A Study of Various Spoofing Attacks and Attackers in Wireless Networks.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attack;determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers.

Authors and Affiliations

Miss. Shweta , Asst. Prof Bhavana. S , Asst. Prof Shailaja Shastri

Keywords

Related Articles

Chaos Encryption and Coding for Image Transmission Over Noisy Channel

Abstract: The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don’t consider the effect of errors occurring during wireless tran...

 Enhanced cAntMinerPB Algorithm for Induction of Classification Rules using Ant Colony Approach

 Abstract : Mining classification rules from data is a key mission of data mining and is getting great attention in recent years. Rule induction is a method used in data mining where the desired output is a set of R...

 A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms

Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...

 Techniques for Face Detection & Recognition Systema Comprehensive Review

 Face detection and Facial recognition technology has emerged as a striking solution to address many contemporary prerequisites for identification and the verification of identity prerogatives. It brings togeth...

 Nearest Adjacent Node Discovery Scheme for Routing Protocol in  Wireless Sensor Network

 The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links. &nbsp...

Download PDF file
  • EP ID EP142115
  • DOI 10.9790/0661-16356165
  • Views 124
  • Downloads 0

How To Cite

Miss. Shweta, Asst. Prof Bhavana. S, Asst. Prof Shailaja Shastri (2014).  A Study of Various Spoofing Attacks and Attackers in Wireless Networks.. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 61-65. https://europub.co.uk/articles/-A-142115