Author : S.karthika 1
Date of Publication :7th March 2015
Abstract: Wireless spoofing attacks easy to launch and can significantly impact the performance of networks. The identity of a node verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The spatial information of physical property associated with each node, hard to falsify and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity and localizing multiple adversaries. The formulation of determining the number of attackers as a multiclass detection problem. This project requires Request Storms (RS) algorithm to determine the number of attackers. This RS algorithm used for sending and receiving continuous packet transmission storms and detect malicious intruder using intensity based localization. The RS algorthim detect the unauthorized Internet Protocol / Medium Access Control (IP / MAC) and copy to the Access Control List (ACL), easy to detect and localize the intruder in the network. The integrated detection and localization system that can localize the positions of multiple attackers.
1. Abu A. and Abed R. (2010) ‘Enhancement of Passive MAC Spoofing Detection Techniques’, (IJACSA) International Journal of Advanced Computer Science and Application, Vol. 1, No. 1, pp. 11-18.
2. Chandrasekaran and Francisco (2009) ‘Detecting Identity Spoofs in IEEE 802.11e Wireless Networks’, Global Telecommunications Conference, Vol. 1, No. 1, pp. 1-6.
3. Jieyang, Yingying and Trappe (2009) ‘Detecting Spoofing Attacks in Mobile Wireless Environments’, IEEE trans. Communications Society Conference on Digital Object Identifier, Vol. 2, No. 1, pp. 1-9.
4. Lifeng S. and Arora (2008) ‘Spatial Signatures for Lightweight Security in Wireless Sensor Networks’, IEEE International Conference on Computer Communications, Vol. 4, No. 1, pp. 17- 23.
5. Misra and Gosh (2007) ‘Detection of Identity Based Attacks in Wireless Sensor Networks Using Signal Prints’, IEEE International Conference on Cyber, Physical and Social Computing, Vol. 7, No. 1, pp. 35-41.
6. Quing L. and Trappe (2007) ‘Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationship’, IEEE trans. Information on Forensics and Security, Vol. 2, No. 1, pp. 4-9.
7. Wool (2005) ‘Lightweight Key Management for IEEE 802.11 WLAN With Key Refresh and Host Revocation’, Springer Wireless Networks, Vol. 11, No. 2, pp. 677-686.
8. Yang and Trappe (2013) ‘Detection and Localization of Multiple Spoofing Attackers in Wireless Networks’, IEEE trans. Parallel and Distributed System, Vol. 9, No. 1, pp. 44-58.
9. Ying and wade T. (2013) ‘Detecting and Localizing Identity Based Attacks in Wireless and Sensor Networks’, IEEE trans. Vehicular Technology, Vol. 59, No. 1, pp. 62- 68.