Identity-Based Localization Attacks in Wireless Networks

Abstract

Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing and Sybil attacks by using the similar set of technique. A generalized attack detection model that utilize the spatial correlation of usual signal strength innate from wireless nodes. We provide a theoretical analysis of our approach. We then get the check statistics for detection of identity based attacks by using the K-means algorithm. Our bother detector is robust when handling the situations of attackers that use dissimilar transmission power levels to attack the detection scheme. We further depict how we integrated our attack detector into a real time indoor localization system, It can also localize the position of the attackers. The positions of the attackers can be restricted using point based localization algorithms with the same errors as in the normal case. We further evaluated our method through experimentation in two real office buildings using equally an IEEE 802.11 network and an IEEE 802.15.4 network. it is probable to detect wireless identity based attacks with together a high detection rate and a low false positive rate, thereby provide a strong evidence of the success of the attack detector utilizing the spatial correlation of RSS and the attack localizer.

Authors and Affiliations

S. Vinothkumar , S. Boopathy

Keywords

Related Articles

Automata-Based Software Reliability Paradigm for Ubiquitous Systems

The paper proposes a novel paradigm for accurate reliability estimation of ubiquitous systems. The proposed prototype differs from all conventional software reliability models as it does not rely on any kind of post fail...

EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT

In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...

Web User Session Cluster Discovery Based on k-Means and k-Medoids Techniques

The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To rev...

An Incremental Sanitization Approach in Dynamic Databases

In most organizations the historical dataset is dynamic which means it is periodically updated with fresh data. In such an environment, when the counterpart organizations need to share their information for a decision ma...

Efficient use of Mobile Apps for Students

Students now a days are dependent on their smart phones for text, email, social media or calling throughout their day. Over fast few years, Mobile learning termed to be M-Learning has the ability to use mobile technology...

Download PDF file
  • EP ID EP152437
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

S. Vinothkumar, S. Boopathy (2014). Identity-Based Localization Attacks in Wireless Networks. International Journal of Computer Science & Engineering Technology, 5(4), 309-313. https://europub.co.uk/articles/-A-152437