Detection of MAC Spoofing Attacks in IEEE 802.11 Networks Using Signal Strength from Attackers’ Devices

Author(s):  
R. Banakh ◽  
A. Piskozub ◽  
I. Opirskyy
2018 ◽  
Vol 2018 ◽  
pp. 1-15
Author(s):  
Jung-Han Han ◽  
Hyoung-Gyu Choi ◽  
Seung-Jae Han

Even if a collision occurs in IEEE 802.11 network, a transmission may be successfully decoded at the receiver if the signal strength of one transmission is sufficiently stronger than the other transmission. This phenomenon is called “Physical Layer Capture” (PLC). While existing works have considered PLC between data frames, in this paper we investigate the case that an ACK frame collides with the unfinished transmission of other data frames after the occurrence of PLC between data frames. As a result of this collision, the ACK frame may be corrupted and the corresponding data frame needs to be retransmitted. We call this phenomenon “ACK Corruption” (AC). We identify the characteristic of AC via extensive experiments and simulations. Our study reveals that AC can occur in all IEEE 802.11 variants and its chance is dependent upon the relative signal strength between the stations and the MCS setting used. Further, we devise a way to avoid AC occurrence and evaluate its effectiveness.


2009 ◽  
Vol 16 (4) ◽  
pp. 943-953 ◽  
Author(s):  
M. Ciurana ◽  
F. Barceló-Arroyo ◽  
S. Cugno

Sign in / Sign up

Export Citation Format

Share Document