Identity-Based Localization Attacks in Wireless Networks

Abstract

Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing and Sybil attacks by using the similar set of technique. A generalized attack detection model that utilize the spatial correlation of usual signal strength innate from wireless nodes. We provide a theoretical analysis of our approach. We then get the check statistics for detection of identity based attacks by using the K-means algorithm. Our bother detector is robust when handling the situations of attackers that use dissimilar transmission power levels to attack the detection scheme. We further depict how we integrated our attack detector into a real time indoor localization system, It can also localize the position of the attackers. The positions of the attackers can be restricted using point based localization algorithms with the same errors as in the normal case. We further evaluated our method through experimentation in two real office buildings using equally an IEEE 802.11 network and an IEEE 802.15.4 network. it is probable to detect wireless identity based attacks with together a high detection rate and a low false positive rate, thereby provide a strong evidence of the success of the attack detector utilizing the spatial correlation of RSS and the attack localizer.

Authors and Affiliations

S. Vinothkumar , S. Boopathy

Keywords

Related Articles

3D Password: A novel approach for more secure authentication

The melodramatic increase of computer usage has given rise to many security concerns. One major security concern is Authentication; process of validating who you are to who you claimed to be. Authentication provides more...

Survey on Improving Frequent Pattern mining in Spatial Database

spatial database system as a database system that offers spatial data types in its data model and query language and supports spatial data types in its implementation, providing at least spatial indexing and spatial join...

A Robust Method for Reducing Routing Overhead Using High Signal Strength in Manets

A mobile ad hoc network (MANET) is a continuously self configuring , infrastructureless network of mobile devices connected without wires, forming a temporaray network. This feature leads to frequent path failures and ro...

Ad hoc Network and its Security Essentials

This In this paper we present an analysis of ad hoc network and how the attacks are prominence on the ad hoc network. Basically ad hoc network is a combination of several nodes which are linked over without wires which m...

Cost Effective Energy Aware Coverage Preserving Protocol for Wireless Sensor Network

Wireless sensor networks are formed by small sensor nodes communicating over wireless links without using a fixed network infrastructure. Each of the sensor nodes is capable of sensing, processing, and transmitting envir...

Download PDF file
  • EP ID EP152437
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

S. Vinothkumar, S. Boopathy (2014). Identity-Based Localization Attacks in Wireless Networks. International Journal of Computer Science & Engineering Technology, 5(4), 309-313. https://europub.co.uk/articles/-A-152437