Selfish attacks in IEEE 802.11aa networks with intra-AC prioritization

The 802.11 standard is prone to selfish attacks performed by insiders, i.e., correctly authenticated stations. The recently released 802.11aa amendment is likewise prone to such attacks because the mechanisms which it provides can be selfishly configured by insiders to raise their QoS. In this paper, we present the first security analysis of 802.11aa by investigating selfish insider attacks against the intra-AC prioritization feature. Our analysis shows that 802.11aa is susceptible to already existing attacks as well as attacks previously not considered. Furthermore, our research shows the extent to which an attacker can benefit from these types of selfish behaviors. Therefore, we can identify which mechanisms should be augmented with countermeasures to protect 802.11aa networks from selfish attackers.

[1]  Szymon Szott,et al.  Impact of Misbehaviour on QoS in Wireless Mesh Networks , 2009, Networking.

[2]  Szymon Szott,et al.  What's new for QoS in IEEE 802.11? , 2013, IEEE Network.

[3]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[4]  Katarzyna Kosek-Szott A Throughput Model of IEEE 802.11aa Intra-Access Category Prioritization , 2013, Wirel. Pers. Commun..

[5]  Antonio de la Oliva,et al.  Performance evaluation of the IEEE 802.11aa multicast mechanisms for video streaming , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[6]  Szymon Szott,et al.  An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes , 2010, EURASIP J. Wirel. Commun. Netw..

[7]  Ilenia Tinnirello,et al.  Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  Jose Miguel Villalón Millán,et al.  Evaluation of the IEEE 802.11aa group addressed service for robust audio-video streaming , 2012, 2012 IEEE International Conference on Communications (ICC).

[9]  Marek Natkaniec,et al.  IEEE 802.11aa intra-AC prioritization - A new method of increasing the granularity of traffic prioritization in WLANs , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[10]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[11]  Szymon Szott Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.

[12]  Marek Natkaniec,et al.  A novel IEEE 802.11aa intra-AC prioritization method for video transmissions , 2014, 2014 IEEE Global Communications Conference.

[13]  Szymon Szott,et al.  Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..

[14]  Ilenia Tinnirello,et al.  Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.

[15]  Szymon Szott,et al.  The risks of WiFi flexibility: Enabling and detecting cheating , 2013, 2013 Future Network & Mobile Summit.

[16]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[17]  Szymon Szott,et al.  Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks , 2014, IEEE Transactions on Wireless Communications.