Identity-Based Localization Attacks in Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cryptographic authentication, authentication is not always probable, because it require key management and additional infrastructural overhead. A method for detect both spoofing and Sybil attacks by using the similar set of technique. A generalized attack detection model that utilize the spatial correlation of usual signal strength innate from wireless nodes. We provide a theoretical analysis of our approach. We then get the check statistics for detection of identity based attacks by using the K-means algorithm. Our bother detector is robust when handling the situations of attackers that use dissimilar transmission power levels to attack the detection scheme. We further depict how we integrated our attack detector into a real time indoor localization system, It can also localize the position of the attackers. The positions of the attackers can be restricted using point based localization algorithms with the same errors as in the normal case. We further evaluated our method through experimentation in two real office buildings using equally an IEEE 802.11 network and an IEEE 802.15.4 network. it is probable to detect wireless identity based attacks with together a high detection rate and a low false positive rate, thereby provide a strong evidence of the success of the attack detector utilizing the spatial correlation of RSS and the attack localizer.
Authors and Affiliations
S. Vinothkumar , S. Boopathy
Applications of Finite Automata in Lexical Analysis and as a Ticket Vending Machine – A Review
In this paper, we explain the two applications of finite automata. First is about the first phase of a compiler design called as lexical analysis. The lexical analysis used to identify the token with its type. Second is...
A Prototypical Solution for Cyber Space
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive netwo...
A Review of Home Automation using IoT Applications
One of the topics sudden interests gaining popularity day by day is that of home because of its innumerous advantages. One can achieve home automation by simply connecting home appliance and electrical devices to the int...
Enigmatic Power of Turing Machines: A Review
Automata are said to be theoretical devices which help in understanding the reasoning behind computations and are considered to be ideal rather than realistic. This is because the actual computers cannot have infinite me...
Software Security: A Risk Taxonomy
The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has pro...