Identifying and locating multiple spoofing attackers using clustering in wireless network

نویسندگان

  • AMALA GRACY
  • CHINNAPPAN JAYAKUMAR
چکیده

Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys. This generalized Spoofing attack-detection model utilizes MD5 (Message Digest 5) algorithm to generate unique identifier for each wireless nodes and a physical property associated with each node, as the basis for (1) detecting spoofing attacks; (2) finding the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries. Cluster-based mechanisms are developed to determine the number of attackers. The proposed model can be explored further to improve the accuracy of determining the number of attackers, by using Support Vector Machines (SVM).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spoofing Attacks in wireless Sensor Networks

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our...

متن کامل

Multiple Spoofing Adversaries Detection and Localization in Wireless Networks

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...

متن کامل

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to f...

متن کامل

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to f...

متن کامل

Recognizing and Discovering Spoofing Attacks for Mobile Adhoc Network

Wireless networks are exposed to many attacks which of one is spoofing attack. The networks performance will be affected more when the attackers are present. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. K means clustering is used to determine the number of attackers. In this paper we proposed to use Enh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013