Spoofing Detection in Wireless Networks
نویسندگان
چکیده
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. Using spatial information the following are performed 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. Spatial information is a physical property associated with each node which is hard to falsify, and not reliant on cryptography. Spatial correlation of received signal strength (RSS) inherited from wireless nodes are used to detect the spoofing attacks. Cluster-based mechanisms are developed to determine the number of attackers. An integrated detection and localization system is proposed to localize the positions of multiple attackers. This integrated detection and localization system provides high accuracy of localizing multiple adversaries.
منابع مشابه
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملSurvey on Wireless Intrusion Detection Mechanisms
Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...
متن کاملSurvey on Wireless Intrusion Detection Mechanisms
Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...
متن کاملSurvey on Wireless Intrusion Detection Mechanisms
Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...
متن کاملSurvey on Wireless Intrusion Detection Mechanisms
Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless...
متن کامل