Multi Zone Base Spoofing Attack Detection and Localization for Wireless Sensor Network Using Novel Hypothesis Testing
نویسنده
چکیده
Wireless spoofing attack is a combine physical and application level attacker, spoofing attack model first affected node compromised one node MAC address and group of node attack in wireless sensor network. So ireless spoofing attacks are easy to launch and can extensively impact the performance of network. In the new methodology there are three phases of work. First one is, to implement to receive signal strength (RSS) and property associated with the transmission and reception of communication for detecting spoofing. Second one is, group of node request between server to inform all kinds of neighbors details send and update database. In this method simulation applied for K-Means clustering algorithm. Third one is, to implement the new Chronological Probability Fraction Testing applied for multiple zones based wireless sensor networks. In this paper the new testing, statistical framework based on Chronological Probability Fraction Test (CPFT) hypothesis testing for modeling, analyzing, and evaluating statistical source anonymity in wireless sensor networks has been analyzed. The proposed system introduces the notion of number of multiple zone in distinguish ability to model source location privacy. It shows that the current approaches for designing statistically anonymous systems introduce correlated in multiple zones. In addition, a fast and effective mobile replica node detection scheme is proposed using the chronological probability ratio test. The Location results are representing using Enhanced CPFT algorithm that provides strong evidence of high accuracy of localizing multiple adversaries.
منابع مشابه
A multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کاملImprove range-free localization accuracy in wireless sensor network using DV-hop and zoning
In recent years, wireless sensor networks have drawn great attention. This type of network is composed of a large number of sensor nodes which are able to sense, process and communicate. Besides, they are used in various fields such as emergency relief in disasters, monitoring the environment, military affairs and etc. Sensor nodes collect environmental data by using their sensors and send them...
متن کاملSpoofing Attack Detection and Localization in Wireless Sensor Network: a Review
--Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofers and localization of the same is a challenging task in wireless sensor network. This paper presents expository survey of various spoofing attack det...
متن کاملFDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks
Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...
متن کاملMulti-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms
Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...
متن کامل