Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The project is proposed to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. It is proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, the project explores using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. The localization results use a representative set of algorithms that provide strong evidence of high accuracy of localizing multiple adversaries. In addition, a fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings.

Authors and Affiliations

J. Sobana

Keywords

Related Articles

 Image Encryption Techniques using Fractal Geometry: A Comparative Study

Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission o...

Efficient Detection of Internet Worms Using Data Mining Techniques

Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...

Auto Mutating Cryptosystem- An approach towards better security

Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to...

 A Dynamic Image Generation Scheme for Steganographic Data Encryption

 Abstract: This paper proposes a new approach to provide an extra layer of security to steganographictechniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of dig...

 Latest development of cloud computing technology,characteristics, challenge, services & applications

 Abstract: Cloud computing is a network-based environment that focuses on sharing computations, Cloudcomputing networks access to a shared pool of configurable networks, servers, storage, service, applications &...

Download PDF file
  • EP ID EP146975
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

J. Sobana (2014).  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 39-44. https://europub.co.uk/articles/-A-146975