Identity-Based Localization Attacks in Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing and Sybil attacks by using the similar set of technique. A generalized attack detection model that utilize the spatial correlation of usual signal strength innate from wireless nodes. We provide a theoretical analysis of our approach. We then get the check statistics for detection of identity based attacks by using the K-means algorithm. Our bother detector is robust when handling the situations of attackers that use dissimilar transmission power levels to attack the detection scheme. We further depict how we integrated our attack detector into a real time indoor localization system, It can also localize the position of the attackers. The positions of the attackers can be restricted using point based localization algorithms with the same errors as in the normal case. We further evaluated our method through experimentation in two real office buildings using equally an IEEE 802.11 network and an IEEE 802.15.4 network. it is probable to detect wireless identity based attacks with together a high detection rate and a low false positive rate, thereby provide a strong evidence of the success of the attack detector utilizing the spatial correlation of RSS and the attack localizer.
Authors and Affiliations
S. Vinothkumar , S. Boopathy
Cosine Similarity Function For The Temporal Dynamic Web Data
Cosine similarity function is one of the most popular similarity function for handling the web data in various applications such as recommender system, collaborative filtering algorithms, classification algorithms, etc....
Peer to Peer Cooperation for Caching in Wireless Networks
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...
Fusion of MRI and CT Images with Double Density Dual Tree Discrete Wavelet Transform
Data fusion technique is a powerful tool for extracting higher quality information from large amount of remote sensing images or various types of medical images and eliminating redundancy among these images. Traditional...
Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques
Degenerated Tissue in temporal lobe may cause diminished speech and memory difficulty. The principal of our Research work is automatic detection of degenerated tissues due to any disease in the temporal lobe. Fully autom...
Ontology Based Semantic Web Service Discovery and Composition Framework
Web Service Discovery is the process of finding a suitable Web Service for a given task. A theoretical analysis of ontology-based service composition is proposed in terms of its dependency with service discovery. Web Ser...