Security Association (SA) Teardown Protection – Part 2

The interested Reader can look at Part 1 of the series here <Security Association (SA) Teardown Protection – Part 1>

The different scenarios for SA security Teardown Protection and the message handling at that instance is provided below

Scenario 1 – AP receives an association request from an Associated client – non-attack scenario

The First scenario is the case where an associated 802.11 station loses connectivity with the AP due to signal conditions. The series of events is explained pictorially below

Scenario 2 – A rogue client tries to attack the network

The second scenario is when a rogue client tries to perform a replay attack spoofing an associated client in the network. The scenario is shown pictorially below

Scenario 3 – disassociation frame sent by an Access Point

An Access point might lose its encryption keys on a reset or be rebooted in which scenario it would send a disassociate frame to all stations before going down. In such a scenario the below procedures are followed

Scenario 4 – Disassociation frame sent by an rogue 802.11 station acting as rogue AP

 

Introduction to 802.11ax (WiFi 6/e)

Comments

  1. Dayal Madhukar rai

    Very good article ..simple short and p
    Completely perfect 🙂

  2. Vivekanand Holla

    Thank you

Leave a Reply

Your email address will not be published. Required fields are marked *