Wi-Fi 6 (IEEE 802.11ax) has introduced a lot of improvements in wireless transmission with features such as Orthogonal Frequency Division Multiple Access (OFDMA), Multi-User Multiple Input Multiple Output (MU-MIMO) and Target Wake Time (TWT) in terms of both capability and effectiveness. In recent days several security risks have remained unaddressed, and most of them reside at the Medium Access Control (MAC) layer. Students seeking to understand these threats and solutions can benefit from assignment help writing as this proposal aims at identifying security threats, evaluating existing solutions, and recommending improved methods to combat these threats. These measures of security refinement will be designed and prototyped through the simulation of MATLAB while observing strict ethics endurance and the policies against the violation of data privacy laws..
Wi-Fi 6 (802.11ax) is the latest development in the wireless technology interface, which has received enhanced demand for higher data rates and network performance. Unlike its earlier versions, for instance, 802.11n and 802.11ac, Wi-Fi 6 upgrades the throughput, security, and efficiency in great measure [27]. As wireless networks have become an essential part of daily life, both for home and business use, the throughput of Wi-Fi standards has risen from 2 Mbps to multi-gigabit, a growth three figures higher. This has led to exponential growth of the internet, which has introduced new challenges such as; unreliable networks.
Due to the factors of demand for speedier, and larger capacity wireless technology, there has been a steady evolution of Wi-Fi standards such as 802.11n, 802.11ac then to 802.11ax. Wi-Fi 6 is based on the previous standards and integrates newer techniques to improve the interface's user benefits, high performance density, and multiple applications [22]. Nevertheless, security is still a serious issue of concern even within these manners. With extended use of wireless technologies, new threats arise regarding secure technologies needed for such environments as hospitals, production sites, etc. The main function of this layer is the control of data transmission in a network, and that’s why it is regarded as the model that ensures the proper security of Wi-Fi connection [23]. Improving this layer defense can help lessen the effects of cyber threats and protect the trespassers of wireless networks integrity and confidentiality.
MAC address randomization also increases privacy in the IEEE 802.11ax (Wi-Fi 6) standard by using temporary random MAC addresses during network probe request/response where device permanent identities are usually hidden. Shutting down this feature minimises privacy concerns such as profiling, tracking, and sneaky surveillance. In dense areas and high workloads, it disallows the adversary to monitor device’s movements or link related actions within sessions and thereby minimize the risk of attacks. It does not address the issue of data interception but aligns with 802.11ax in providing enhanced encryption and authentication for privacy and security. MAC address randomization is useful for protecting the users in public and enterprise networks and anonymity, in a gradually more connected world. The corresponding constant effort in search of better security measures for Wi-Fi 6 is therefore crucial to counterpin emerging threats that would otherwise cause grave world losses.
The evolution in wireless network technologies especially in the Wi-Fi 6 (IEEE 802.11ax) has enhanced wireless network performance while at the same time adding to new threats especially at the MAC layer. These vulnerabilities consist of spoofed PS-Poll based DoS attack, contention attack, MAC address spoofing and battery drainage attack all of which are a serious threat to the network security and performance. The existing risks are particularly compromising in sensitive areas including hospitals and businesses whereby very reliable and safe wireless communication is of paramount importance. Closing such security loopholes, while at the same time, meeting the performance benchmarks defined under the Wi-Fi 6 specs remain a very pressing concern hence the otherwise urgent call for better MAC layer security.
Aim: This work is purposely conducted to enhance the security of the MAC layer of Wi-Fi 6 (IEEE 802.11ax) with strategies against the vulnerabilities as well as providing solutions for the further enhancement of Wi-Fi 6 networks to provide better performance as well as efficiency.
Objectives:
Thus the significance of this work is hinged on the increasing usage of Wi-Fi 6 (IEEE 802.11ax) as a core foundation of current wireless networking systems. With organizations, businesses and public services advancing the dependency of their operations on wireless technologies, the requirement for secured and high performing networks intensifies. Wireless access is dominating the current trends, and therefore, Wi-Fi 6 will help to increase speed, capacity, and efficiency to meet this need. However, similar to any new evolving technology, Wi-Fi 6 presents a new wave of security challenges specifically in the MAC layer, which controls access to the network and how devices communicate [24]. This project is important because it provides landmarks in the MAC layer of Wi-Fi 6, from where attackers can launch attacks against networks denying them service or stealing data from them.
Since Wi-Fi 6 continues to be deployed in sensitive contexts both personal and business establishments, institutions and industrial establishments, for wired Internet, protecting these networks becomes essential to counteract any attempts at intrusion, sabotage, or other unfavourable activities [25]. Through the solutions to increase MAC layer security, this project will help increase the dependability and trustworthiness of the Wi-Fi 6 network. The information gathered for this research will be valuable and beneficial to companies and organizations that wish to install new wireless networks or upgrade existing ones, their aim and goal being to achieve the enhancement of wireless security. As with the prior generations, improved security mechanisms for Wi-Fi 6 will not only safeguard information but will also instill confidence in the users about wireless technologies.
This research will keep a strict ethical consideration, and other issues concerning data protection and research investigation. Stakeholders will ensure that they practice high levels of ethical practice like citing and not plagiarizing, and performing research without bias. In GDPR and the UK data protection law will be complied with, such measures as access control, risk assessment and conditions will be met [26]. All data will be processed carefully in closed systems and simulation based activities will be performed without interference with actual networks. This manuscript reflects that the research proposal will be submitted to an institutional review board to resolve ethical issues.
Media Access Control also known as MAC layer is very central to the efficiency and security of Wi-Fi 6 networks. The main impact of Wi-Fi 6 and the rising shift to it as a result of the high connection rates and density support is the creation of new opportunities for attackers. Improving MAC layer security has become the primary major strategy when it comes to security risks such as gains, Interception, and DoS attacks. This chapter presents a literature survey on MAC layer security in Wi-Fi 6 network and presents innovation, future directions and observational remarks including the endpoint that novel security solutions are required to conquer the upcoming security threats.
According to the work of Links, C 2022, Wi-Fi technology has come a very long way and is improving rather constantly, and has totally revolutionized the way we connect to the internet. It can be seen, starting from 802.11-1997 standard Wi-Fi started with just 2 Mbps and current Wi-Fi 6 (802.11ax) has the speed of 9.6 Gbps and future Wi-Fi 7 (802.11be) will have even higher speeds. Each new generation of Wi-Fi has made enhancements in speed, range and reliability because of advancement in technologies like MIMO technology, wider channel bandwidths employed and use of higher frequencies.
From providing simple wireless LAN connection to current capabilities of transferring high speed data for multiple devices ranging from smartphones to IoT devices indicate that Wi-Fi is indeed a crucial support tool for today’s communication. As additional standards are still being developed, the Wi-Fi 7 is anticipated to extend the speed of up to 46.1Gbps, Wi-Fi will continue to facilitate the digital economy enabling new, faster, more efficient, and reliable connections required by the increasingly connected society. Constant development of WI-FI technology guarantees its role as an infrastructure of wireless communication in the near future.
According to the work of Mozaffariahrar, E, et al. 2022, Some of the new profound technological advancements incorporated in the Wi-Fi 6 (IEEE 802.11ax) include; An important one is the Orthogonal Frequency Division Multiple Access (OFDMA), in which multiple devices can be accessed at the same time and the composing available band in smaller resource units (RUs). This helps cut on latency and contention, especially considering there are more devices connected to a network in question. For example, Wifi 6 also improves what’s known as Spatial Reuse (SR) through a process known as BSS coloring, which moves devices away from other access points on the same channel, leading to an improvement in the quality of the network.
Another significant innovation is Target Wake Time (TWT) considering an optimal wake time to save battery power and improve the functionality of IoT devices connected to it. MU-MIMO in ‘Wi-Fi 6’ supports both Uplink and Downlink; in other words, multiple devices can transmit and receive multiple data streams at the same time, enhancing the throughput and the density of the network. The application of 1024-QAM raises data transfer rates through the use of more than two bits for each symbol transmitted. Using up a 6 GHz frequency band in Wi-Fi 6E offers wider channels, fewer interferences, and lower latency, which adds more values to the Wi-Fi 6. All these enhancements make Wi-Fi 6 suitable for mission-critical applications, and environments where many devices want to connect at the same time or interact with IoT networks, and offer faster and more reliable wireless connections.
According to the work of Yin, W., et al. 2020, The rate control in the media access control layer MAC of Wi-Fi 6 (802.11ax) is vital for achieving improved efficiency of today’s wireless systems. New to Wi-Fi 6, several novel functioning techniques enhance throughput, alleviate congestion, and make the wireless experience more enjoyable for internet users. The basic problem at MAC layer relates to the selection of transmission rate for the current network situation – signal strength, traffic load, capabilities of the devices etc. Wi-Fi 6 innovates Multi-User MIMO (MU-MIMO), making it possible to transmit to many users at the same time resulting in increased throughputs and lower latency. That said, this technique poses numerous challenges in rate control such as: hardware constraints; interferences; and lack of full CSI feedback from users. Because of this, it is challenging to obtain the best arrangement of users for MU-MIMO groupings.
Wi-Fi 6 offers dynamic transmission power and transmit power control for access point plus Clear Channel Assessment (CCA) level. Through these parameter tuning, the network performance can increase the spatial reuse and the offered throughput. But, it decreases the transmission power and increases the packet errors which in turn decreases the overall transmission rates and this is a crucial factor in consideration when choosing an optimal rate adaptation strategy. New rate control mechanisms for Wi-Fi 6 have to overcome these threats, while fulfilling the important aims of effective resource management and the maximum attainable throughput in modern wireless environments.
According to the work of Teca, G and Natkaniec, M 2023, MAC address randomization increases security in IEEE 802.11ax networks because it counteracts experiments that track devices relying on their MAC addresses. This feature provides anonymity during the network discovery, for example, active during the layer discovery, by periodically changing the random MAC addresses which are disposable. Randomizing and thus, masking the device’s permanent identity protects from profiling and unauthorized monitoring of user’s activity. Where dense device environments and higher IoT adoption in Wi-Fi 6 (802.11ax) networks are important, MAC address randomization is essential.
This reduces the chances of targeted attack or data ex-filtration since it complicates the mapping of device movement across the network or correlates activity of successive sessions. Furthermore, randomization assists in avoiding position tracking in BSSID based networks for users in public and enterprise networks. When combined with other forms of security in 802.11ax, the technique is quite useful, including improved modes of encryption and smooth authentication. MAC address randomization does not prevent or mitigate data interception and unauthorized access but enriches the security landscape of Wi-Fi 6 and enhances user privacy in continuously integrating and evolving wireless environments.
According to the work of Lee, K.H., 2019, For multi-user multiple-input-multiple-output (MU-MIMO) user selection in 802.11ax based Wi-Fi network, Orthogonal frequency division multiple access (OFDMA) has been shown as a potential solution to improve the overall system throughput. OFDMA multiple users can transmit data at a given time through the availability of subchannels hence there is minimum interference and less use of preamble compared herein especially in high traffic areas. For exponential use of MU-MIMO, the Access Point (AP) must obtain Channel State Information (CSI) from users to ensure the most appropriate directions of transmission. In general, CSI acquisition imposes considerable overhead because of the need for feedback, which may actually negate any improvement offered by MU-MIMO.
To tackle this, a new method termed MUSE (MU-MIMO User SElection) jointly combines OFDMA with Beamforming MU-MIMO by employing CSI feedback obtained from uplink OFDMA transmission for selecting downlink MU-MIMO users. The AP employs the AP estimate of CSI during link transmissions in making a decision on the best set of users for MU-MIMO, hence enhancing system efficiency and throughput. This method frees up protocol overhead, which in situations of high fundamental network density, results in better overall network utilization in 802.11ax-based Wi-Fi networks.
According to the work of Xia, Z 2022, OFDMA is perfect for Wi-Fi 6 due to the potential it has to provide more efficient distribution of channel resources. While in OFDM, users need to occupy the whole channel; OFDMA partitions the channel into subcarriers, and users can transmit at the same time. This increases bandwidth and network velocity or through realizing the centralized wireless network thereby mitigating latencies in utilization hence boosting the whole network utilization in areas of high density. Furthermore, OFDMA can provide finer channel resource allocation according to the channel condition to enhance the QoS and support more simultaneous users with the different amounts of bandwidth requirements, which is very complementary to Wi-Fi 6’s superior performance features.
According to the work of Coleman, D 2022, WPA3 can be considered as the best since it has the level of security for Wi-Fi 6 that matches the impactful performance of Wi-Fi 6. WPA3 has Simultaneous Authentication of Equals that improve password protection as well as be resistant to password guessing attacks while also providing strong encryption methods. This one also requires management frame protection (MFP) to improve the stability of the network. The WPA3-Enterprise supports cryptographic strength up to 192 bits, which means that it offers better protection to become a perfect Wi-Fi 6 network that demands higher performance and better security. As for compatibility, it also facilitates smooth compatibility transfers addressing legacy equipment while disallowing for weak protection of the newer ones.
According to the work of Souilah, H., et al. 2019, Spoofed PS-Poll based DoS attack affects Wi-Fi 6 (IEEE 802.11ax) networks especially PSM where the devices sleep and do not know of the security threats. This attack involves an intruder forwarding a fake PS-Poll frame on the behalf of an authorized user. This frame makes the access point (AP) to transmit data buffered for this client while the client is in its sleep mode. As it turns out, PS-Poll frames are not authenticated or subsequently protected using WPA3, and consequently, the AP transmits the data to the attacker who gains unauthorized access to the data. The attacker can also flush the AP’s buffer subsequent to receiving an acknowledgment for the spoofed frame.
Even with Wi-Fi 6 increasing the spectrum efficiency and performance in high-density environments, PSM threat issues are still present because the management and control frames are still unshielded. In order to preclude this susceptible condition, options such as authenticated power save poll (APSP) are suggested. All these solutions use prime factorization and hence the attacker working on the spoofing attack would have to spend many computations in factoring the large integers employed in the solutions. It offers a security layer that would minimize the spoofed PS-Poll attack and has low communication, computation and storage complexity. Proposed approach of improving the security in Wi-Fi 6 does so without a substantial loss of speed.
According to the work of Masud, F, et al. 2023, Contention-based traffic priority MAC is critical and mandatory for WBAN, to meet the priority traffic requirement to allow for efficient communication of heterogeneous Biomedical Sensor Node (BMSNs). These protocols help to reduce differences in the collision of the packets by the sack arrangement of the paramount traffic, delay sensitive. However, several challenges are normally encountered in their implementation. First, contention based access mechanisms such as Slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) brings scalability and low delay However, it reduces the network throughput since several nodes contend for the channel that is needed to be accessed.
This results in higher PDD, reduced throughputs and increased energy consumption rates towards fulfilling the intended communication goal. Trade-off between power conservation and achieving higher data transfer rates emerges as important and is especially challenging because of energy constraints in WBANs. Further, various prioritization techniques, for instance, extending Backoff Exponent (BE), Contention Window (CW) or modifying the Backoff Counter (BC), come with their own constraint in stabilizing the overall flow in the network. In general, contention-based MAC protocols provide better traffic prioritization with several problems in achieving the best results for various healthcare applications.
According to the work of Banakh, R, et al. 2019, MAC spoofing is an important security threat in Wi-Fi networks mainly because the attacker can spoof the MAC address of his device to mimic legitimate clients or APs. The MAC address as a hardware address of the particular network interfaces, play an important role to authenticate and to filter the devices in IEEE 802.11 network. Nevertheless, MAC addresses can be altered or ‘ spoofed’, which makes a bypass of MAC filtration possible, and this is a common method used in implementations of network security.
This weakness allows several such as Evil Twin and Denial of Service (DoS). In an Evil Twin attack, an attacker sets up an AP that has the same name as a real AP, making the users connect to him. When connected they can view the contents of the user’s information, an aspect that makes them vulnerable to tampering. Also, the attacker can use signal boosting to pull devices from legitimate APs, using the fake MAC address created to do this. This is because the creator of the networks lacks practical ways of preventing such attacks through inadequate authentication in the primitive IEEE 802.11 standard. Some solutions have been proposed for instance dynamic MAC address filtering but generally, prevention of MAC spoofing is not a trivial problem especially when considering the trade-off between security and convenience in wireless settings.
According to the work of Lee, et al. 2020, Battery Drain Attacks (BDAs) target certain functions of lithium-ion batteries and power management features within wireless devices, laptops, IoT gadgets, and portable wireless smartphones. These sort of attacks go after a low power mode or ‘doze mode’ through which Wi-Fi devices briefly withdraw from the network in order to conserve energy in between bursts of usage. In a BDA, a strict attacker transmits wake-up trigger frames to a device that resides in the doze mode, thus keeping it awake and repeatedly participating in network activities. Therefore, instead of its normal absorption rate, the device quickly drains its battery power in a very short time. This is the security problem because initially Wi-Fi standards like IEEE 802.11a/b/g mediums were focused on performance and QoS.
These standards did not take into consideration attacks which may take advantage of power save mode. Despite advancements made to current Wi-Fi standards and the integration of Wi-Fi into essential sectors such as home automation, medical, and industrial ‘Internet of Things’, these loopholes persist because the contemporary versions of the Wi-Fi standards are compatible with older ones. The results of experiments have shown that the consumption of the device’s battery resource in connection with the functioning of BDAs can increase by 1.4 times, significantly affecting battery resource. This makes Wi-Fi-based devices including those with restricted power like the smartphones, and IoT sensors to be easily pranged into denial of service attacks. Solutions to the threat are higher authentication mechanisms, increased surveillance, and improvements in the handling of sleep and similar power management modes.
2.3.1 Technical Advancements in Wi-Fi 6
OFDMA (Orthogonal Frequency Division Multiple Access): Wi-Fi 6 (802.11ax) incorporates OFDMA in order to increase a network capacity by subdividing the channels. This makes it possible for several devices to broadcast information at the same time in a single channel in a manner that they will not cause an overlap [15]. OFDMA greatly decreases contention and increases actual channel throughput as a result making it suitable for applications like streaming, gaming and smart house systems.
MU-MIMO (Multi-User Multiple Input Multiple Output): The Wi-Fi 6 built on the MU-MIMO technology where multiple data streams can be transmitted to the multiple devices [18]. Further, unlike the previous generations, which could only support MU-MIMO only on the downlink Wi-Fi 6 supports both uplink and downlink [17]. It does this to reduce latency and increase total throughput, which benefits scenarios with high device per area such as offices, stadia, and blocks of flats where many users need connection at the same time.
1024-QAM (1024 Quadrature Amplitude Modulation): In Wi-Fi 6, 1024-QAM also increases spectral efficiency because at the same layer of bandwidth, more data can be transmitted. This is done by encoding 10 bits of data per symbol as opposed to 8 bits per symbol, used in 256-QAM [19]. This data rate enhancement contributes to the overall throughput thereby enabling faster application speeds for applications such as video, Virtual Reality and large data transfer thus enhancing the user experience in high activity conditions.
TWT (Target Wake Time): TWT is a power-saving mechanism in Wi-Fi 6 that provides the best schedule for transmitting power for IoT devices [20]. They can enable their attached devices to ‘wake up’ at selected time intervals and exchange data and thus they don’t require constant scanning and consequently wastage of energy. This is especially important for the IoT devices powered by batteries, ranging from smart sensors to wearables, as well its effect on efficiency in Wi-Fi 6 networks on a large number of IoT devices.
BSS Coloring: Based on the insights about Wi-Fi 6, Basic Service Sets (BSS) Coloring is a particular feature designed for decreasing interference of the overlapping BSSs in dense areas. Devices are then able to distinguish signals from different BSSs by colouring each BSS [21]. This enables devices to operate independently from the other BSSs which results in less contention hence improving on the throughput achieved. BSS Coloring improves performance in situations such as having multiple Wi-Fi networks in apartments, stadiums or in large office buildings.
MAC Layer in Wi-Fi
Media Access Control commonly referred to as MAC is a layer that is part of the data link layer in networking and is specifically in charge of who gets to access the physical media. It outlines protocols for naming systems, getting access in the channel and controlling the interactions between devices in a network. In Wi-Fi systems, the MAC layer plays roles as forming, addressing, error detection, and collision, which are crucial to provide high efficiency and reliability especially in the current generation Wi-Fi 6.
UL and DL Data Transmission Enhancements: Wi-Fi 6 brings massive enhancements in UL and DL throughout the usage of methods like OFDMA [16]. OFDMA very much supports transmission of data to multiple users at the same time by dealing with the sub-divided channels and thus reducing contention charges and increasing throughput. Further, MU-MIMO support for both uplink and downlink increases available data rates and system efficiency in high population density areas.
Get assistance from our PROFESSIONAL ASSIGNMENT WRITERS to receive 100% assured AI-free and high-quality documents on time, ensuring an A+ grade in all subjects.
Hybrid MU-MAC System: Wi-Fi 6 utilizes two types of communication, the legacy and multi-user (MU) MU-MAC system [14]. This system enhances access since multiple devices can communicate efficiently and with less interference and more network capacity is created. It also permits multiple citizen use of the same channel at the same time, enhancing system overall performance, primarily in zones that congest the network, optimizing the performance of all devices that are under the system.
Spatial Reuse Mechanisms like BSS Coloring for Spectrum Efficiency: The latest Generation of wireless technology known as Wi-Fi 6 includes spatial reuse methods like BSS coloring. BSS coloring helps in clarifying the difference between devices in the overlapping networks by reducing interferences and enabling the concurrent use of the same frequency channel [13]. This feature increases robustness of the network, particularly in high dense environments, since it can minimize interference from neighboring networks and allocating channels to the available space effectively.
Security: WPA3 Personal is currently the most secure Wi-Fi protocol – it runs smoothly with Wi-Fi 6 (802.11ax) devices [30]. It offers better encryption and authentication than the existing ones and thus increases the security of data in the network. WPA3 improves on the area of privacy more than WPA2 in that it will employ a more promising encryption technique as compared to the earlier versions [11]. It also helps prevent offline dictionary attacks, an option that makes it more secure for the users. The newest and more secure Wireless Protected Access is WPA3 which is implemented in Wi-Fi 6 devices, which is why one should choose it for their modern secure wireless networks. Still, it also allows interfacing with devices that only support WPA2/WPA3 Transitional.
Advanced Encryption Standard: WPA3 is secure and can work with AES (Advanced Encryption Standard) which is a better encryption as compared to AES previously used by WPA2. For transmission security, data in WPA3 is encrypted using AES which provides greater security and privacy against possible interception of the Wi-Fi network. WPA3 utilizes GCMP-256 that has better security for any sensitive data than that of WPA2 [12]. This makes WPA3 with AES especially suitable for protection sensitive areas for example corporate networks or open networks. On the same note, AES encryption in WPA3 also counters what is referred to as offline dictionary attacks, which was seen in other WPA earlier versions.
The increasing adoption of IoT devices in Wi-Fi 6 networks increases security threats exponentially, and how to address those concerns effectively when it comes to device identities and onboarding [28] On the same token, there are no well-defined methods of handling cross-layer threats, which is the ability of any threat layer to impact the entire network construction. Furthermore, processes to respond to highly adaptive security that has the potential to counter shifts in threats within high density areas are still scarce, making the networks open to the new shift in threats.
This leaves areas such as behaviour, data and other forms of security as areas that require more focus in future research with a view to providing integrated solutions to the same [29]. This is with respect to developing new methods for threat detection in real-time, developing strong interoperability protocols, and making certain that all the layers within the network are integrated to offer end to end protection. In this way, the security of Wi-Fi 6 networks can be strengthened greatly to protect it against the threats occurring in today’s wireless environment.
Research on Wi-Fi 6 networks so far has primarily been geared toward improving security of the Medium Access Control (MAC) protocol layer. These studies propose enhancements like protection measures for security threats like spoofing, eavesdropping and denial of service attack; enhanced forms of authentication processes; enhancement of features governing the allocation of radio resources. These happen to play a massive role in ensuring the basic security of Wi-Fi 6 though they often focus on the MAC layer which might cause the neglect of other important layers that are decisive in the course of network security. One of the major voids emerging, however, is the inadequate analysis of a comprehensive security paradigm with effective improvements at the MAC layers above. Other areas like application layer security, security measures against hardware on physical layer and end to end data security solutions are still somewhat limited.
2.5 Conclusion
Thus it can be concluded that improving the security of the MAC layer for Wi-Fi 6 is therefore central to securing today’s wireless communication. Although significant developments have been achieved in response to particular risks, issues cited as incorporating contextual components include network environments, growing IoT interactions, and advanced hacking efforts. According to the literature, even though MAC layer enhancements increase networks’ protection, the utilization of multiple other layers is crucial to safeguard Wi-Fi 6 environments. For future work, the complete integration of MAC layer modifications and security solutions and technologies in all layers to prevent risk effectively and support reliable connectivity must be suggested.
3.1.1 Overview of the Approach
WIFI 6 also known as the IEEE 802.11ax is a great enhancement in the technology since it mainly emphasizes efficiency, security and performance improvement. An important facet of this advance is the improvement of the MAC layer which focuses on current security threats [33]. The simulation is conducted in MATLAB based on the enhancements of MAC layer security achieved by employing various technologies including MAC address randomization and WPA3-like encryption. Thus, much lesser tracking and privacy related problems associated with the fixed MAC systems can be addressed by combining arbitrary MAC addresses. Furthermore, to encrypt data transmitted and received to ensure the payloads are encrypted, the simulation employs WPA3-like techniques. This approach also covers the movement of the nodes; packet interception using OFDMA and MU-MIMO capabilities for security; and counter-replay attacks while emphasizing the time stamp integrity in secure wireless transmission.
3.1.2 Research Method
The research adopted a simulation based scenario study to explore up and coming security contributions to Wi-Fi 6 at the MAC layer and its objectives included the execution of privacy, integrity, and efficient communication.
Simulation Environment Setup: The simulation was carried out in MATLAB to design Wi-Fi 6 network environment. The nodes of a wireless network were standardized with arbitrary MAC addresses to enhance privacy due to continued tracking of devices. This topology models real networks well, giving a good base to compare MAC layer security protocols efficiently.
MAC Address Randomization: To ensure privacy the simulation assigned random MAC addresses to every node to avoid device tracking [34]. This feature reduces some threats associated with static IDs to make it difficult for the attacker to mark the device. The abilities of this approach were evaluated based on the network performance changes and privacy improvements.
Encryption Mechanisms: To emulate WPA3-like encryption the simulation provided MAC physical layer payload protection [35]. This concept utilised strong encryption to secure data transmission to avoid any intrusion to occur to its information. This was proved through the simulation of encrypting packet payloads in the data frames hence showing improved security, contrary to Wi-Fi6, which is aimed at fortifying confidentiality in the communication.
Node Mobility Modeling: In order to mimic real world node mobility, where devices are constantly in motion, node mobility was modelled in MATLAB. We defined the parameters of speed, radius and directions to come up with different situations [36]. This mobility modeling was crucial for the evaluation of security measures of MAC layer resistance against different spatial organization of protocols.
OFDMA and MU-MIMO Simulations: Security was examined through two technologies: Orthogonal Frequency-Division Multiple Access (OFDMA) and Multi-User Multiple Input Multiple Output (MU-MIMO) [37]. These features enabled perfect control for stream assignments in a spatial environment and realistic modelling of channel access probability whilst at the same time minimizing probability of packet interception in multiuser environments within MATLAB. Using such enhanced methods, the study Illustrated how Wi-Fi 6 enhances safe communication in densely populated environments.
Replay Attack Mitigation: In order to counter replay attacks, timestamping was included in the validation functions developed with MATLAB. Timestamps which were put on the packets could not give a chance for an old or duplicate pack to be resent to effectively interrupt the communication. This method equally contributed a lot in the achievement of security since it ensured that packets sent and received had not only their integrity and order preserved.
Significance of Capture Event in MAC Layer Security: The captureEvent function imitates the process of capturing packet IQ data is an essential step of studying MAC layer security in MATLAB. Security protocols and frameworks of the MAC layer are applied to standards that encompass functions like confidential works through delay and disguise of the physical address [38]. In this function the captured IQ data is analogous to the magnitude of the signal and in practical situations could potentially contain details of the transmission of packets or weaknesses. Through this capture emulation, there is an understanding of the prime need to protect communication channels and deterring accessing or intercepting information by other unauthorized means such as eavesdropping, replay attacks, and unauthorized MAC layer packet interception.
Testing and Mitigating MAC Layer Attacks in Wi-Fi 6 Networks: This simulation describes a holistic systematic strategy applied to attack detection and prevention at the MAC layer of Wi-Fi 6 networks in MATLAB. Due to this, it incorporates several security features and attack scenarios in order to study the response of nodes to different situations [39]. The important security elements in the simulation are WPA3, MAC randomization for authentication and checks to avoid spoofing and capture of packets.
Several potential threats are tested in MATLAB including spoofed PS-Poll-based DoS attacks in which the validity of the packets is checked by using authentication timestamps [40]. This aids in identification and prevention of denial-of-service attacks made by invalid packets. The backoff mechanism emulates presentation of contention based attacks, which can flood the network with a lot of delay. Specifically, the binary exponential backoff algorithm is employed to emulate the behaviors of nodes suffering from contention, from which the performance of the network under such attacks is investigated.
MAC addresses are changed in the simulation models in order to represent the phenomena of spoofing attempts. In tracking these alterations, it is possible to reverse negative alterations that threaten node security in MATLAB, through positive alterations by the system. Battery depletion is also incorporated into the attack model to show how long-term attacks may affect the node, and thus helps to design power-efficient, secure solutions [41]. On the whole, this approach enables to gain insight into the security threats at the MAC layer and makes a valuable contribution to the elaboration of effective countermeasures against the various attacks in Wi-Fi 6 networks.
MAC Layer Security Techniques: The existing MAC layer security techniques relate to encryption, and technologies like WPA3 and MACsec are applied in the Wi-Fi 6 networks in MATLAB [42]. WPA3 encryption employs a Pre-shared Key (PSK) to protect data, through secure wireless transmission. MACsec, on the other hand, offers encryption at the MAC layer, which has the capability in ensuring confidentiality, integrity and authenticity of the data transmitted. AES-GCM encryption, key management, and VLAN based encryption adds security. Moreover, the key exchange of EAPoL (Extensible Authentication Protocol over LAN) guarantees a secure communication and high MAC layer security.To capture the data in the simulation, MATLAB was used to measure the overall packets generated, the packets intercepted and the packets that had been transmitted safely.
Data Collection and Analysis: The simulation quantified the parameters of the system in MATLAB in terms of the number of overall packets generated and intercepted, as well as securely delivered. These metrics were used to assess proposed security mechanisms for their efficiency and effectiveness. The outcomes also revealed increased MAC layer security, this speaks about the efficiency of Wi-Fi 6 features at delivering secure communications [43].
3.1.3 Artefact Development
The artifact consists of random network node movement within a range and every node creating and broadcasting encrypted packets using WPA3 and AES like encryption. MAC address randomization contributes to personal privacy, while OFDMA and MU-MIMO contribute to the high data transfer rate in a multiple channel and multiple space stream. The simulation concerns the ability of generating packets, capturing them, efficacy of the security events implemented to prevent replay attacks and control data alteration. A review of this artifact reveals current technologies in Wi-Fi as well as the existing security protocols.
3.1.4 Techniques and Technologies
Target Wake Time (TWT) and BSS Coloring in Wi-Fi 6: TWT and BSS Coloring in MATLAB for Wi-Fi 6 increases MAC layer security by increasing power efficiency and decreasing interferences. TWT adapts power usage to provide wake-up times to devices, limit connectivity and possibly endanger the apparatuses with security perils [44]. This approach serves to not only save battery power but also reduce instances where devices are necessarily broadcasting they are open to receiving messages, thus reducing cases such as eavesdropping and unauthorized access attacks.
BSS Coloring improves security since it prevents overlap of other networks using the same channel [45]. In the same aspect, Wi-Fi 6 devices can ensure the nodes from different BSS are easily distinguishable from each other by using distinct BSS colors so that octopus nodes do not intercept its traffic. This controls packet sniffing and jamming attacking so that the intended communication is not jeopardized. Thus, TWT in collaboration with BSS Coloring supports enhanced MAC layers in Wi-Fi 6 and safeguard data and privacy with high population densities.
MAC Layer Security Techniques and Technologies Used: In this simulation, a number of modern approaches and technologies in network security are used to protect data at the MAC layer. The main security measure is encryption: WPA3 for end-to-end communication and MACsec for device-to-network communication both of which use AES-GCM [47]. This multipurpose encryption technique is used in Wi-Fi networks and it employs pre-shared key authentication sonstig communication. This technique is better than previous standards regarding security since it bars brute force attacks and promotes confidentiality.
MACsec, on the other hand, is applied to encrypt data in MATLAB at the Ethernet layer, preventing unauthorized access and tampering of transmitted data within a local network. In this work key MACsec is used in MATLAB for encrypting the data at the Ethernet layer of the network and LAN, nobody else has the right to decode the data being transferred in the network of a local area or LAN. Other important technology within this simulation includes the keys; key exchange and keys refreshment techniques. These processes ensure change of encryption keys in time therefore constant high security throughout communication. To also include VLAN level encryption whereby MACsec encryption key. Domain is established for each VLAN thus implying that traffic is encrypted in a different VLAN network. In addition, the simulation also covers addition of EAPoL destination MAC addresses; a critical step in the management of network security especially while applying protocols like IEEE 802.1X.
3.1.5 Testing and Validation
Enhancing MAC Layer Security through Deauthentication Attempt Detection and Mitigation: In particular, this work shows in MATLAB how the ability to identify the deauthentication attack also helps in the prevention of such an attack in Wi-Fi 6 networks, which in effect enhances the security of the MAC layer through limiting evil doers from attempting the use of deauthentication attacks. That is why here we have features like WPA3 and Protected Management Frames that are crucial in fighting deauthentication attacks. Proactively limiting the transmission rate of deauthentication attempt filled packets to a node, the program recognizes nodes that present high levels of anomalies. This is an implication that by incorporating this code more specifically in the network then one can simulate such attacks and make some assessment of the impact of such effects on the entire network. The latter helps in establishing its effectiveness when it is applied to test scenarios that relate to prospective weaknesses in current standardized security strategies such as WPA3 and PMF cases.
Testing and Validation of MAC Layer Security Protocols: The simulation of WPA3, MACsec and VLAN level encryption in MATLAB offers an adequate model for assessing the functionality in developing MAC layer security protocols [46]. However, by substituting real encryption techniques with simplified ones such as XOR, the simulation rates the operations of these protocols as far as data protection is concerned. Encryption and decryption also reflect on the integrity of the network transported traffic while key management and VLAN level encryption secures the Network traffic. As a result of these simulations, the testing phase gives the guarantee that all the protocols operate as required in the aspect of securing data at the MAC layer [49]. Verification is done here by comparing the original text and the same text as has been encrypted and then decrypted. Components-level checks of key elements are also performed, for example checking and ensuring that key refreshment and EAPoL exchanges work correctly without presenting weak or exposed keys.
Security gaps and mitigation strategies
Node Mobility and Positioning: The node mobility models simulate the motion of the wireless nodes within a given mobility range that properly mirrors actual network settings [48]. Through tracking node positions in successive frames, it assesses how mobility influences the overall performance of the network degrading factors such as interference and packet collision. This aspect is crucial for evaluating the ability of MAC layer protocols to evolve with the changes in node positions, as well as the impact of mobility on attack types such as jamming.
Packet Generation and Authentication Validation: MATLAB based simulation portrays generation of packets at the nodes and authenticates them for eradicating fake signals. It mimics real conversation periods and checks for spoofing through validation of packet authentication tokens as well as timestamp authentication. The packets that are not valid are discarded in the process replicating WPA3 security features to test the networks’ susceptibility to spoofing, particularly in wifi 6 networks that use MAC address fluctuation techniques for anonymity.
Spoofed Packets Detection: This component follows spoofed packets in MATLAB especially in PS-Poll based DoS attack where nodes send traffic intending to interfere with communication. The simulation deciphers and documents spoofed packets, evaluating the elasticity of a network to recognize as well as counteract identity-related attacks that impair the efficiency of network processes, more so during conditions of heavy traffic.
Backoff Time and Contention-Based Attacks: The simulation models the contention based attack where nodes try to delay the backoff times in the MAC layer thus increasing packet delay [50]. This is commensurate with the evaluation of the effects of such malicious manipulations on the correctness and performance of the network and the ability of the system to manage congestion as determined by the simulation response to a binary exponential backoff algorithm. The MAC layer has a contention resolution procedure and by analyzing the type of frame and the value of the backoff timer used by attackers, this analysis is essential in establishing how attacks craft disruptions on the MAC layer.
MAC Address Spoofing: MAC address spoofing is emulated in order to test the behavior of the network to nodes imitating legitimate ones [51]. The simulation monitors MAC address changes and evaluates the capacity of MAC filtering and MAC authentication for the identification and prevention of these attacks while being important for WPA3 in Wi-Fi 6 networks.
WPA3 Encryption and Payload Protection: One of the main stages of the simulation utilized the kind of WPA3 encryption to test the network’s capability of safeguarding data from eavesdropping [52]. It measures how well encryption enhances the protection of the MAC layer while denying data integrity through spoofing and other attacks.
Battery Drainage and Power Consumption: Battery lifetime is assumed to have an effect on packet transmission rates using battery capacity to simulate low power levels [53]. This assists in determining the impact of power consumption on the persisting secure communication particularly on portable or emerging internet of things devices to understand how much trade-off one has to make between security features and power requirements. This work enables us to assess the performance-over-attack overhead, specifically in a context where battery is a limiting factor, such as in a mobile or IoT-flavored constrained device.
3.1.6 Justification of the strategies
Wi-Fi 6 Design and Security Features: Wi-Fi 6 / Wireless Fidelity 6 or 802.11ax is designed using MATLAB to address the constant need for improved network and infrastructure for connectivity within dense networks relying on internet connection. Technologies such as OFDMA and MU-MIMO allow multiple device connections at the same time thus increasing network throughput. It also measures dynamic WPA3 encryption to enhance data confidentiality, to prevent unauthorized users on the network [54]. Moreover, Wi-Fi 6 has upgraded security MAC address randomization that avoids tracking users. These combined with enhanced mobility management and packet handling make sure Wi-Fi 6 offers more reliable and secure connections regardless of the density.
Threats to MAC Layer Security in Wi-Fi 6 Networks while addressing Vulnerabilities and mitigation strategies: Node Mobility and Positioning in MATLAB enhances the network’s robustness to interference and packet collision due to mobility enabling development to deal with real environments enhanced with mobility that might expose vulnerabilities such as jamming interference. Packet Generation and Authentication Validation enhances the security of the network by allowing only the packets originating from the correct authentication token and those coming within the correct timestamp. These essentially exclude spoofing attacks, which are, however, a common feature in MAC layer weaknesses especially in Wi-Fi 6 with MAC address randomization [55]. This tutorial outlines Spoofed Packets Detection in MATLAB as it breaks down attacks where an attacker disguises as another node to cause communication interference. With spoofing packets differentiated and filtered in the simulation, the defense against identity-based attacks is enhanced thereby curtailing unauthorized free traffic flow. Backoff Time and Contention-Based Attacks simulation in MATLAB determines the ability of the network to manage malice in alteration of backoff times [56]. This approach helps to prevent the denial of network access by the adversary especially if they manage to exploit confrontation resolution mechanisms so that genuine transmissions are not slowed down or denied completely.
MAC Layer Security in Wi-Fi 6: The simulation method can be applied to MAC layer security for Wi-Fi 6 since WPA3 encryption, MACsec, and VLAN-level MACsec security mechanisms are included in its design. This way, WPA3 improves the security of wireless networks by additionally increasing encryption and offering protection against attacks on stored passwords — an important task of the present [57]. MACsec uses MAC layer to develop a high level data protection and secure data transmission from any illegitimate intruder. VLAN level MACsec applies per VLAN basis encryption, hence enhancing the security on density areas such as Wi-Fi 6. It is also observed that this multi-layered approach compels the security issue thereby maintaining the confidentiality, integrity, and availability of data in the Wi-Fi 6 networks a must-have for such networks to operate effectively.
3.2.1 Analysis
The visualization illustrates the mobile wireless nodes during the simulation that consist of the Wi-Fi 6 mobility aspects. Each node operates in a fixed mobility range, and therefore can change its geographical position in the simulation process as specified in MATLAB at each iteration time step. Here we have the representation of each node and its distance from the origin over time which depicts random guidance. The mobility model makes the experiment resemble reality when nodes change their location frequently affecting the communication of the network. The motility of nodes is the key to the grasp of how the technologies of Wi-Fi 6 such as MU-MIMO and OFDMA work in dynamic networks [58].
Based on the visualization shown above, the analysis of packet generation reveals the Wi-Fi network traffic over time in MATLAB. This assists in analyzing patterns in packet transmission useful for detecting anomalies and security threats at the Media Access Control (MAC) layer [59]. By using the number of generated packets, security experts will be able to identify items as out of the ordinary, including a high packet generation rate that points to events like DoS, unauthorized access, or eavesdropping. The type of analysis that can be gained from this can help in the creation of better security measures including improved authentication, intrusion detection, and better encryption to further secure Wi-Fi 6 networks.
This depiction shows the number of captured packets by each node in a simulated Wi-Fi 6 possibly through packet interception using MATLAB. This data is used for the assessment of the security situation within the MAC layer of the given network [60]. From Packet Capture statistics, the system increases the capture rates in those nodes that seem to be compromised or malicious as in eavesdropping or unauthorized access. Due to the presented visualization, it is possible for security threats to be identified at the network level, the investigation can be performed, and measures can be taken.
3.2.2 Implementation and proof of concept
Threat Mitigation
Spoofing and DoS Attacks: This work applied authentication validation to avoid packets being spoofs as is the case with this work. Before creating packets, nodes have to authenticate themselves, and in case a node fails an authentication check (according to the time intervals between the packets), spoofing packets are identified and eliminated, thus accounting for the PS-Poll-based DoS attacks.
Contention-based Attacks: Binary exponential backoff (BEB) is applied to avoid contention based attacks including crowded networks and intentional interference with the packets in MATLAB. This mechanism ensures that everyone who wants to get access to the network will first have to wait until others who want to get access to this network will wait first.
MAC Address Spoofing: Privacy is achieved by using randomized MAC addresses and since the attackers can easily track the genuine nodes, making it difficult for them to impersonate them, the user anonymity and security are improved in MATLAB.
Packet Encryption: To make sure the transmitted packets are secure, A WPA3-like encryption is used. The AES encryption protects the information against interception and unauthorized access.
Battery Drainage and Performance: Battery status is monitored and it is avoided that low battery could cause a node to continuously send out many packets and therefore reduce its lifespan because of battery power exhaustion.
Enhancing Network Security at the MAC Layer: WPA3, MACsec, and VLAN-Level Encryption: WPA3, MACsec, and VLAN Level Encryption is the approach followed to solve several fundamental and the most crucial security threats associated with present day networking in MATLAB including violations of data integrity. However, with the current implementation of the WPA3 encryption system for securing client data against eavesdropping actions it utilizes AES-GCM encryption with pre-shared key (PSK) [63]. This encryption method further increases data privacy and renders it fairly challenging for the attackers to decipher the transmitted data. Moreover, MACsec encryption ensures the sender’s block under MAC filter from receiving any data and ensures person to person authentication of data exchanged between network devices that have an agreed and shared secret key. This minimizes the probability of data tampering or unauthorized access to the information in the course of transmission.
Furthermore, VLAN-level MACsec encryption added another level of protection to MATLAB’s security by partitioning network traffic streams based on VLANs and encrypting data within said VLANs. This ensures data in various network segments is safe and unsusceptible to attacks from unauthorized individuals. Equally important, the code also provides a solution to the problem that stems from DoS attacks which are made by changing the destination MAC address of EAPoL to safeguard the network's authentication process. However, the key management feature is a principle one that has the MACsec keys refreshed periodically to guard against exposure of the encryption keys in the long term. Altogether, these measures maintain the confidentiality of information and its integrity and availability in case of resistance to the most widespread network threats.
3.2.3 Testing and validation
This chart shows the amount of spoofed packets of PS-Poll sent in a consistent period of time with a Wi-Fi 6 network configuration. PS-Poll is an essential function in the MAC layer and is offered in Wi-Fi 6 for the transport of data. Nonetheless, the native capability for authenticating with spoofed PS-Poll packets can compromise the network’s functionality and cause denial-of-service (DoS) situations [64]. From this visual representation, it is easier for network administrators to establish the nature of their regular attacks and the right way to go about depicting the same. This visualization provides basic information on the frequency and pattern of such attacks so that the network administrators can put measures in place to prevent such occurrences. From the data, it is possible to implement the spoofs measures such as rate limiting, packet filtering and intrusion detection systems for identifying the spoofs PS-Poll making the stability and protection of Wi-Fi 6 network efficient.
This visualization represents backoff times accumulated in a Wi-Fi 6 network by the devices under contention-based attacks. Deception based attacks rely on false information whereby the attacker introduces deceiving information through the physical layer into the network, the best-known example is the carrier sense multiple access (CSMA) mechanism [65]. The collision has been exacerbated with high traffic load hindering the MAC layer from improving or maintaining the backoff times; this makes the network slow or even reach a denial-of-service condition. From these backoff times, the network administrators are in a position to view the graph to identify features such as high backoff times or sharp rise in backoff durations. They use these insights to exclude contention-based attacks hence leading to improved security and performance of the Wi-Fi 6 network.
The MAC address changes themselves are monitored and counted in the course of the simulation steps, which means the visualization can detect MAC address spoofing attempts. MAC address spoofing is a threat where a malicious MAC address is used by the attacker in illegitimate access or in escaping the attention of security controls [66]. By controlling the MAC addresses and their changes, network administrators are able to detect attackers and therefore counter them. This also makes it possible to identify other unusual patterns of MAC addresses to include; frequent or sudden changes which may be a sign of spoofing. From this information, administrative actions of MAC filtering, ACLs, and IDS can be applied to counter problems with Wi-Fi 6 networks and improve protection from unauthorized access.
This visualizes battery consumption per simulation steps and has no direct connection to the security in the MAC layer of Wi-Fi 6. Although battery drain is not a direct security threat, it can cause them because gadgets with low battery levels can be a device of vulnerabilities. For instance, low power devices are likely to be vulnerable to attacks due to poor performance and existing security vulnerabilities that may have developed from power-saving regimes. Therefore, through modeling a battery drainage process in MATLAB, subsequent power consumption by several devices present in a network can be detected as being unusually high. This may point to a malware or perhaps some other activity on the computer which is a security risk and is taking up the resources. Such problems encourage network administrators to enhance the security and stability of the Wi-Fi 6 network.
3.3.1 Evaluation of the strategies as applied for the security mitigation
This work handles following security threats at the MAC layer like the spoofed PS-Poll based DoS attacks, contention based attacks, MAC spoofing and battery draining attacks. The type of PS-Poll base DoS attacks include the impersonation of a lawful extremity in the network to deplete available resources necessary for communication in MATLAB. The code addresses this threat through WPA3 encryption for faster authentication, meaning only compliant devices can connect to the network and send a PS-Poll request connection [67]. Interference and congestion based attacks take advantage of the nature of the Wireless medium to launch attack which degrades the network performance in MATLAB. With the help of the MACsec encryption in the code, it makes the changes in network devices, their data, secure and acceptable in the case of overcrowded networks. This helps to minimize the ability of the attackers exploiting contention to inject specific traffic into the network.
MAC address spoofing attacks entails an attacker copying the MAC address of a genuine device in MATLAB (68). To this threat, the code has employed VLAN-level MACsec encryption to counter it since the keys are assigned to VLANs and the devices that protect them against impersonation of legitimate users or manipulation of MAC addresses in order to devise security breaches.
Battery drain attacks work by sending requests continually thus draining the battery. It does this through the performance of key refresh and secure encryption type protocols on threats that support the model. To reduce the frequency of battery-draining attacks, keys are updated frequently and sensitive data is encrypted so that an attacker is not likely to successfully guess when to make the communication or directly intercept it. Therefore, this code gives an overall protection against these significant MAC layer security threats.
The visualization compares the byte values of the original data with those of the same data after it has been encrypted using different methods: WPA3, MACsec feature, and VLAN level MACsec in MATLAB. The marked disparity of byte values between the original data and each of the encrypted data sets underscore the strength of these encryption schemes as means of preventing third parties from interpreting the data. The encryption process is vital for guaranteeing protection within the MAC layer within Wi-Fi 6 by ensuring that none of the information transmitted is intercepted by unauthorized parties. From such distributions of byte values, the administrators are in a position to evaluate the level of encryption offered by each method, and select the best solution concerning the security protocols.
This visualization illustrates the effects of various algorithms of encryption on MAC Layer in Wi-Fi 6 networks. In this way, when inspecting byte values of the test data compared to the data encrypted with the help of WPA3 and MACsec in MATLAB it will be seen how these protocols manage to hide the test data patterns. This blurring is important as it increases the challenge for any unauthorized persons or device to decode the information moving within the network.
The graph combines WPA3 and MACsec where changes to byte values can be easily seen, which correspond to the encrypted data, looking random [69]. Such randomness is one of the features of strong encryption because it makes it very difficult for an attacker to extract the information out of the encrypted traffic . This concern will be illustrated in the figure demonstrating how these encryption methods enhance the protection of data confidentiality and integrity within the MAC layer, and play a role in the enhancement of Wi-Fi 6 network security. By using these strong encryption measures, the managers of the network can reduce the dangers caused by listening to other people’s conversation, changing the data which is transferred through the wireless network and other threats which can endanger the security and secrecy of information flowing through the network.
3.3.2 Validation of the results
In order to verify functions of encryption and decryption it is crucial to validate the results of each stage. The validation process can be done by comparing the encrypted data with the decrypted data as well as practicing key refreshment and each of them should assure the effectiveness of the methods.
WPA3 Encryption Validation: WPA3 encryption mechanism is assumed and ‘XOR’ is used with a pre-shared key in MATLAB. In the validation the actual data is encrypted with a key and then decrypted with the same key, which is the PSK. The validation process ensures that the data that has been decrypted is indeed the same data that had been encrypted by checking back the original data. Using hexadecimal format to represent data, an assessable plot of the message encrypted and the message without the encryption specifically guarantees the transformation.
MACsec Encryption Validation: The data is then encrypted in MATLAB with the MACsec key that is shared in MACsec encryption. The encrypted data is then decrypted using the same key as that which was used to encrypt it. When decrypted data is in its original form then it is an assurance that MACsec encryption works well. A parallel bar plot is used to compare the encrypted and original data in order to confirm the efficiency of the encryption.
VLAN-Level MACsec Encryption Validation: Layer MACsec encryption also works at VLAN level, where it uses a VLAN key only. This makes it possible for the data encrypted for the VLAN such that it is not decrypted by devices in another VLAN or any other VLAN for that matter. Like MACsec, that received message is decrypted with the same key and then validation is performed so that the decrypted message is an original one. A bar plot, as shown for correct encryption and decryption, also reasserts the hypothesis.
PSK-Based MACsec Encryption Validation: Encryption is simulated for PSK-based MACsec using the XOR with a pre-shared key. The decryption process with the help of the same PSK helps to decode the original data that were encrypted. In a way, the efficiency and accuracy of the encryption are checked by comparison of the deciphered data with the original data. A merely bar plot is used as a final check where the encrypted and new data points are provided side by side.
Key Management and EAPoL Key Exchange Validation: Key refreshment enables updating of the MACsec keys from time to time in case there is a mastery. The new key is printed and used to check whether the refreshment process will go through smoothly. The EAPoL key exchange is also checked to ensure it has occurred and its success is reported on if it was successful or not.
3.3.3 Justification of the applied strategies for the security gaps
The measures to overcome different security vulnerabilities related to WPA3, MACsec, and VLAN level MACsec encryption strategies aim at improving the security features of the encrypted communication. To ensure that data is protected from unauthorized access the encryption simulations for WPA3 and MACsec are implemented, as well as the key refreshment processes. Although XOR encryption is rather less complex, they mimic the behavior of these standards of encryption to allow only the right individuals to decrypt the data using the correct keys. With this strategy, the information in the transit is protected in a good way since transforming the information back to its normal form requires a decryption key.
At the VLAN level on MACsec, the provision of keys for VLAN reduces the probability of traffic interception and decryption by devices in other VLANs and hence protection against internal threats. The key management strategy together with the periodic key refreshment maintains high security standards as keys are often changed so as to avoid a long lasting vulnerability.
Key exchange simulations performed using the EAPoL protocol indicate the strength of the secured channels and that devices agree on proper exchange and validation of encryption keys. Thus, these strategies produce a set of interconnected measures for protecting potential vulnerable points that makes confident and safe communication in networks possible.
3.3.4 Relevance of the technology
MAC layer security and configuration of Wi-Fi 6 and its operation in today’s wireless communication environment using MATLAB. Wi-Fi 6, previously referred to as 802.11ax, brings major improvements over prior generations offering higher data rate, better spectrum utilization and density multiplier. This is accomplished via enabling technologies such as OFDMA and MU-MIMO that works to democratically allocate the bandwidth for concurrent data traffic and decreases the overall network load in MATLAB.
In the same prospect, Wi-Fi 6 improves security, especially at the MAC layer, via the use of the WPA3 (Wi-Fi Protected Access 3). With WPA3 encryption becomes even stronger and the protection against offline dictionary attacks is added, to make it impossible for intruders to crack passwords. In WPA3, PMF enhances the protection of management frames making the network immune to MATLAB deauthentication and disassociation attacks.
WPA3 with MAC layer security to prevent the data transmitted in the wireless network from being snooping and change in MATLAB. This is important in achieving device isolation in areas where many devices communicate using the same wireless channel. In total, Wi-Fi 6’s configuration together with MAC layer security enhancements for the increasing requirement for high-performance and secure WLAN in contemporary environments.
IV. Conclusions and future work
4.1 Introduction
This chapter synthesizes everything learnt during the research on improving the security MAC layer in Wi-Fi 6 networks. With respect to the existing and emerging threats and proposing the possibility of novel ideas to mitigate those threats, this research has made a significant contribution to improving the wireless network security with more focus on performance and dependability. Some of the impressive accomplishments include adoption of MAC address randomization, WPA3-like encryption and anti-replay measures are outlined. This chapter also outlines implications of these innovations and states the chances and opportunities of improvement this information can offer for creating a stronger and safer wireless communication in the future, listing the existing lack of improvement in the chapter’s limitation.
4.2 Achievements
The analysis phase of this study effectively aligns with its primary aim as improving security and performance of wireless fidelity, Wi-Fi 6 (IEEE 802.11ax) networks, especially at the MAC layer [70]. All the aspects of the analysis help in achieving the objectives of finding the vulnerabilities and analyzing the available approaches for mitigating threats besides enhancing the encryption protocols. Some of the major accomplishments are examining the scientific issues associated with node mobility in connection with wifi 6 in dynamic networks. Various lively examples explained in MATLAB depicted how technologies like MU-MIMO and OFDMA work in different scenarios and served as a starting point for developing adaptive MAC layer security solutions [71]. Packet generation and capture analysis were used to gain an understanding of traffic characteristics and possible irregularities connected to vulnerabilities such as spoofing and DoS attacks. These findings pointed to the need to use advanced encryption methods like WPA3, MACsec and others to enhance security on the Wi-Fi networks.
Some preventative steps were defined fairly usefully: using MAC address randomization to enhance users anonymity and binary exponential backoff to counter contend base assailing. Optimising performance was also done, addressing the increase of security features with low power devices’ reliability and energy consumption. These solutions were backed by the results, which were well captured in the form of graphical illustrations thus proving the enhancements in security as well as performance . This analysis directly responds to all of the offered objectives, and helps close gaps between theoretical risks and applied solutions in the process of strengthening Wi-Fi 6 networks.
4.3 Critical reflection
The analysis phase of this work has given me great insight into the actual challenges in implementing security, performance and efficiency in Wi-Fi 6 (IEEE 802.11ax). One of the things learnt was that the MAC layer has its own weaknesses which are entry points to elements such as spoofing and DoS attacks. Studying these problems helped me understand how future authentication technologies, for example, WPA3 and MACsec, can be used to solve such a problem. Also, it illustrated how a dynamic environment influences the communication stability this illustrated the call to enhancing the security. I was able to gain the understanding of how it is possible to cater for design of solutions with considerations of the adaptive models and structures in real world situations.
One distinct finding was derived from the inspection of packet generation and capture; this characterized fine-grained traffic patterns that may be symptomatic of security compromises. This process helped me to develop an effect to notice fine differences and stress the need for intense traffic coverage. Likewise, modeling battery consumption revealed the tension in achieving both secure designs that are effective at low power for small devices and maintaining functionality for all classes of devices. This phase helped the project focus on the objectives while exposing me more to Wi-Fi 6 networks. It showed me the importance of introducing systematic ideas to solve a problem; it trained me for other containment in the future of network security. Combining the theoretical background with the practical application of the analyzed problem supported my technical expertise and formed a foundation for enhancing enhanced solution approaches.
4.4 Future work
It is, however, pertinent to realise that network security should not be procured at this layer or MAC layer of Wi-Fi 6 exclusively as this proposal seeks to do, but rather as a holistic approach. While the MAC layer is critical for providing secure Wi-Fi 6 link and data authenticity, there are weaknesses on other layers, including the physical and application layers. Future work should therefore go beyond the MAC layer to understand the security challenges in those other layers as vulnerabilities such as the physical layer eavesdropping and threats at the application layer. From cells to layers, extensive approaches of Wi-Fi 6 safety measures will guarantee a stronger and improved safety against rising security threats.
4.5 Limitations
As observed throughout this work, the emphasis has primarily been on improving the security in the MAC layer for Wi-Fi 6. However, this layer is very important for security of messages as well as for developing defense against such threats as spoofing, DoS attacks, and unauthorized access messages and it reveals only a segment of the оverall security solution. Protocols like Wi-Fi 6 along with its enhancements such as OFDMA and MU-MIMO comprise multiple layers that all are responsible for networking security [72]. Hence, though enhancement of the MAC layer is crucial, future work should expand these researches at the other layers such as the phy and the network layer.
For instance, the PHY layer is in extreme need of improvements in encryption methods with a view of addressing physical layer attacks such as jamming and eavesdropping. Enhancing the IP security to prevent network layer threats, rather than adopting a classic method like iterating better IPsec protocols or better Ipv6 authentication will contribute to increasing the overall security of Wi-Fi 6 [73]. Protection and resilience for all layers will be achieved to provide robust security against prevailing threats in modern wireless communication systems.
4.6 Summary
This chapter presents the conclusion of the research conducted towards achieving the objectives of improving the security of learning the MAC layer in Wi-Fi 6 network. It stresses on practices such as MAC address spoofing, WPA3-like encryption, and protective measures against replay attacks. The chapter also looks at the efficiency of this development in increasing the security of wireless networks and ensuring certainty of those networks. It also identifies the scope of the work like MAC layer only and outlines the ideas about the future research direction to enhance the security of the Wi-Fi 6 at all layers to provide a better wireless communication network.
Reference List
Journals
Introduction: Optimizing Food Waste Management with Six Sigma and Anaerobic Digestion Get free samples written by our...View and Download
Introduction - Redesigning Dubai's Transportation Supply Chain: Traditional vs. Modern Approaches Get free samples written by...View and Download
Introduction Get timely, well-researched help with your college assignment help, ensuring you stay on top of your academic...View and Download
Operating within the UK Financial Markets: Royal Bank of Scotland Plc The Royal Bank of Scotland Plc was chosen due to its...View and Download
Introduction Get free samples written by our Top-Notch subject experts for taking online assignment services. Task A-...View and Download
Introduction Get Free Online Assignment Samples from UK's Best Assignment Help Experts to boost your academic...View and Download