Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

Selective Harmonic Elimination for Solar Cell based Multi-Level Inverter System Using Moth Flame Optimization

Themulti level inverter is powerful electronic device, which is widely used for high power utility application. The main purpose of the multi-level inverter is to provide sinusoidal wave from with low-level harmonic con...

Consolidated Identity Management System for Secure Mobile Cloud Computing

Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of IT services on...

Generation of Biogas and Enhancing its Methane Content by Chemical Absorption Technique

In this paper we will discuss India’s existing biogas potential as a substitute to fossil fuels for domestic purpose. In the second part of the paper we will discuss the technique of upgrading the biogas using a chemica...

THD reduction using Shunt Active Filter

Nowadays, the active filters represent a viable alternative for controlling harmonic levels in industrial consumers’ electrical installations. It must be noted the availability of many different types of filter configur...

slugData Mining Techniques on Medical Data for Finding Locally Frequent Diseases

In the last decade there has been increasing usage of data mining techniques on medical data for discovering useful patterns or trends which are used in decision making and diagnosis. Data mining techniques such as clus...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 263
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19604