Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

slugCalculating Transmission Coefficient of Double Triangular Quantum Well under Electric Field for Different Structural Parameters

Transmission coefficient of double quantum well triple barrier structure is numerically computed for triangular geometries. Propagation matrix method (PMM) is used for computation purpose over GaAs/Al...

Towards a Digital Home

The Digital Home refers to a residence with devices that are connected through a computer network. Though Digital Home technology and standards are evolving towards an integrated electronic home system, currently the di...

A Review Paper on License Plate Recognition System

The process of identifying the number from the license plate of any vehicle is the task of License Plate Recognition (LPR). It is one of the popular image processing technology. It consists of four basic steps for ident...

Preparation and Properties of Optical Fibre Glass for Communication

Optical fiber communication technology is fastest growing technology in the field of communication. This is mainly due to low transmission losses and low attenuation losses of the signal which has prime importance in th...

Intelligent Transport System

Due to increase in population there is a need for more transportation system. Because of the current system the traffic flow has greatly increased. Here we propose an intelligent traffic prediction system that captures...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 246
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19604