A Study of Various Spoofing Attacks and Attackers in Wireless Networks.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attack;determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers.

Authors and Affiliations

Miss. Shweta , Asst. Prof Bhavana. S , Asst. Prof Shailaja Shastri

Keywords

Related Articles

 Implemenation of Enhancing Information Retrieval UsingIntegration of Invisible Web Data Source

 Abstract: Current information retrieval process concentrate in downloading web content and analyzing andindexing from surface web, exist of interlinked HTML pages. Information retrieval has limitations if the data...

Hand Gesture Recognition System for Creating & Controlling Media Player using Mat Lab Tool

Abstract: In this paper we have discussed a dynamic hand gesture recognition system for creating and controlling the media player. The system is made possible by using the concepts of threshold and color detection. The...

A Survey on Fault Tolerance Mechanisms for job scheduling in Grid computing

Grid computing is defined as a hardware and software infrastructure that enables sharing of coordinated resources in a dynamic environment. In grid computing, the probability of a failure is much greater than parallel co...

 Task Allocation in heterogeneous Distributed Real Time System for Optimal Utilization of Processor’s Capacity

Abstract: In Distributed Real Time System (DRTS), systematic allocation of the tasks among processors is one of the important parameter, which determine the optimal utilization of available resources. If this step is not...

Download PDF file
  • EP ID EP142115
  • DOI 10.9790/0661-16356165
  • Views 119
  • Downloads 0

How To Cite

Miss. Shweta, Asst. Prof Bhavana. S, Asst. Prof Shailaja Shastri (2014).  A Study of Various Spoofing Attacks and Attackers in Wireless Networks.. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 61-65. https://europub.co.uk/articles/-A-142115