Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The project is proposed to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. It is proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, the project explores using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. The localization results use a representative set of algorithms that provide strong evidence of high accuracy of localizing multiple adversaries. In addition, a fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings.

Authors and Affiliations

J. Sobana

Keywords

Related Articles

 Automatic DNA Sequence Generation for Secured Effective Multi  -Cloud Storage

 The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. &...

Isolated Pali Word (IPW) Feature Extraction using MFCC & KNN Based on ASR

Speech is most prominent & primary mode of Communication among human being. Past after years of research and development & the accuracy of automatic speech recognition remains the important challenges in research. The de...

 Qualitative Study on the efficiency of Load balancing algorithmsin Cloud Environment

 Abstract: Load balancing in cloud is different from the typical architecture of load balancing techniques. Thisopens up new opportunities and challenges. Resource management is the use of available processors in th...

 Twin Key Implementation in Aes

 Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Regis...

 Development of Intelligent Traffic Light System Based On Congestion Estimation Using Fuzzy Logic

 Abstract: Vehicular traffic is the major problem which every country faces because of the increase in number of vehicles throughout the world, especially in large urban areas. In a conventional traffic light contro...

Download PDF file
  • EP ID EP146975
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

J. Sobana (2014).  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 39-44. https://europub.co.uk/articles/-A-146975