Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

Satellite Communication

Communication in the whole of the World is revolutionized with the advent of Satellites. Satellite Communication hasserved mankind in many ways e.g. to predict weather, storm warning, provide wide range of communication...

Physico-chemical seasonal analysis and Fish Culture, Pond of Shahdol, Madhya Pradesh

The present paper deals with the seasonal variations in some important Physico-chemical parameters and Biological analysis of the fish Pond of Shahdol Madhya Pradesh using selected standard classical methods with an obj...

A Novel Current Control Technique For A Three-Phase Statcom

This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...

Big Data Security Using System Logs

A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embr...

slugA Survey On Cognitive Radio

Cognitive radio (CR) has emerged as a promising technology to exploit the unused portions of spectrum in an opportunistic manner. The fixed spectrum allocation of governmental agencies results in unused portions of spec...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 257
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19604