Recognizing and Discovering Spoofing Attacks for Mobile Adhoc Network
نویسندگان
چکیده
Wireless networks are exposed to many attacks which of one is spoofing attack. The networks performance will be affected more when the attackers are present. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. K means clustering is used to determine the number of attackers. In this paper we proposed to use Enhanced Sequential Probability Ratio test (ESPRT) technique. This is the fast and effective technique to detect the mobile replica nodes. The network is divided into set of zones, and then trust level is established for each zone to detect untrustworthy zones. The entire zone is considered as untrustworthy if trust level goes below trust threshold. The base station will revoke the zone if it considers the zone as untrustworthy. The main benefit of this zone-based detection approach lies in achieving fast node compromise detection and revocation while saving the large amount of time and effort.
منابع مشابه
Security Attacks in MANet - A Review
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on fundamental security attacks in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to bo...
متن کاملImproving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks
The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...
متن کاملDifferent types of attacks in Mobile ADHOC Network
Security in mobile ADHOC network is a big challenge as it has no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside the network and from the outside. We are trying to classify the existing attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. We will also be discussing the presently propos...
متن کاملReview Paper on Security Issues in Mobile Adhoc Networks
Mobile Ad Hoc Networks (MANETs) have received drastically increasing interest, partly owing to the potential applicability of MANETs to myriad applications. The deployment of such networks, however, poses several challenging issues, due to the dynamic nature of the nodes, the arbitrary topology, the limited wireless range of nodes, and transmission errors. Since all the nodes in the network col...
متن کاملDistributed Denial of Service Attacks in Mobile Adhoc Networks
The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious us...
متن کامل