Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.
Authors and Affiliations
P. Kiruthika Devi, Dr. R. Manavalan
Distributed Privacy preserving and Handling Privacy information leakage by using k -anonymity algorithm
There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is po...
Solar Panel With Wind Turbine Power Generation System
In this project we generate an electric power through the fabrication of horizontal axis wind mill and pyramid shaped solar panel. A wind turbine system is a machine that converts the kinetic energy in wind into mechani...
Analysis of High Rise Building with Different Codes
This growing world, a civil engineering student during the execution of a project as before and structural elements and their safety standards need to be fully aware of. It is the sequel to try as analysis and design of...
Java Security
The Java platform provides a number of features designed to improve the security of Java applications Java's security model is one of the language's key architectural features that makes it an appropriate technology for...
Design and Implementation of Inverter for driving Induction Motor using DSPACE
This paper presents the design and implementation of inverter system for driving both single phase , three phase Induction motor using DSPACE with the controlling objectives PWM and SVPWM . AC motor drives are widely us...