A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attack;determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers.
Authors and Affiliations
Miss. Shweta , Asst. Prof Bhavana. S , Asst. Prof Shailaja Shastri
A Distant node Based Multicast Routing protocol for Sparse area vehicle to vehicle communication
Inter-vehicular communication(IVC) is one of the most advanced research areas for last few years. Traditional Mobile-adhoc-network(MANET) protocols are proved to be not that much effective in Vehicularadhoc-netwo...
Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security
Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...
Multimodal Medical Image Fusion Based On SVD
Image fusion is a promising process in the field of medical image processing, the idea behind is to improve the content of medical image by combining two or more multimodal medical images. In this paper a ...
Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption
Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in...
CPRM: Cooperative Position based Routing scheme for MANETs
Abstract: A mobile ad hoc network is a wireless communication network, where nodes that are not within direct transmission range of each other will require other nodes to forward data. Routing is difficult in...