Multiple Spoofing Adversaries Detection and Localization in Wireless Networks

نویسنده

  • Beulah Shekhar
چکیده

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to forge, and not contingent on cryptography, as the beginning for, detecting spoofing attacks, determining the number of attackers when multiple adversaries hidden as the same node identity and localizing multiple adversaries. To use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. An integrated detection and localization system is developed to localize the positions of multiple

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spoofing Detection in Wireless Networks

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. Using spatial information the following are performed 1) detecting spoofing attacks; 2) determining the number...

متن کامل

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to f...

متن کامل

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to f...

متن کامل

Detection, Localization And Prevention Of Spoofing Attacks In Wireless Network

The performance of networks can be severely damaging by the use of wireless spoofing networks. Since they can be easily established, the attacker doesn’t find much hassles in destroying these networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. We will use...

متن کامل

Multi Zone Base Spoofing Attack Detection and Localization for Wireless Sensor Network Using Novel Hypothesis Testing

Wireless spoofing attack is a combine physical and application level attacker, spoofing attack model first affected node compromised one node MAC address and group of node attack in wireless sensor network. So ireless spoofing attacks are easy to launch and can extensively impact the performance of network. In the new methodology there are three phases of work. First one is, to implement to rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014