A Study of Various Spoofing Attacks and Attackers in Wireless Networks.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attack;determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers.

Authors and Affiliations

Miss. Shweta , Asst. Prof Bhavana. S , Asst. Prof Shailaja Shastri

Keywords

Related Articles

 A Novel Three-Dimensional Adaptive Localization (T-Dial)Algorithm for Wireless Sensor Networks

Abstract: Wireless Sensor Networks is one of the most important area of research. Over the time, WSN isexpanding its reach from scientific research and monitoring to industrial as well as military operations. With itsinc...

 Sentiment Classification in Hindi

Abstract : Traditional approaches for classification of sentiments depend on lexical or syntax based feature oron both. Different methods for sentiments classifications are described .The main goal of analysis of thesent...

A Methodology forDesigning High Confidence Pattern viaEventB: Insulin Infusion Pump Case Study

The correct formal design is anachievement in software engineering, but we faced with challenges to satisfy that. The informal problems types are general or special. The special informal problems depend on the case study...

 Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management

This study is a practical application of the informatics laboratory applied and gives us the score about how the SNMP protocol is brought together with OVPI (OpenView Performance Insight) in traffic protocol packets with...

Smart Blood Bank as a Service on Cloud

Abstract: We all know the working of blood bank management system. A blood bank is a cache or bank of blood or blood components, gathered as a result of blood donation or collection, stored and preserved for later use in...

Download PDF file
  • EP ID EP142115
  • DOI 10.9790/0661-16356165
  • Views 123
  • Downloads 0

How To Cite

Miss. Shweta, Asst. Prof Bhavana. S, Asst. Prof Shailaja Shastri (2014).  A Study of Various Spoofing Attacks and Attackers in Wireless Networks.. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 61-65. https://europub.co.uk./articles/-A-142115