An Analysis of the Impact of the AuthRF and AssRF Attacks on IEEE 802.11e Standard

  • Mitko BogdanoskiEmail author
  • Pero Latkoski
  • Aleksandar Risteski
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 159)


The paper shows detailed analysis of the effects of the AuthRF (Authentication Request Flooding) and AssRF (Association Request Flooding) MAC Layer DoS (Denial of Service) attacks on 802.11e wireless standard based on a proposed queuing model. More specific, the paper analyzes the Access Point (AP) behavior under AuthRF DoS attacks with different frequency of the requests arrival, i.e. Low Level (LL), Medium Level (ML) and High Level (HL), at the same time considering different traffic priorities. The proposed queuing model and the developed analytical approach can be also used on each protocol layer, especially if the attacks are seen in terms of the flooding influence over AP with too many requests (ICMP, TCP SYN, UDP etc.).


Denial of service Flooding attack MAC layer Queuing model AuthRF AssRF 802.11e 


  1. 1.
    Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59–73 (2013)Google Scholar
  2. 2.
    Cisco Systems, Inc., Cisco Wireless Control System Configuration Guide, Software Re- lease (2011)Google Scholar
  3. 3.
    IEEE Standard for Information Technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 4: Protected Management Frames. IEEE Std. 802.11w-2009 (2009)Google Scholar
  4. 4.
    Liu C., Yu J., Brewster G.: Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs. In: IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM), Montreal, Canada (2010)Google Scholar
  5. 5.
    Liu, C., Yu, J.: A solution to WLAN authentication and association DoS attacks. IAENG Int. J. Comput. Sci. 34, 31 (2007)Google Scholar
  6. 6.
    Liu, C., Yu, J.: Detail derivations of Tr, Ta, t2, and t5 (2009)Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Mitko Bogdanoski
    • 1
    Email author
  • Pero Latkoski
    • 2
  • Aleksandar Risteski
    • 2
  1. 1.Military Academy “General Mihailo Apostolski”Goce Delcev UniversitySkopjeMacedonia
  2. 2.Faculty of Electrical Engineering and Information TechnologiesSaints Cyril and Methodius UniversitySkopjeMacedonia

Personalised recommendations