Physical-Layer Spoofing in WiFi 6 to Steer the Beam Toward the Attacker

Tiep M. Hoang, Alireza Vahid, Douglas C. Sicker, Ashutosh Sabharwal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security threats of an IEEE 802.11ax (WiFi 6) system can occur throughout the layers of the protocol stack. Looking at the security aspect of the physical layer and from an attacker's perspective, we present how a spoofing attack can cause an access point to steer the beam dedicated to a legitimate user toward the attacker. More particularly, we propose the BeamSteal attack that takes advantage of the vulnerability of the beamforming feedback (BFF) mechanism. The purpose of the BeamSteal attack is to cause the access point to receive the wrong BFF -information-bearing bits and end up steering the beam toward the attacker instead of the legitimate user. To contrast the harmful effect of the proposed attack, we compare it with two benchmarks, namely the no attack case and the jamming attack case. Our numerical results show that the BeamSteal attack not only degrades the performance of the legitimate user, but also helps the attacker improve its performance significantly.

Original languageEnglish (US)
Title of host publicationICC 2024 - IEEE International Conference on Communications
EditorsMatthew Valenti, David Reed, Melissa Torres
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4006-4011
Number of pages6
ISBN (Electronic)9781728190549
DOIs
StatePublished - 2024
Event59th Annual IEEE International Conference on Communications, ICC 2024 - Denver, United States
Duration: Jun 9 2024Jun 13 2024

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference59th Annual IEEE International Conference on Communications, ICC 2024
Country/TerritoryUnited States
CityDenver
Period6/9/246/13/24

Keywords

  • 802.11ax
  • physical layer security
  • WiFi 6

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Physical-Layer Spoofing in WiFi 6 to Steer the Beam Toward the Attacker'. Together they form a unique fingerprint.

Cite this