Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

Developed the Flexure Shear Strength of Rc Beam with Using Fiber Polymer Composite

The purpose of this study was to develop the strength in flexure shear of reinforced concrete beam with the help of fiber polymer composites. We use the glass fiber and other polymer matrix as a reinforcement material....

Design and Performance Analysis of Solar Powered Vehicle- Sun Bicycle

Energy is the primary and most universal measure of all kinds of work by human beings and nature. There has been an enormous increase in the global demand for energy in recent years, as a result of industrial developmen...

Study of Machining Parameters in EDM

Since the thermal energy produced in electrical discharge machining process is due to the applied electrical energy, it is very important to enhance the electrical process parameters to improve the process efficiency. T...

Implementation Paper of Result Alert System

The development of mobile network communication system, users have been proposed with lots of services such as ability to send SMS, Video, Data files, Images etc. This process described the implementation of the result...

Data Mining Techniques to Find Out Heart Diseases: An Overview

Heart disease is a major cause of morbidity and mortality in modern society. Medical diagnosis is extremely important but complicated task that should be performed accurately and efficiently. Although significant progre...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 258
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19604