyril and Methodius University in SkopjeSkopjeRepublic of Macedonia

Personalised recommendations