Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

A GSM Based Embedded Mobile Web Server for Monitoring Aged People

Now a day’s many real time applications are connected to web(internet).This is very useful and helpful for customers to see application(requirements) from anywhere in the world. These web connected applications belong t...

Effect of quenching medium on hardness of three grades of steel - AISI 1040, 1050 and 4340

Medium carbon steel contains higher percentage of carbon and thus gives better response to the heat treatment processes. Also the hardness of medium carbon steel can be improved by quenching through different quenching...

Innovative method for Iris melanoma detection

Iris Melanoma is one of the type of eye tumor. Iris is colored part of eye that surrounds pupil. The Melanoma is tumor which grows and develops in tissues in middle layer of eyeball. Symptoms of Melanoma are dark spots...

Physico-chemical changes in bottle gourd (Lagenariasiceraria) juice during storage

The present study was designed to evaluate physico-chemical changes in bottle gourd juice during storage. The fresh bottle gourds were procured from the Agriculture Farm, Haryana Agriculture University, Hisar, India. Th...

Synthesis of Furfural from Corn Cobs by Using Membrane Technology

Today all major companies used furfural as a selective solvent in refining of lubricating oil. Furfural is produced from agricultural waste biomass that contain pentosans, which are aldose sugars, composed of small ring...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 215
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19604